Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 14:50

General

  • Target

    build.exe

  • Size

    1.6MB

  • MD5

    90ef1657375602c233da4ce1a9ca8a6f

  • SHA1

    556b3e441b7a754a70918d5a826b7b570437cc10

  • SHA256

    bfb2d2414f60614e012a7332d4a6606588d8add0e927516d17d45cafe2119338

  • SHA512

    11ba8a5606b818e837415649e94231bc2fedf94a58aa8ae4b8b44b0eef3e23ab8a621894aaa5a2ef76a278724eb9c8a823e2fa27b373b10d99e99c2618c3e77e

  • SSDEEP

    24576:ni2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgLrd:iTq24GjdGSiqkqXfd+/9AqYanieKd

Score
10/10

Malware Config

Extracted

Family

stealerium

C2

Prueba

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    "C:\Users\Admin\AppData\Local\Temp\build.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6477.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:3592
        • C:\Windows\SysWOW64\taskkill.exe
          TaskKill /F /IM 212
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1192
        • C:\Windows\SysWOW64\timeout.exe
          Timeout /T 2 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:692
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa8f07ab58,0x7ffa8f07ab68,0x7ffa8f07ab78
        2⤵
          PID:2668
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:2
          2⤵
            PID:540
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
            2⤵
              PID:4672
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
              2⤵
                PID:5008
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:1
                2⤵
                  PID:2396
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:1
                  2⤵
                    PID:4344
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:1
                    2⤵
                      PID:5076
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
                      2⤵
                        PID:2576
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
                        2⤵
                          PID:1388
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
                          2⤵
                            PID:5032
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
                            2⤵
                              PID:3396
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:8
                              2⤵
                                PID:2148
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4920 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:1
                                2⤵
                                  PID:3848
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4308 --field-trial-handle=1932,i,9263360740595001201,8698235145793216160,131072 /prefetch:1
                                  2⤵
                                    PID:3488
                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                  1⤵
                                    PID:3856

                                  Network

                                  MITRE ATT&CK Matrix ATT&CK v13

                                  Discovery

                                  Query Registry

                                  2
                                  T1012

                                  System Information Discovery

                                  3
                                  T1082

                                  Command and Control

                                  Web Service

                                  1
                                  T1102

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000b
                                    Filesize

                                    140KB

                                    MD5

                                    b08690f0072c0ca1ff78b83d95c401d6

                                    SHA1

                                    d501ec281d3fe4dd69b2112ad140d2ad2fbda187

                                    SHA256

                                    0d8719b1fe7c3ade94a57d7d3a1fd63e21be5092ca2c17d5f9766937b6c2cbd0

                                    SHA512

                                    2edf4bf70330ab91a53398906194de3abb57b11f38f56b91ae07d9b3ba15d20f3b6127ec714dce580ccfc763936408accbbb875b334c0711c8be997cf1e87587

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                    Filesize

                                    354B

                                    MD5

                                    be23b4b30acfe14748f93dba99237c59

                                    SHA1

                                    25f9caf295266102e13cf989600caba8b079f4b3

                                    SHA256

                                    7898e11625fa466fccd1993d4708cb23a96d458de1286610cca8393649b19891

                                    SHA512

                                    5981463120c05c9c7d6f8ceebff68b0991e34a889576ada3d7aa089c5d33d26c4773cf6ecbe41ece3425b8084917814e38f6ac1b0eef1970182875598606d14a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                    Filesize

                                    522B

                                    MD5

                                    19309c2061ac0e2a69a3acff5bddf643

                                    SHA1

                                    6a031a5012aa61cb23db8798622bba433ab910e1

                                    SHA256

                                    465295dc3d049002f017ddb4e714143db42f7ffe9fb72bb01c95da7a5fde8c93

                                    SHA512

                                    53add74c182d0bf5fadfe911081663f07ade767c9a86cf84c4b4ba21e4ff8abcb833e9a7ad589eee2be745d3c5d232a511bfe3badb7d1621953925712c2dc511

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                    Filesize

                                    7KB

                                    MD5

                                    e88e6598f98afcddc731e73e80d59786

                                    SHA1

                                    604cdfa30b13684e4fefb2ea4514bb18f1d3bb61

                                    SHA256

                                    5aa06f4b134ec17cf06c32c5cf23331e115ba7bd379c0adb4531529d73716457

                                    SHA512

                                    9ac8b891379ed70cad1e1d64dc50412a2b9144fe36a8a558c1ee011f8f7028d2b2959f388292863341e7f2b863ed5918d44644df664871b3fa6937d1e35396ea

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                    Filesize

                                    7KB

                                    MD5

                                    a045e95dc871cb14f8c7ee142fe40128

                                    SHA1

                                    b1453818b5a45920981fbd864d015720a38ff707

                                    SHA256

                                    ae268357371c450af469a2ebd219960529c1a9e152380ccb6caf229a25cbed26

                                    SHA512

                                    816120a0a762b5236d361882262a61080a2b77910ded9b56ef7d1d75f95dc8284f0791408e1e4de57a6defb202c93cd40399f7d45e2d5455b869c5513c70696d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                    Filesize

                                    16KB

                                    MD5

                                    f08128d1765244a453cbb0de71d29f32

                                    SHA1

                                    8861c4a03cda1fc5c94a3e83fe970e2adb614c69

                                    SHA256

                                    f79a42c737d4feb2d0dca227fe1a583b2aa4b12fce2be062c802966c49dccc9b

                                    SHA512

                                    5776e4b2bd1b41af99bf68743135688cb6f0ba4a96fc61ab1ed194ebb64d76d4b55f0349e4505d1fd8254e694fa498083f15a4dbd9c52a63ff0f185cc31e03d4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
                                    Filesize

                                    56B

                                    MD5

                                    94275bde03760c160b707ba8806ef545

                                    SHA1

                                    aad8d87b0796de7baca00ab000b2b12a26427859

                                    SHA256

                                    c58cb79fa4a9ade48ed821dd9f98957b0adfda7c2d267e3d07951c2d371aa968

                                    SHA512

                                    2aabd49bc9f0ed3a5c690773f48a92dbbbd60264090a0db2fe0f166f8c20c767a74d1e1d7cc6a46c34cfbd1587ddb565e791d494cd0d2ca375ab8cc11cd8f930

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5965a6.TMP
                                    Filesize

                                    120B

                                    MD5

                                    e49406cabca9623bc26502a4d180b92b

                                    SHA1

                                    18735068f790161e86cab6db4100ad1f7a453da7

                                    SHA256

                                    2b1fe2869894f977e0d246877199898c9435c08264011a422595d6aede429682

                                    SHA512

                                    d1140a2bc33fe8a2948c313a9282acadda303700a3312890c0e0229c642637128b213a2543ff50ed49fdc31396a48bcc05c8812ba6fd1661e9689578f6209511

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                    Filesize

                                    256KB

                                    MD5

                                    8de9e2437973ff83561c928ffebe68d7

                                    SHA1

                                    ce68cd42e1e4fcfd3b363693b65adc80bff84069

                                    SHA256

                                    56f7651837a8cc01f04b7731f8c5052eb7e06f19a91a4b298b23b8711d6592c7

                                    SHA512

                                    12ff534ff26599cbdcd8923447b51c635d0c30d660ad4e96a8b3a6c4126c63810df99e55b16df467a0791a65c1107c5e4afb0c44f879178b075222da519fe3dd

                                  • C:\Users\Admin\AppData\Local\Temp\tmp6477.tmp.bat
                                    Filesize

                                    56B

                                    MD5

                                    afe80ec60e1cf0537508adffbf4e80d5

                                    SHA1

                                    7315fd721106992e4b7464ec566e4e1b811f9b02

                                    SHA256

                                    eb79e9b45c7629f3c84ed0c9ec977c461ea91c538d70f3fd1ba36241a5e6fa5a

                                    SHA512

                                    1be41b032ab264cb52b753beccf1fd2098786fc6d3dd4472c937ea6d560f2ddcf07a9ab3da3d0dae3da5f7604c1dadaac0ee44efb6c1a4a309dd33d1ac6ab4c5

                                  • \??\pipe\crashpad_3952_WJZHWKMTAZUKPRAV
                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/212-13-0x0000000074920000-0x00000000750D0000-memory.dmp
                                    Filesize

                                    7.7MB

                                  • memory/212-8-0x0000000005E30000-0x0000000005E38000-memory.dmp
                                    Filesize

                                    32KB

                                  • memory/212-7-0x0000000005DE0000-0x0000000005E06000-memory.dmp
                                    Filesize

                                    152KB

                                  • memory/212-6-0x0000000005D50000-0x0000000005DE2000-memory.dmp
                                    Filesize

                                    584KB

                                  • memory/212-0-0x000000007492E000-0x000000007492F000-memory.dmp
                                    Filesize

                                    4KB

                                  • memory/212-3-0x0000000074920000-0x00000000750D0000-memory.dmp
                                    Filesize

                                    7.7MB

                                  • memory/212-2-0x00000000056D0000-0x0000000005736000-memory.dmp
                                    Filesize

                                    408KB

                                  • memory/212-1-0x0000000000BC0000-0x0000000000D56000-memory.dmp
                                    Filesize

                                    1.6MB