Analysis
-
max time kernel
1799s -
max time network
1496s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-05-2024 16:40
Behavioral task
behavioral1
Sample
build.exe
Resource
win11-20240508-en
General
-
Target
build.exe
-
Size
1.6MB
-
MD5
5c51643f4c3ca737d3162d82840761c7
-
SHA1
dede91d3e74af7b5f67a65c0fffc2fc8ca349b32
-
SHA256
5a7f0ae453a4302dc288e00b6392923906ead1f181d338ab1c02a4a78f78593b
-
SHA512
8215fb4221a725918e6eb89cb7e755c185eff496e4b0d3116898411ac73841fffaed4ebfb1d1de512b61e676950b5ceec115f1533622a40ed1a51abf2ecb6468
-
SSDEEP
49152:ULTq24GjdGSiqkqXfd+/9AqYanieKdQc:UiEjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1244281935228965048/sJAD8BhTylLJViwx58UHGY7unbr6jQqQZSC4HrgK1L_fWJYHE1waujg1JuSnxcq9zxf6
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 icanhazip.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
build.exepid process 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe 4552 build.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
build.exepid process 4552 build.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
build.exemsiexec.exedescription pid process Token: SeDebugPrivilege 4552 build.exe Token: SeSecurityPrivilege 4860 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
build.exepid process 4552 build.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
build.execmd.execmd.exedescription pid process target process PID 4552 wrote to memory of 660 4552 build.exe cmd.exe PID 4552 wrote to memory of 660 4552 build.exe cmd.exe PID 4552 wrote to memory of 660 4552 build.exe cmd.exe PID 660 wrote to memory of 3124 660 cmd.exe chcp.com PID 660 wrote to memory of 3124 660 cmd.exe chcp.com PID 660 wrote to memory of 3124 660 cmd.exe chcp.com PID 660 wrote to memory of 4540 660 cmd.exe netsh.exe PID 660 wrote to memory of 4540 660 cmd.exe netsh.exe PID 660 wrote to memory of 4540 660 cmd.exe netsh.exe PID 660 wrote to memory of 768 660 cmd.exe findstr.exe PID 660 wrote to memory of 768 660 cmd.exe findstr.exe PID 660 wrote to memory of 768 660 cmd.exe findstr.exe PID 4552 wrote to memory of 2524 4552 build.exe cmd.exe PID 4552 wrote to memory of 2524 4552 build.exe cmd.exe PID 4552 wrote to memory of 2524 4552 build.exe cmd.exe PID 2524 wrote to memory of 3856 2524 cmd.exe chcp.com PID 2524 wrote to memory of 3856 2524 cmd.exe chcp.com PID 2524 wrote to memory of 3856 2524 cmd.exe chcp.com PID 2524 wrote to memory of 3360 2524 cmd.exe netsh.exe PID 2524 wrote to memory of 3360 2524 cmd.exe netsh.exe PID 2524 wrote to memory of 3360 2524 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
outlook_win_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\Browsers\Firefox\Bookmarks.txtFilesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\Directories\OneDrive.txtFilesize
25B
MD5966247eb3ee749e21597d73c4176bd52
SHA11e9e63c2872cef8f015d4b888eb9f81b00a35c79
SHA2568ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e
SHA512bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\Directories\Startup.txtFilesize
24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\Directories\Videos.txtFilesize
23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\System\Apps.txtFilesize
1KB
MD5d1827f02cf066a4447389396d52e74b7
SHA1832f862e6c69bf102fdc0d22efac7fcbed4a889b
SHA25659e1ac4a9368db5a13eefa65521d99e9530efbed4847433f10c351ac89b6f8cb
SHA512613c4fb51775cdf3be5ca735bb7a583f17b4e035f714f1108a6ffe2374325f9e4d91e81a13c1ae74ae419fe2433dd3ca31c71631a3ee304f887b84d767006511
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\System\Apps.txtFilesize
6KB
MD50188c7cc3aeecb97ca25ed830703ee50
SHA15d49ab1622be564882755ae25f7c74bec8ac3e08
SHA2563d89ce4f07fddd5f55f9495da13637eb2b485c590e4f682b26a4a68ffb785c28
SHA512e41d7ce6340a305c5c6de0df0488788e8f9d93c610cc81e46085555d4cc6f58c65c5fed5eb9fc7db0b6cd1589dbe689a77f9647c239340364e397d95fc44728c
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\System\Debug.txtFilesize
1KB
MD54d46d8a668845e90c396d0d0c6153665
SHA14c2513064aa799832877b1cd1ed1279bb90e1120
SHA2560e80d7a71c7dbb4b0ffca5e48a1bdfa9c57f5682719ec5e7546860a3efe73307
SHA512a8f50f6af298f6c03a90a1c968e5f0069e57a8b56924f7d173affe2903710d45b300ee1f2d858e992293ab4651607049f02ef4b703e91078b1c915c3c1e396eb
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\System\Process.txtFilesize
4KB
MD5d8fbfdf681821ff27859c0e47027e896
SHA1158cc84026d9839429e7ff9db549c45ff5dea23e
SHA25620fff3f8405fb13151f9af14d6246dec27ab1c633c1ba196c669fe8db035b832
SHA512c00e50385fc52b96c5c7f75ef802a8a7dc4c1d24707583b8d358156f3ba0f16d995bdf0f0301e76e06e1a742cd5e33adbe4c7badbd7353144e17d487a4b113ad
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\Admin@NGOMEWNG_en-US\System\ProductKey.txtFilesize
29B
MD571eb5479298c7afc6d126fa04d2a9bde
SHA1a9b3d5505cf9f84bb6c2be2acece53cb40075113
SHA256f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3
SHA5127c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd
-
C:\Users\Admin\AppData\Local\9d53ce5289e487a61b8ad227a94186e2\msgid.datFilesize
19B
MD53a6d20510015bacc37b5970adf8b7fd9
SHA1f5dbc82cb1ecc2efe21d312774b42cb6177e8eea
SHA25643f47796b30ed3ef68965ee0a1ce773fb440c40135cf146db22702145df4c312
SHA51275dc24e63182e2230700551a5fba3c98f6f285d153564100d378a132a8fc9cf879755b513340522256c5a30212f22c574b86195641f237ee595ad2a7e1d6ba20
-
memory/4552-3-0x0000000074350000-0x0000000074B01000-memory.dmpFilesize
7.7MB
-
memory/4552-10-0x0000000006D10000-0x0000000006D1A000-memory.dmpFilesize
40KB
-
memory/4552-74-0x0000000007DD0000-0x0000000008376000-memory.dmpFilesize
5.6MB
-
memory/4552-7-0x0000000005D30000-0x0000000005DC2000-memory.dmpFilesize
584KB
-
memory/4552-0-0x000000007435E000-0x000000007435F000-memory.dmpFilesize
4KB
-
memory/4552-12-0x0000000006D40000-0x0000000006D5E000-memory.dmpFilesize
120KB
-
memory/4552-195-0x0000000006E70000-0x0000000006EEA000-memory.dmpFilesize
488KB
-
memory/4552-9-0x0000000005DF0000-0x0000000005DF8000-memory.dmpFilesize
32KB
-
memory/4552-11-0x0000000006D20000-0x0000000006D28000-memory.dmpFilesize
32KB
-
memory/4552-69-0x0000000007780000-0x0000000007812000-memory.dmpFilesize
584KB
-
memory/4552-2-0x00000000057A0000-0x0000000005806000-memory.dmpFilesize
408KB
-
memory/4552-1-0x0000000000BC0000-0x0000000000D52000-memory.dmpFilesize
1.6MB
-
memory/4552-264-0x0000000007130000-0x00000000071E2000-memory.dmpFilesize
712KB
-
memory/4552-266-0x0000000006F30000-0x0000000006F52000-memory.dmpFilesize
136KB
-
memory/4552-267-0x0000000008580000-0x00000000088D7000-memory.dmpFilesize
3.3MB
-
memory/4552-8-0x0000000005DC0000-0x0000000005DE6000-memory.dmpFilesize
152KB
-
memory/4552-279-0x00000000076A0000-0x00000000076AA000-memory.dmpFilesize
40KB
-
memory/4552-280-0x000000007435E000-0x000000007435F000-memory.dmpFilesize
4KB
-
memory/4552-281-0x0000000074350000-0x0000000074B01000-memory.dmpFilesize
7.7MB