Analysis Overview
SHA256
49d8c623abc37dff7af7d7ea15fa66b27504f166b5bf7a2d486c41ce7923a722
Threat Level: Known bad
The file Stealerium.zip was found to be: Known bad.
Malicious Activity Summary
Stealerium
Stealerium family
Unsigned PE
Enumerates physical storage devices
Delays execution with timeout.exe
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-28 15:26
Signatures
Stealerium family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral7
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240508-en
Max time kernel
92s
Max time network
99s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\SixLabors.ImageSharp.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 52.111.227.14:443 | tcp | |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240426-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Builder.exe
"C:\Users\Admin\AppData\Local\Temp\Builder.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:28
Platform
win11-20240508-en
Max time kernel
54s
Max time network
72s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Builder.exe
"C:\Users\Admin\AppData\Local\Temp\Builder.exe"
Network
| Country | Destination | Domain | Proto |
| GB | 2.16.34.98:443 | tcp | |
| US | 8.8.8.8:53 | browser.pipe.aria.microsoft.com | udp |
| US | 20.189.173.8:443 | browser.pipe.aria.microsoft.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| NL | 23.62.61.154:443 | r.bing.com | tcp |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.173.189.20.in-addr.arpa | udp |
Files
memory/3968-0-0x00007FFF7DCFB000-0x00007FFF7DCFC000-memory.dmp
memory/3968-1-0x00007FFF7DCFB000-0x00007FFF7DCFC000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240508-en
Max time kernel
146s
Max time network
149s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Mdb.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
Analysis: behavioral5
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240426-en
Max time kernel
92s
Max time network
94s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Rocks.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240508-en
Max time kernel
89s
Max time network
98s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Pdb.dll,#1
Network
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240508-en
Max time kernel
146s
Max time network
150s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.dll,#1
Network
Files
Analysis: behavioral8
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240426-en
Max time kernel
90s
Max time network
94s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Spectre.Console.ImageSharp.dll,#1
Network
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240426-en
Max time kernel
93s
Max time network
94s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Spectre.Console.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
Analysis: behavioral10
Detonation Overview
Submitted
2024-05-28 15:26
Reported
2024-05-28 15:29
Platform
win11-20240426-en
Max time kernel
90s
Max time network
99s
Command Line
Signatures
Stealerium
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe
"C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp5A93.tmp.bat
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\taskkill.exe
TaskKill /F /IM 4616
C:\Windows\SysWOW64\timeout.exe
Timeout /T 2 /Nobreak
Network
| Country | Destination | Domain | Proto |
| IE | 52.111.236.21:443 | tcp |
Files
memory/4616-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp
memory/4616-1-0x0000000000B90000-0x0000000000D22000-memory.dmp
memory/4616-2-0x0000000005770000-0x00000000057D6000-memory.dmp
memory/4616-3-0x0000000074D70000-0x0000000075521000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp5A93.tmp.bat
| MD5 | 75b1e9263fc7b98d7cd3c0dc513bc3cf |
| SHA1 | ec4dda2156d925cfc03d874464e557c4400d44b9 |
| SHA256 | 5a5ff6683134930d368cfc8ae730a3a1413897a7d309a6b2971e26973b4e4185 |
| SHA512 | 5dff4054b19848b30ce36db35a2699637237ada2d7d922954201bc82970041b3effc5359e842a9a6f092bcfce36c40442b8a5bf9627af957731d0c2f118a2807 |
memory/4616-6-0x0000000074D70000-0x0000000075521000-memory.dmp