Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 08:12
Behavioral task
behavioral1
Sample
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe
Resource
win10v2004-20240226-en
General
-
Target
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe
-
Size
1.6MB
-
MD5
2b295d7ed694fd5f8d154e2809dde5c7
-
SHA1
8fe4226bfd0795bc92ad62a518e1c5313a1063c2
-
SHA256
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335
-
SHA512
f1cc93b2bd0d56c604dd601dc34a5152382b553e847d08fedc48f08ad1badfdd7dace981e2e1837db2bda22f3b3f1be2269047ddd40a591b29a2fe1b876c8d43
-
SSDEEP
49152:skTq24GjdGSiqkqXfd+/9AqYanieKds1:s1EjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1246735852525326437/GcTg3JPGVTvvvYi6IMfM_bflcLd6mmUk7zrqDc3jqVTKiN4-XEedjVbl6jUHpWD6Vdzi
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1688 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4468 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exepid process 2380 ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2380 ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe Token: SeDebugPrivilege 4468 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.execmd.exedescription pid process target process PID 2380 wrote to memory of 1776 2380 ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe cmd.exe PID 2380 wrote to memory of 1776 2380 ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe cmd.exe PID 2380 wrote to memory of 1776 2380 ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe cmd.exe PID 1776 wrote to memory of 4748 1776 cmd.exe chcp.com PID 1776 wrote to memory of 4748 1776 cmd.exe chcp.com PID 1776 wrote to memory of 4748 1776 cmd.exe chcp.com PID 1776 wrote to memory of 4468 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 4468 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 4468 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 1688 1776 cmd.exe timeout.exe PID 1776 wrote to memory of 1688 1776 cmd.exe timeout.exe PID 1776 wrote to memory of 1688 1776 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe"C:\Users\Admin\AppData\Local\Temp\ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4F54.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 23803⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4F54.tmp.batFilesize
57B
MD5fdf252f6b55aefd68e5deac55baa4cb2
SHA1ee94e8696ea7c6516ce7503a73f63b7063bfdde0
SHA256b05fa4c1269970c64684264cbe2d6cc1be7d35981da47ae6d2204996374bbe33
SHA512fcee7f26a04074b95fc9148bcafbd247173743f38b01101ec6cb0705cafb1382986ac1f643d3c885f1738b5c498f858d6821b9691adbe07350e0bf226eea1cb8
-
memory/2380-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmpFilesize
4KB
-
memory/2380-1-0x00000000007A0000-0x0000000000932000-memory.dmpFilesize
1.6MB
-
memory/2380-2-0x0000000005320000-0x0000000005386000-memory.dmpFilesize
408KB
-
memory/2380-3-0x0000000074CB0000-0x0000000075460000-memory.dmpFilesize
7.7MB
-
memory/2380-7-0x0000000005B50000-0x0000000005BE2000-memory.dmpFilesize
584KB
-
memory/2380-8-0x0000000005BE0000-0x0000000005C06000-memory.dmpFilesize
152KB
-
memory/2380-9-0x0000000005C10000-0x0000000005C18000-memory.dmpFilesize
32KB
-
memory/2380-14-0x0000000074CB0000-0x0000000075460000-memory.dmpFilesize
7.7MB