Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 08:07

General

  • Target

    build.exe

  • Size

    1.6MB

  • MD5

    2b295d7ed694fd5f8d154e2809dde5c7

  • SHA1

    8fe4226bfd0795bc92ad62a518e1c5313a1063c2

  • SHA256

    ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335

  • SHA512

    f1cc93b2bd0d56c604dd601dc34a5152382b553e847d08fedc48f08ad1badfdd7dace981e2e1837db2bda22f3b3f1be2269047ddd40a591b29a2fe1b876c8d43

  • SSDEEP

    49152:skTq24GjdGSiqkqXfd+/9AqYanieKds1:s1EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1246735852525326437/GcTg3JPGVTvvvYi6IMfM_bflcLd6mmUk7zrqDc3jqVTKiN4-XEedjVbl6jUHpWD6Vdzi

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    "C:\Users\Admin\AppData\Local\Temp\build.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:1448
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:1364
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:2496
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:2264
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:2364
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1784

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Defense Evasion

            Subvert Trust Controls

            1
            T1553

            Install Root Certificate

            1
            T1553.004

            Modify Registry

            1
            T1112

            Credential Access

            Unsecured Credentials

            1
            T1552

            Credentials In Files

            1
            T1552.001

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            1
            T1082

            Collection

            Data from Local System

            1
            T1005

            Email Collection

            1
            T1114

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Browsers\Firefox\Bookmarks.txt
              Filesize

              105B

              MD5

              2e9d094dda5cdc3ce6519f75943a4ff4

              SHA1

              5d989b4ac8b699781681fe75ed9ef98191a5096c

              SHA256

              c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

              SHA512

              d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Directories\Startup.txt
              Filesize

              24B

              MD5

              68c93da4981d591704cea7b71cebfb97

              SHA1

              fd0f8d97463cd33892cc828b4ad04e03fc014fa6

              SHA256

              889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

              SHA512

              63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Directories\Videos.txt
              Filesize

              23B

              MD5

              1fddbf1169b6c75898b86e7e24bc7c1f

              SHA1

              d2091060cb5191ff70eb99c0088c182e80c20f8c

              SHA256

              a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

              SHA512

              20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Apps.txt
              Filesize

              3KB

              MD5

              b173019088ba4cde13291683c8e7c624

              SHA1

              dff6764a3cd641354b680babbb09529ee35887ce

              SHA256

              77859b81479722a99a1cfab715293876be72553937e7619d6a51289c2baacfc9

              SHA512

              36f24ea1f2fb56fd2cbfaaa93981631a9857844fd10e2b9f4e101b670f20594870137a027ee6d459d4407a7d6faa32638446c7bdec1ede2720151a52be06468f

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Apps.txt
              Filesize

              4KB

              MD5

              8cedaf00301787754db85a5903b0db25

              SHA1

              4a782092d6c7a7d37c27406f2a980bcf3d42c9d2

              SHA256

              79e2f3febc2285be1c893472765f1ef31453fd8052096c0db87b0dd26210e6b9

              SHA512

              4ca2a1fd7db78824a49a529fe86b4bd0271bb8270ad9b8078416b21134e7667100028168ef150d34666f0f3f6a702774708b0256a07b55cd09aca5e740d5b368

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Debug.txt
              Filesize

              1KB

              MD5

              f45682a9dc64b1667474ac7519c17ff9

              SHA1

              018dfe7ef4dd0e749b212921affbf83036746cda

              SHA256

              ae72f8e3f9b1b67ebbc58b15d0a534fea640787e2819dcbb705c6e6e3b1948cf

              SHA512

              e005392a9b5d7a0a40a824b1f1c7614e0405128945af48cbf0cbacdd76521cedd7f5dfb06efe52f6491e4771a5c9eccf0209a10bf855dbedbef3a070f359d8f3

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\ProductKey.txt
              Filesize

              29B

              MD5

              cad6c6bee6c11c88f5e2f69f0be6deb7

              SHA1

              289d74c3bebe6cca4e1d2e084482ad6d21316c84

              SHA256

              dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0

              SHA512

              e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097

            • C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\msgid.dat
              Filesize

              19B

              MD5

              54bbe2d8a8e6bc31c51f7c15876d1b0c

              SHA1

              d3914a5cced5d2375fc83ca7c673282d63a9e759

              SHA256

              6934cb5d0f50104a28ad8e135601855c1dedc58c882e292aa4d9e3e40db341ae

              SHA512

              0c20aa44ea1291c38df71c2b7676bba31d29037ae0d2bbaa3114958910930124a403fe3e4c098bddc5736e2e5ab8cc86b4834362dd2dd00a77ac7487e600b56b

            • C:\Users\Admin\AppData\Local\Temp\Tar4B4A.tmp
              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • memory/2212-8-0x0000000000600000-0x0000000000608000-memory.dmp
              Filesize

              32KB

            • memory/2212-48-0x0000000002160000-0x000000000217E000-memory.dmp
              Filesize

              120KB

            • memory/2212-47-0x0000000000800000-0x0000000000808000-memory.dmp
              Filesize

              32KB

            • memory/2212-166-0x0000000005FC0000-0x000000000603A000-memory.dmp
              Filesize

              488KB

            • memory/2212-46-0x00000000007F0000-0x00000000007FA000-memory.dmp
              Filesize

              40KB

            • memory/2212-0-0x00000000747BE000-0x00000000747BF000-memory.dmp
              Filesize

              4KB

            • memory/2212-7-0x0000000000620000-0x0000000000646000-memory.dmp
              Filesize

              152KB

            • memory/2212-6-0x0000000005940000-0x00000000059D2000-memory.dmp
              Filesize

              584KB

            • memory/2212-2-0x00000000747B0000-0x0000000074E9E000-memory.dmp
              Filesize

              6.9MB

            • memory/2212-230-0x0000000006180000-0x0000000006232000-memory.dmp
              Filesize

              712KB

            • memory/2212-233-0x00000000747BE000-0x00000000747BF000-memory.dmp
              Filesize

              4KB

            • memory/2212-234-0x00000000747B0000-0x0000000074E9E000-memory.dmp
              Filesize

              6.9MB

            • memory/2212-1-0x0000000000120000-0x00000000002B2000-memory.dmp
              Filesize

              1.6MB