Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 08:07
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240426-en
General
-
Target
build.exe
-
Size
1.6MB
-
MD5
2b295d7ed694fd5f8d154e2809dde5c7
-
SHA1
8fe4226bfd0795bc92ad62a518e1c5313a1063c2
-
SHA256
ccf5a47144d4d2e99d2cb7fa4d620c18422e1a85da05ed46f2f574cd671cc335
-
SHA512
f1cc93b2bd0d56c604dd601dc34a5152382b553e847d08fedc48f08ad1badfdd7dace981e2e1837db2bda22f3b3f1be2269047ddd40a591b29a2fe1b876c8d43
-
SSDEEP
49152:skTq24GjdGSiqkqXfd+/9AqYanieKds1:s1EjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1246735852525326437/GcTg3JPGVTvvvYi6IMfM_bflcLd6mmUk7zrqDc3jqVTKiN4-XEedjVbl6jUHpWD6Vdzi
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 icanhazip.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build.exe -
Processes:
build.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 build.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 build.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 build.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 build.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
build.exepid process 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe 2212 build.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
build.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2212 build.exe Token: SeRestorePrivilege 1784 msiexec.exe Token: SeTakeOwnershipPrivilege 1784 msiexec.exe Token: SeSecurityPrivilege 1784 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
build.exepid process 2212 build.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
build.execmd.execmd.exedescription pid process target process PID 2212 wrote to memory of 1668 2212 build.exe cmd.exe PID 2212 wrote to memory of 1668 2212 build.exe cmd.exe PID 2212 wrote to memory of 1668 2212 build.exe cmd.exe PID 2212 wrote to memory of 1668 2212 build.exe cmd.exe PID 1668 wrote to memory of 1448 1668 cmd.exe chcp.com PID 1668 wrote to memory of 1448 1668 cmd.exe chcp.com PID 1668 wrote to memory of 1448 1668 cmd.exe chcp.com PID 1668 wrote to memory of 1448 1668 cmd.exe chcp.com PID 1668 wrote to memory of 1364 1668 cmd.exe netsh.exe PID 1668 wrote to memory of 1364 1668 cmd.exe netsh.exe PID 1668 wrote to memory of 1364 1668 cmd.exe netsh.exe PID 1668 wrote to memory of 1364 1668 cmd.exe netsh.exe PID 1668 wrote to memory of 2496 1668 cmd.exe findstr.exe PID 1668 wrote to memory of 2496 1668 cmd.exe findstr.exe PID 1668 wrote to memory of 2496 1668 cmd.exe findstr.exe PID 1668 wrote to memory of 2496 1668 cmd.exe findstr.exe PID 2212 wrote to memory of 1772 2212 build.exe cmd.exe PID 2212 wrote to memory of 1772 2212 build.exe cmd.exe PID 2212 wrote to memory of 1772 2212 build.exe cmd.exe PID 2212 wrote to memory of 1772 2212 build.exe cmd.exe PID 1772 wrote to memory of 2264 1772 cmd.exe chcp.com PID 1772 wrote to memory of 2264 1772 cmd.exe chcp.com PID 1772 wrote to memory of 2264 1772 cmd.exe chcp.com PID 1772 wrote to memory of 2264 1772 cmd.exe chcp.com PID 1772 wrote to memory of 2364 1772 cmd.exe netsh.exe PID 1772 wrote to memory of 2364 1772 cmd.exe netsh.exe PID 1772 wrote to memory of 2364 1772 cmd.exe netsh.exe PID 1772 wrote to memory of 2364 1772 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
outlook_win_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Browsers\Firefox\Bookmarks.txtFilesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Directories\Startup.txtFilesize
24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\Directories\Videos.txtFilesize
23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Apps.txtFilesize
3KB
MD5b173019088ba4cde13291683c8e7c624
SHA1dff6764a3cd641354b680babbb09529ee35887ce
SHA25677859b81479722a99a1cfab715293876be72553937e7619d6a51289c2baacfc9
SHA51236f24ea1f2fb56fd2cbfaaa93981631a9857844fd10e2b9f4e101b670f20594870137a027ee6d459d4407a7d6faa32638446c7bdec1ede2720151a52be06468f
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Apps.txtFilesize
4KB
MD58cedaf00301787754db85a5903b0db25
SHA14a782092d6c7a7d37c27406f2a980bcf3d42c9d2
SHA25679e2f3febc2285be1c893472765f1ef31453fd8052096c0db87b0dd26210e6b9
SHA5124ca2a1fd7db78824a49a529fe86b4bd0271bb8270ad9b8078416b21134e7667100028168ef150d34666f0f3f6a702774708b0256a07b55cd09aca5e740d5b368
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\Debug.txtFilesize
1KB
MD5f45682a9dc64b1667474ac7519c17ff9
SHA1018dfe7ef4dd0e749b212921affbf83036746cda
SHA256ae72f8e3f9b1b67ebbc58b15d0a534fea640787e2819dcbb705c6e6e3b1948cf
SHA512e005392a9b5d7a0a40a824b1f1c7614e0405128945af48cbf0cbacdd76521cedd7f5dfb06efe52f6491e4771a5c9eccf0209a10bf855dbedbef3a070f359d8f3
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\Admin@GHPZRGFC_en-US\System\ProductKey.txtFilesize
29B
MD5cad6c6bee6c11c88f5e2f69f0be6deb7
SHA1289d74c3bebe6cca4e1d2e084482ad6d21316c84
SHA256dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0
SHA512e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097
-
C:\Users\Admin\AppData\Local\5d9210ec411ffaf5262729c35de6754d\msgid.datFilesize
19B
MD554bbe2d8a8e6bc31c51f7c15876d1b0c
SHA1d3914a5cced5d2375fc83ca7c673282d63a9e759
SHA2566934cb5d0f50104a28ad8e135601855c1dedc58c882e292aa4d9e3e40db341ae
SHA5120c20aa44ea1291c38df71c2b7676bba31d29037ae0d2bbaa3114958910930124a403fe3e4c098bddc5736e2e5ab8cc86b4834362dd2dd00a77ac7487e600b56b
-
C:\Users\Admin\AppData\Local\Temp\Tar4B4A.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2212-8-0x0000000000600000-0x0000000000608000-memory.dmpFilesize
32KB
-
memory/2212-48-0x0000000002160000-0x000000000217E000-memory.dmpFilesize
120KB
-
memory/2212-47-0x0000000000800000-0x0000000000808000-memory.dmpFilesize
32KB
-
memory/2212-166-0x0000000005FC0000-0x000000000603A000-memory.dmpFilesize
488KB
-
memory/2212-46-0x00000000007F0000-0x00000000007FA000-memory.dmpFilesize
40KB
-
memory/2212-0-0x00000000747BE000-0x00000000747BF000-memory.dmpFilesize
4KB
-
memory/2212-7-0x0000000000620000-0x0000000000646000-memory.dmpFilesize
152KB
-
memory/2212-6-0x0000000005940000-0x00000000059D2000-memory.dmpFilesize
584KB
-
memory/2212-2-0x00000000747B0000-0x0000000074E9E000-memory.dmpFilesize
6.9MB
-
memory/2212-230-0x0000000006180000-0x0000000006232000-memory.dmpFilesize
712KB
-
memory/2212-233-0x00000000747BE000-0x00000000747BF000-memory.dmpFilesize
4KB
-
memory/2212-234-0x00000000747B0000-0x0000000074E9E000-memory.dmpFilesize
6.9MB
-
memory/2212-1-0x0000000000120000-0x00000000002B2000-memory.dmpFilesize
1.6MB