Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 08:36
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
stub.exe
Resource
win10v2004-20240226-en
General
-
Target
stub.exe
-
Size
1.6MB
-
MD5
6627adf7167ee571e8fd6c8b1a0e8ae3
-
SHA1
03b9112660ee73c59d84e219f15bf24ae9df48db
-
SHA256
6c5935bcddaa1d4f809487f66db758e892cc0a7fd7704d138904bc879644ea1f
-
SHA512
e05896a6e0d09d4dafeb2467395ca06ae1e728a4aa079041dea82940caeb71646984604fdeea482748423b10257b8462db4f573682f9f719939143fdb5691c60
-
SSDEEP
49152:19Tq24GjdGSiqkqXfd+/9AqYanieKd0U:1YEjdGSiqkqXf0FLYW
Malware Config
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2704 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2656 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
stub.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2772 stub.exe Token: SeDebugPrivilege 2656 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
stub.execmd.exedescription pid process target process PID 2772 wrote to memory of 2664 2772 stub.exe cmd.exe PID 2772 wrote to memory of 2664 2772 stub.exe cmd.exe PID 2772 wrote to memory of 2664 2772 stub.exe cmd.exe PID 2772 wrote to memory of 2664 2772 stub.exe cmd.exe PID 2664 wrote to memory of 2716 2664 cmd.exe chcp.com PID 2664 wrote to memory of 2716 2664 cmd.exe chcp.com PID 2664 wrote to memory of 2716 2664 cmd.exe chcp.com PID 2664 wrote to memory of 2716 2664 cmd.exe chcp.com PID 2664 wrote to memory of 2656 2664 cmd.exe taskkill.exe PID 2664 wrote to memory of 2656 2664 cmd.exe taskkill.exe PID 2664 wrote to memory of 2656 2664 cmd.exe taskkill.exe PID 2664 wrote to memory of 2656 2664 cmd.exe taskkill.exe PID 2664 wrote to memory of 2704 2664 cmd.exe timeout.exe PID 2664 wrote to memory of 2704 2664 cmd.exe timeout.exe PID 2664 wrote to memory of 2704 2664 cmd.exe timeout.exe PID 2664 wrote to memory of 2704 2664 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 27723⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.batFilesize
57B
MD53e8058bc4ef5d56509802a3011fb6b03
SHA1b14cd46cbd1f4c04ffc0b86afdae7c73acbacb07
SHA25672484263b9d69f5beb124db722e2b2fecf62b913645fd395ed1cd34544e2631a
SHA512e4a732777b5bdd3a9bdd121343a0af6c85c90c5cfe850600ff05fdbfdc1a3f1eafda985e3b816f9f7cbd29b0c7af121fcf571a0f952c0ebcbd7a478564351413
-
memory/2772-0-0x0000000074A3E000-0x0000000074A3F000-memory.dmpFilesize
4KB
-
memory/2772-1-0x0000000001180000-0x0000000001312000-memory.dmpFilesize
1.6MB
-
memory/2772-2-0x0000000074A30000-0x000000007511E000-memory.dmpFilesize
6.9MB
-
memory/2772-5-0x0000000074A30000-0x000000007511E000-memory.dmpFilesize
6.9MB