Analysis Overview
SHA256
d909f5519de499c7329a54e007ec94cf45d304e9fb17daaf7ee3cdf43675691c
Threat Level: Known bad
The file stub.exe was found to be: Known bad.
Malicious Activity Summary
Stealerium family
Stealerium
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Delays execution with timeout.exe
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-29 16:04
Signatures
Stealerium family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-29 16:04
Reported
2024-06-29 16:49
Platform
win11-20240611-en
Max time kernel
1477s
Max time network
2617s
Command Line
Signatures
Stealerium
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\stub.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\stub.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\stub.exe
"C:\Users\Admin\AppData\Local\Temp\stub.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB805.tmp.bat
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\taskkill.exe
TaskKill /F /IM 2948
C:\Windows\SysWOW64\timeout.exe
Timeout /T 2 /Nobreak
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
Files
memory/2948-0-0x0000000074C0E000-0x0000000074C0F000-memory.dmp
memory/2948-1-0x0000000000840000-0x00000000009D6000-memory.dmp
memory/2948-2-0x0000000005440000-0x00000000054A6000-memory.dmp
memory/2948-3-0x0000000074C00000-0x00000000753B1000-memory.dmp
memory/2948-7-0x0000000005A90000-0x0000000005B22000-memory.dmp
memory/2948-9-0x0000000005B70000-0x0000000005B78000-memory.dmp
memory/2948-8-0x0000000005B20000-0x0000000005B46000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpB805.tmp.bat
| MD5 | 69a8726e7291fc5ee256d91699037655 |
| SHA1 | bfe3e11c0875cf718c2589f68eb72316bfa2f86b |
| SHA256 | d0bdd98b0078e2ccaaf60bfa60ac3f1eec12eeb5809befd70f148234a1140d73 |
| SHA512 | 72621e9a3308ca8f04edc806dd7f8ac247ee060ad47f5d4a276f0e4f7ca35cb6e3846e94804450fbdc1f815703d43b8c5e40da6fd9658ea99850f5832288e49a |
memory/2948-14-0x0000000074C00000-0x00000000753B1000-memory.dmp
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
| MD5 | 9a7af7f1f08f7de9da3ba647286ee5a6 |
| SHA1 | d7a23961ba5f8c4242a03f20686ff516c2ae432c |
| SHA256 | dddc3d322b46ec53927c26326a4f4d573dec131fbe668450f984c91c3104a08b |
| SHA512 | 64b0d94e68aa2d0ee9d02f170de6989f5255c5c57d05dffbf4dbbe012dae43a6f4dbd59c6a85fd2621fb84ae7f4cdf486a089b90e3e6c4fce1b152ba5aa6ba58 |
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
| MD5 | 35745802ec2865acb4c60e651e5a8620 |
| SHA1 | f10c746a71c2741790aa3f5160ea7d9be1a1920a |
| SHA256 | ef386e977e9fcfc811f2710d0d630e23e2278cf9811770da0c2f10f3965b7a63 |
| SHA512 | 0031f739cafa1089dc655a3509bc215fc900c20734507a1b0b69f1ad1567fb2fe4af725360cf952a4689e89973bbd59a53ea6ff8bd6c4c67b9e732f66f14a42f |