Analysis Overview
SHA256
49d8c623abc37dff7af7d7ea15fa66b27504f166b5bf7a2d486c41ce7923a722
Threat Level: Known bad
The file Stealerium.zip was found to be: Known bad.
Malicious Activity Summary
Stealerium family
Stealerium
Enumerates physical storage devices
Unsigned PE
Delays execution with timeout.exe
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-30 18:37
Signatures
Stealerium family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
456s
Max time network
458s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Builder.exe
"C:\Users\Admin\AppData\Local\Temp\Builder.exe"
Network
| Country | Destination | Domain | Proto |
| IE | 52.111.236.22:443 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
457s
Max time network
462s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Pdb.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 52.111.227.13:443 | tcp | |
| US | 8.8.8.8:53 | 54.120.234.20.in-addr.arpa | udp |
Files
Analysis: behavioral5
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
454s
Max time network
489s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Rocks.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 52.111.227.13:443 | tcp | |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
453s
Max time network
485s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 54.120.234.20.in-addr.arpa | udp |
Files
Analysis: behavioral8
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240508-en
Max time kernel
455s
Max time network
495s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Spectre.Console.ImageSharp.dll,#1
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240508-en
Max time kernel
500s
Max time network
509s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Builder.exe
"C:\Users\Admin\AppData\Local\Temp\Builder.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/2088-0-0x00007FFD12BDB000-0x00007FFD12BDC000-memory.dmp
memory/2088-1-0x00007FFD12BDB000-0x00007FFD12BDC000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
453s
Max time network
455s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Mono.Cecil.Mdb.dll,#1
Network
Files
Analysis: behavioral7
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240611-en
Max time kernel
455s
Max time network
459s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\SixLabors.ImageSharp.dll,#1
Network
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240508-en
Max time kernel
450s
Max time network
493s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Spectre.Console.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 52.111.229.43:443 | tcp |
Files
Analysis: behavioral10
Detonation Overview
Submitted
2024-06-30 18:37
Reported
2024-06-30 18:56
Platform
win11-20240508-en
Max time kernel
560s
Max time network
569s
Command Line
Signatures
Stealerium
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe
"C:\Users\Admin\AppData\Local\Temp\Stub\stub.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7B98.tmp.bat
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\taskkill.exe
TaskKill /F /IM 1056
C:\Windows\SysWOW64\timeout.exe
Timeout /T 2 /Nobreak
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/1056-0-0x0000000074DEE000-0x0000000074DEF000-memory.dmp
memory/1056-1-0x0000000000B30000-0x0000000000CC2000-memory.dmp
memory/1056-2-0x0000000005720000-0x0000000005786000-memory.dmp
memory/1056-3-0x0000000074DE0000-0x0000000075591000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp7B98.tmp.bat
| MD5 | 88f7793d83cef52cd3fc9bb4397f02f4 |
| SHA1 | 7b247742b2533d2f857665581a9b8fe88c59acdf |
| SHA256 | 0df40d47d8775ceaf3e63a908a25a4d9b2d04201d1cb1e8c9796450b3fb92c02 |
| SHA512 | de97e6aaa5e27c92bf4fd65e1a57cb1e755c8a4988b9c6445ae9f22a4b2ca3da035198d97af384f9c70a413f37073ea11245626857d3d852e431a5411311cca0 |
memory/1056-6-0x0000000074DE0000-0x0000000075591000-memory.dmp