Analysis

  • max time kernel
    148s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 13:15

General

  • Target

    SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe

  • Size

    2.4MB

  • MD5

    928ecc7808c79c7a4ca63a1730cee20a

  • SHA1

    fb9bedbcb0758af5ec77b248915aba7ab2e3e504

  • SHA256

    a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302

  • SHA512

    ba6656a5c29873d94c25209558a81a33ce7de897cddd35d2a523e61e03845ff4e7bf77b78ae873ad3a393e2216d37dcc6d0a62a6dc260b663cb5b3af2c143ee7

  • SSDEEP

    49152:Ph+ZkldoPK8YaQtEZgJcZRmAqbsnqS02N/DZ2dVfYSBR:Y2cPK8c1xAqS9DUvY+

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1257742466048720936/KzD1DlNrf4X-n_3qBCdOf_3XBXbWtKPWsEcuu8mm7843WeDUMw3CKaQQD6estFCo5S2g

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:2224
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:688
          • C:\Windows\SysWOW64\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            PID:1680
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            4⤵
              PID:1652
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              4⤵
                PID:1776
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show networks mode=bssid
                4⤵
                • Event Triggered Execution: Netsh Helper DLL
                PID:1552
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1856

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Event Triggered Execution

        1
        T1546

        Netsh Helper DLL

        1
        T1546.007

        Privilege Escalation

        Event Triggered Execution

        1
        T1546

        Netsh Helper DLL

        1
        T1546.007

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        1
        T1082

        Collection

        Email Collection

        1
        T1114

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar4F7E.tmp
          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\cerecloths
          Filesize

          1.6MB

          MD5

          3903ada0ac31eadcf07abac457f50210

          SHA1

          be0a97cc0d5d7fbe85dca85afe57104a6723ea65

          SHA256

          7c98ea94b70e5c7dbc5018d4a88e6a66ac88bb9fd97a8c0afb2c40af5cf4975b

          SHA512

          5fc9fd928471de601f0c7e60b83306deaffe39727cd830db6ddf688e6ec27632c9fd1eeb411568c6fd39dac19efd92c065706d1265f0ce2cc78f31394f97a774

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Browsers\Firefox\Bookmarks.txt
          Filesize

          105B

          MD5

          2e9d094dda5cdc3ce6519f75943a4ff4

          SHA1

          5d989b4ac8b699781681fe75ed9ef98191a5096c

          SHA256

          c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

          SHA512

          d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Directories\Startup.txt
          Filesize

          24B

          MD5

          68c93da4981d591704cea7b71cebfb97

          SHA1

          fd0f8d97463cd33892cc828b4ad04e03fc014fa6

          SHA256

          889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

          SHA512

          63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Directories\Videos.txt
          Filesize

          23B

          MD5

          1fddbf1169b6c75898b86e7e24bc7c1f

          SHA1

          d2091060cb5191ff70eb99c0088c182e80c20f8c

          SHA256

          a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

          SHA512

          20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\Apps.txt
          Filesize

          4KB

          MD5

          fd02b82baf6e3abbdd9bbe377e0efe70

          SHA1

          a04d62bb870db7892c96ae74a3ac47995fbd8ae5

          SHA256

          8ee42f24a3673b4d4c4eb34b3908da366bcd7f31d41e14b5c5b6f5b53ff3b47d

          SHA512

          95065dc5822df3d16200582705346953004dc0a56bf180e903c8d101612d66fa7c6aa0bd57ac7f59102dd0103e2e078f1af4070367862f86fb726d1a5788a6a5

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\Debug.txt
          Filesize

          1019B

          MD5

          f2594b486ac79ce22217bcbb53becda6

          SHA1

          c5cb72085a17d804621e830bf97dd51803ccea67

          SHA256

          bf3f47334f3d58254aa8a9a5c281e5d64301f3305b9e1241bd494e3b867fed2e

          SHA512

          37fc523eb112e8d30e1dbbdf4258d84356ee110de7029920e4d8abddb23f48f9a74abf91fbf108aa27751535c57187b2f7983b630bed0e72f23c9501cb84853b

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\ProductKey.txt
          Filesize

          29B

          MD5

          cad6c6bee6c11c88f5e2f69f0be6deb7

          SHA1

          289d74c3bebe6cca4e1d2e084482ad6d21316c84

          SHA256

          dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0

          SHA512

          e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097

        • C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\msgid.dat
          Filesize

          19B

          MD5

          6f481fc7306424daa8a1a75264c4f5b4

          SHA1

          68b3d0ffe423af20fe052f70bfeb36ae5082cfa5

          SHA256

          29583d52bdbab9aaa37fcf8293c6f204e36cbcedf8860f1ca44fa6d1425cb137

          SHA512

          49da4b002b2524252519938c11a0b9e8107f995ce8444eb943f5e5524f58a6142990150c10547c52dcfe3692758faf13666888841c62105e769a6dc7d424d184

        • memory/2224-19-0x0000000074000000-0x00000000746EE000-memory.dmp
          Filesize

          6.9MB

        • memory/2224-184-0x0000000005DE0000-0x0000000005E5A000-memory.dmp
          Filesize

          488KB

        • memory/2224-23-0x00000000003D0000-0x00000000003F6000-memory.dmp
          Filesize

          152KB

        • memory/2224-62-0x0000000000B80000-0x0000000000B8A000-memory.dmp
          Filesize

          40KB

        • memory/2224-63-0x0000000002190000-0x0000000002198000-memory.dmp
          Filesize

          32KB

        • memory/2224-64-0x00000000021A0000-0x00000000021A8000-memory.dmp
          Filesize

          32KB

        • memory/2224-65-0x00000000021F0000-0x000000000220E000-memory.dmp
          Filesize

          120KB

        • memory/2224-22-0x0000000002250000-0x00000000022E2000-memory.dmp
          Filesize

          584KB

        • memory/2224-18-0x000000007400E000-0x000000007400F000-memory.dmp
          Filesize

          4KB

        • memory/2224-24-0x0000000000380000-0x0000000000388000-memory.dmp
          Filesize

          32KB

        • memory/2224-12-0x0000000000400000-0x0000000000594000-memory.dmp
          Filesize

          1.6MB

        • memory/2224-15-0x0000000000400000-0x0000000000594000-memory.dmp
          Filesize

          1.6MB

        • memory/2224-16-0x0000000000400000-0x0000000000594000-memory.dmp
          Filesize

          1.6MB

        • memory/2224-263-0x0000000074000000-0x00000000746EE000-memory.dmp
          Filesize

          6.9MB

        • memory/2224-248-0x0000000006C30000-0x0000000006CE2000-memory.dmp
          Filesize

          712KB

        • memory/2224-262-0x000000007400E000-0x000000007400F000-memory.dmp
          Filesize

          4KB

        • memory/2552-11-0x0000000000040000-0x00000000002B7000-memory.dmp
          Filesize

          2.5MB

        • memory/2552-17-0x0000000000040000-0x00000000002B7000-memory.dmp
          Filesize

          2.5MB