Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe
Resource
win10v2004-20240508-en
General
-
Target
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe
-
Size
2.4MB
-
MD5
928ecc7808c79c7a4ca63a1730cee20a
-
SHA1
fb9bedbcb0758af5ec77b248915aba7ab2e3e504
-
SHA256
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302
-
SHA512
ba6656a5c29873d94c25209558a81a33ce7de897cddd35d2a523e61e03845ff4e7bf77b78ae873ad3a393e2216d37dcc6d0a62a6dc260b663cb5b3af2c143ee7
-
SSDEEP
49152:Ph+ZkldoPK8YaQtEZgJcZRmAqbsnqS02N/DZ2dVfYSBR:Y2cPK8c1xAqS9DUvY+
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1257742466048720936/KzD1DlNrf4X-n_3qBCdOf_3XBXbWtKPWsEcuu8mm7843WeDUMw3CKaQQD6estFCo5S2g
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 icanhazip.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2552-11-0x0000000000040000-0x00000000002B7000-memory.dmp autoit_exe behavioral1/memory/2552-17-0x0000000000040000-0x00000000002B7000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exedescription pid process target process PID 2552 set thread context of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ RegSvcs.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RegSvcs.exepid process 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe 2224 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exepid process 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RegSvcs.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2224 RegSvcs.exe Token: SeRestorePrivilege 1856 msiexec.exe Token: SeTakeOwnershipPrivilege 1856 msiexec.exe Token: SeSecurityPrivilege 1856 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exepid process 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exepid process 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2224 RegSvcs.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exeRegSvcs.execmd.execmd.exedescription pid process target process PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2552 wrote to memory of 2224 2552 SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe RegSvcs.exe PID 2224 wrote to memory of 1932 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 1932 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 1932 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 1932 2224 RegSvcs.exe cmd.exe PID 1932 wrote to memory of 688 1932 cmd.exe chcp.com PID 1932 wrote to memory of 688 1932 cmd.exe chcp.com PID 1932 wrote to memory of 688 1932 cmd.exe chcp.com PID 1932 wrote to memory of 688 1932 cmd.exe chcp.com PID 1932 wrote to memory of 1680 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 1680 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 1680 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 1680 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 1652 1932 cmd.exe findstr.exe PID 1932 wrote to memory of 1652 1932 cmd.exe findstr.exe PID 1932 wrote to memory of 1652 1932 cmd.exe findstr.exe PID 1932 wrote to memory of 1652 1932 cmd.exe findstr.exe PID 2224 wrote to memory of 2304 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 2304 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 2304 2224 RegSvcs.exe cmd.exe PID 2224 wrote to memory of 2304 2224 RegSvcs.exe cmd.exe PID 2304 wrote to memory of 1776 2304 cmd.exe chcp.com PID 2304 wrote to memory of 1776 2304 cmd.exe chcp.com PID 2304 wrote to memory of 1776 2304 cmd.exe chcp.com PID 2304 wrote to memory of 1776 2304 cmd.exe chcp.com PID 2304 wrote to memory of 1552 2304 cmd.exe netsh.exe PID 2304 wrote to memory of 1552 2304 cmd.exe netsh.exe PID 2304 wrote to memory of 1552 2304 cmd.exe netsh.exe PID 2304 wrote to memory of 1552 2304 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1410.29083.29061.exe"2⤵
- Accesses Microsoft Outlook profiles
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar4F7E.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\cereclothsFilesize
1.6MB
MD53903ada0ac31eadcf07abac457f50210
SHA1be0a97cc0d5d7fbe85dca85afe57104a6723ea65
SHA2567c98ea94b70e5c7dbc5018d4a88e6a66ac88bb9fd97a8c0afb2c40af5cf4975b
SHA5125fc9fd928471de601f0c7e60b83306deaffe39727cd830db6ddf688e6ec27632c9fd1eeb411568c6fd39dac19efd92c065706d1265f0ce2cc78f31394f97a774
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Browsers\Firefox\Bookmarks.txtFilesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Directories\Startup.txtFilesize
24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\Directories\Videos.txtFilesize
23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\Apps.txtFilesize
4KB
MD5fd02b82baf6e3abbdd9bbe377e0efe70
SHA1a04d62bb870db7892c96ae74a3ac47995fbd8ae5
SHA2568ee42f24a3673b4d4c4eb34b3908da366bcd7f31d41e14b5c5b6f5b53ff3b47d
SHA51295065dc5822df3d16200582705346953004dc0a56bf180e903c8d101612d66fa7c6aa0bd57ac7f59102dd0103e2e078f1af4070367862f86fb726d1a5788a6a5
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\Debug.txtFilesize
1019B
MD5f2594b486ac79ce22217bcbb53becda6
SHA1c5cb72085a17d804621e830bf97dd51803ccea67
SHA256bf3f47334f3d58254aa8a9a5c281e5d64301f3305b9e1241bd494e3b867fed2e
SHA51237fc523eb112e8d30e1dbbdf4258d84356ee110de7029920e4d8abddb23f48f9a74abf91fbf108aa27751535c57187b2f7983b630bed0e72f23c9501cb84853b
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\Admin@UHRQKJCP_en-US\System\ProductKey.txtFilesize
29B
MD5cad6c6bee6c11c88f5e2f69f0be6deb7
SHA1289d74c3bebe6cca4e1d2e084482ad6d21316c84
SHA256dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0
SHA512e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097
-
C:\Users\Admin\AppData\Local\f2425d0145de8917d2f7eb12e25ae957\msgid.datFilesize
19B
MD56f481fc7306424daa8a1a75264c4f5b4
SHA168b3d0ffe423af20fe052f70bfeb36ae5082cfa5
SHA25629583d52bdbab9aaa37fcf8293c6f204e36cbcedf8860f1ca44fa6d1425cb137
SHA51249da4b002b2524252519938c11a0b9e8107f995ce8444eb943f5e5524f58a6142990150c10547c52dcfe3692758faf13666888841c62105e769a6dc7d424d184
-
memory/2224-19-0x0000000074000000-0x00000000746EE000-memory.dmpFilesize
6.9MB
-
memory/2224-184-0x0000000005DE0000-0x0000000005E5A000-memory.dmpFilesize
488KB
-
memory/2224-23-0x00000000003D0000-0x00000000003F6000-memory.dmpFilesize
152KB
-
memory/2224-62-0x0000000000B80000-0x0000000000B8A000-memory.dmpFilesize
40KB
-
memory/2224-63-0x0000000002190000-0x0000000002198000-memory.dmpFilesize
32KB
-
memory/2224-64-0x00000000021A0000-0x00000000021A8000-memory.dmpFilesize
32KB
-
memory/2224-65-0x00000000021F0000-0x000000000220E000-memory.dmpFilesize
120KB
-
memory/2224-22-0x0000000002250000-0x00000000022E2000-memory.dmpFilesize
584KB
-
memory/2224-18-0x000000007400E000-0x000000007400F000-memory.dmpFilesize
4KB
-
memory/2224-24-0x0000000000380000-0x0000000000388000-memory.dmpFilesize
32KB
-
memory/2224-12-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/2224-15-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/2224-16-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/2224-263-0x0000000074000000-0x00000000746EE000-memory.dmpFilesize
6.9MB
-
memory/2224-248-0x0000000006C30000-0x0000000006CE2000-memory.dmpFilesize
712KB
-
memory/2224-262-0x000000007400E000-0x000000007400F000-memory.dmpFilesize
4KB
-
memory/2552-11-0x0000000000040000-0x00000000002B7000-memory.dmpFilesize
2.5MB
-
memory/2552-17-0x0000000000040000-0x00000000002B7000-memory.dmpFilesize
2.5MB