Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 18:37

General

  • Target

    a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe

  • Size

    2.4MB

  • MD5

    928ecc7808c79c7a4ca63a1730cee20a

  • SHA1

    fb9bedbcb0758af5ec77b248915aba7ab2e3e504

  • SHA256

    a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302

  • SHA512

    ba6656a5c29873d94c25209558a81a33ce7de897cddd35d2a523e61e03845ff4e7bf77b78ae873ad3a393e2216d37dcc6d0a62a6dc260b663cb5b3af2c143ee7

  • SSDEEP

    49152:Ph+ZkldoPK8YaQtEZgJcZRmAqbsnqS02N/DZ2dVfYSBR:Y2cPK8c1xAqS9DUvY+

Score
10/10

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1257742466048720936/KzD1DlNrf4X-n_3qBCdOf_3XBXbWtKPWsEcuu8mm7843WeDUMw3CKaQQD6estFCo5S2g

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe
    "C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpBCA3.tmp.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:1808
          • C:\Windows\SysWOW64\taskkill.exe
            TaskKill /F /IM 1824
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1816
          • C:\Windows\SysWOW64\timeout.exe
            Timeout /T 2 /Nobreak
            4⤵
            • Delays execution with timeout.exe
            PID:1120

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabBB27.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarBB39.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\cerecloths
      Filesize

      1.6MB

      MD5

      3903ada0ac31eadcf07abac457f50210

      SHA1

      be0a97cc0d5d7fbe85dca85afe57104a6723ea65

      SHA256

      7c98ea94b70e5c7dbc5018d4a88e6a66ac88bb9fd97a8c0afb2c40af5cf4975b

      SHA512

      5fc9fd928471de601f0c7e60b83306deaffe39727cd830db6ddf688e6ec27632c9fd1eeb411568c6fd39dac19efd92c065706d1265f0ce2cc78f31394f97a774

    • C:\Users\Admin\AppData\Local\Temp\tmpBCA3.tmp.bat
      Filesize

      57B

      MD5

      50020e4a79b189d13818b80d87b0b1b5

      SHA1

      3d0fa930f254a576fd1df865f8da61c131450848

      SHA256

      d7ca7e17043dbd4821e97437b3e9254b6d60ad03d395e348ae1097646fbd0a57

      SHA512

      eabbe7229b7e414674d64e9f511292170048a4ea87d74f33890e8cdfc62cac62c35f15496491d9ced28a0c5c4bcbcbf66fca60dde51bfbce482f0a9c35667a73

    • memory/1824-18-0x0000000073D70000-0x000000007445E000-memory.dmp
      Filesize

      6.9MB

    • memory/1824-17-0x0000000073D7E000-0x0000000073D7F000-memory.dmp
      Filesize

      4KB

    • memory/1824-16-0x0000000000400000-0x0000000000594000-memory.dmp
      Filesize

      1.6MB

    • memory/1824-21-0x0000000002110000-0x00000000021A2000-memory.dmp
      Filesize

      584KB

    • memory/1824-22-0x0000000000C20000-0x0000000000C46000-memory.dmp
      Filesize

      152KB

    • memory/1824-23-0x00000000005E0000-0x00000000005E8000-memory.dmp
      Filesize

      32KB

    • memory/1824-15-0x0000000000400000-0x0000000000594000-memory.dmp
      Filesize

      1.6MB

    • memory/1824-12-0x0000000000400000-0x0000000000594000-memory.dmp
      Filesize

      1.6MB

    • memory/1824-62-0x0000000073D70000-0x000000007445E000-memory.dmp
      Filesize

      6.9MB

    • memory/2120-11-0x0000000000120000-0x0000000000124000-memory.dmp
      Filesize

      16KB