Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe
Resource
win10v2004-20240508-en
General
-
Target
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe
-
Size
2.4MB
-
MD5
928ecc7808c79c7a4ca63a1730cee20a
-
SHA1
fb9bedbcb0758af5ec77b248915aba7ab2e3e504
-
SHA256
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302
-
SHA512
ba6656a5c29873d94c25209558a81a33ce7de897cddd35d2a523e61e03845ff4e7bf77b78ae873ad3a393e2216d37dcc6d0a62a6dc260b663cb5b3af2c143ee7
-
SSDEEP
49152:Ph+ZkldoPK8YaQtEZgJcZRmAqbsnqS02N/DZ2dVfYSBR:Y2cPK8c1xAqS9DUvY+
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1257742466048720936/KzD1DlNrf4X-n_3qBCdOf_3XBXbWtKPWsEcuu8mm7843WeDUMw3CKaQQD6estFCo5S2g
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exedescription pid process target process PID 2120 set thread context of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ RegSvcs.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1120 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1816 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegSvcs.exepid process 1824 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exepid process 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1824 RegSvcs.exe Token: SeDebugPrivilege 1816 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exepid process 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exepid process 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exeRegSvcs.execmd.exedescription pid process target process PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 2120 wrote to memory of 1824 2120 a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe RegSvcs.exe PID 1824 wrote to memory of 2260 1824 RegSvcs.exe cmd.exe PID 1824 wrote to memory of 2260 1824 RegSvcs.exe cmd.exe PID 1824 wrote to memory of 2260 1824 RegSvcs.exe cmd.exe PID 1824 wrote to memory of 2260 1824 RegSvcs.exe cmd.exe PID 2260 wrote to memory of 1808 2260 cmd.exe chcp.com PID 2260 wrote to memory of 1808 2260 cmd.exe chcp.com PID 2260 wrote to memory of 1808 2260 cmd.exe chcp.com PID 2260 wrote to memory of 1808 2260 cmd.exe chcp.com PID 2260 wrote to memory of 1816 2260 cmd.exe taskkill.exe PID 2260 wrote to memory of 1816 2260 cmd.exe taskkill.exe PID 2260 wrote to memory of 1816 2260 cmd.exe taskkill.exe PID 2260 wrote to memory of 1816 2260 cmd.exe taskkill.exe PID 2260 wrote to memory of 1120 2260 cmd.exe timeout.exe PID 2260 wrote to memory of 1120 2260 cmd.exe timeout.exe PID 2260 wrote to memory of 1120 2260 cmd.exe timeout.exe PID 2260 wrote to memory of 1120 2260 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe"C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\a4fc6ef06617c607c0b4d532e7df102e1dbe7416b28402e214672cbae1188302.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpBCA3.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 18244⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CabBB27.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarBB39.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\cereclothsFilesize
1.6MB
MD53903ada0ac31eadcf07abac457f50210
SHA1be0a97cc0d5d7fbe85dca85afe57104a6723ea65
SHA2567c98ea94b70e5c7dbc5018d4a88e6a66ac88bb9fd97a8c0afb2c40af5cf4975b
SHA5125fc9fd928471de601f0c7e60b83306deaffe39727cd830db6ddf688e6ec27632c9fd1eeb411568c6fd39dac19efd92c065706d1265f0ce2cc78f31394f97a774
-
C:\Users\Admin\AppData\Local\Temp\tmpBCA3.tmp.batFilesize
57B
MD550020e4a79b189d13818b80d87b0b1b5
SHA13d0fa930f254a576fd1df865f8da61c131450848
SHA256d7ca7e17043dbd4821e97437b3e9254b6d60ad03d395e348ae1097646fbd0a57
SHA512eabbe7229b7e414674d64e9f511292170048a4ea87d74f33890e8cdfc62cac62c35f15496491d9ced28a0c5c4bcbcbf66fca60dde51bfbce482f0a9c35667a73
-
memory/1824-18-0x0000000073D70000-0x000000007445E000-memory.dmpFilesize
6.9MB
-
memory/1824-17-0x0000000073D7E000-0x0000000073D7F000-memory.dmpFilesize
4KB
-
memory/1824-16-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/1824-21-0x0000000002110000-0x00000000021A2000-memory.dmpFilesize
584KB
-
memory/1824-22-0x0000000000C20000-0x0000000000C46000-memory.dmpFilesize
152KB
-
memory/1824-23-0x00000000005E0000-0x00000000005E8000-memory.dmpFilesize
32KB
-
memory/1824-15-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/1824-12-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/1824-62-0x0000000073D70000-0x000000007445E000-memory.dmpFilesize
6.9MB
-
memory/2120-11-0x0000000000120000-0x0000000000124000-memory.dmpFilesize
16KB