Resubmissions
30-08-2024 02:39
240830-c5nghatamg 1030-08-2024 02:37
240830-c398gsshrg 1030-08-2024 02:34
240830-c2k7zavbqp 10Analysis
-
max time kernel
397s -
max time network
437s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
30-08-2024 02:39
Behavioral task
behavioral1
Sample
TdPrimiumCheat.exe
Resource
win10-20240611-en
General
-
Target
TdPrimiumCheat.exe
-
Size
1.6MB
-
MD5
6627adf7167ee571e8fd6c8b1a0e8ae3
-
SHA1
03b9112660ee73c59d84e219f15bf24ae9df48db
-
SHA256
6c5935bcddaa1d4f809487f66db758e892cc0a7fd7704d138904bc879644ea1f
-
SHA512
e05896a6e0d09d4dafeb2467395ca06ae1e728a4aa079041dea82940caeb71646984604fdeea482748423b10257b8462db4f573682f9f719939143fdb5691c60
-
SSDEEP
49152:19Tq24GjdGSiqkqXfd+/9AqYanieKd0U:1YEjdGSiqkqXf0FLYW
Malware Config
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TdPrimiumCheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3224 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4168 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 520 TdPrimiumCheat.exe Token: SeDebugPrivilege 4168 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 520 wrote to memory of 3208 520 TdPrimiumCheat.exe 71 PID 520 wrote to memory of 3208 520 TdPrimiumCheat.exe 71 PID 520 wrote to memory of 3208 520 TdPrimiumCheat.exe 71 PID 3208 wrote to memory of 2284 3208 cmd.exe 73 PID 3208 wrote to memory of 2284 3208 cmd.exe 73 PID 3208 wrote to memory of 2284 3208 cmd.exe 73 PID 3208 wrote to memory of 4168 3208 cmd.exe 74 PID 3208 wrote to memory of 4168 3208 cmd.exe 74 PID 3208 wrote to memory of 4168 3208 cmd.exe 74 PID 3208 wrote to memory of 3224 3208 cmd.exe 75 PID 3208 wrote to memory of 3224 3208 cmd.exe 75 PID 3208 wrote to memory of 3224 3208 cmd.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\TdPrimiumCheat.exe"C:\Users\Admin\AppData\Local\Temp\TdPrimiumCheat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpE5EB.tmp.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 5203⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD53e41716709ad6c62bca28ec6b7aef37b
SHA120e16f91a3218b59f8a1b68f966f8c3a6815aa71
SHA2567668a2ec663e8a210376958e66c0eb208a720db669ca606573cb6d1b121f33f9
SHA512aa04b2878f376644abc567eec6dc3db2fb6eaa4dec3133cddd85be6f49014f03557d289af32c121916ddba3d6f4c87f33db2182067f80d01eb65dffdd227b29a