Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-09-2024 17:56

General

  • Target

    Stellar.exe

  • Size

    2.4MB

  • MD5

    d68dba883125d1a3408e13b84a3524e1

  • SHA1

    b613717517240829d8c28242a3b2ec7c6576b3f3

  • SHA256

    cc92146cb6e5e514c4bae54ced9f4bf6724b6b8b370f2f6d219aa5b0f95390ba

  • SHA512

    bad82130be599397e7a58a80d8301618fd35787c8d7bf5c1ae0d2cd00f92613265cabd9678c7dcd3e4fe8251a2636b14bdc7d0c0f29e383ae54b5dcf08b30de3

  • SSDEEP

    49152:vMkygnW2WnCzXzf7UPrn2Xb0ThRyUB1CP/yOuUaL4EgfGs3:t7nW2eCzjf7EnNvyCCZeLOG4

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/LsuynkUz

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stellar.exe
    "C:\Users\Admin\AppData\Local\Temp\Stellar.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\ProgramData\Stellar Generator.exe
      "C:\ProgramData\Stellar Generator.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:5000
    • C:\ProgramData\AdobeIPC.exe
      "C:\ProgramData\AdobeIPC.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1488
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3268
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "AdobeIPC" /tr "C:\ProgramData\AdobeIPC"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:956
  • C:\ProgramData\AdobeIPC
    C:\ProgramData\AdobeIPC
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1968
  • C:\ProgramData\AdobeIPC
    C:\ProgramData\AdobeIPC
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AdobeIPC.exe

    Filesize

    65KB

    MD5

    1f1441f1cc6080cf821cfda93bd05e97

    SHA1

    8949a0762d9b68247d52209653b95f649470deee

    SHA256

    c2b08bb76ce8bbb8d85504b6725bd33e473a591af9bd358286c407b280d07440

    SHA512

    84eeda4e49ceacb5ecc8017e95893d70d52176f973a0e0b1ea1e18098d65164f4a40aeceb17b17a091b288aee0284b60b4cca934cc513039e8736573210133d9

  • C:\ProgramData\Guna.UI2.dll

    Filesize

    2.1MB

    MD5

    c97f23b52087cfa97985f784ea83498f

    SHA1

    d364618bec9cd6f8f5d4c24d3cc0f4c1a8e06b89

    SHA256

    e658e8a5616245dbe655e194b59f1bb704aaeafbd0925d6eebbe70555a638cdd

    SHA512

    ecfa83596f99afde9758d1142ff8b510a090cba6f42ba6fda8ca5e0520b658943ad85829a07bf17411e26e58432b74f05356f7eaeb3949a8834faa5de1a4f512

  • C:\ProgramData\Stellar Generator.exe

    Filesize

    247KB

    MD5

    6b7fce17300b729ca1c919ae47db6c7d

    SHA1

    2e49381b6a922bfaafd040883b04e6a8ab6148b6

    SHA256

    132ee3a204736259c89a6ae74d5c43e832409fa331e39686c6910936a9c7989f

    SHA512

    e9ee8a63e72d6d11d6396a790c61b803df3f20d326cf5279afb4cf88e0838d393f8e0e9d06f27627ad8bdaeddbdb41f996eab6f1a2e2b91c26405e4c1c242f27

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdobeIPC.log

    Filesize

    654B

    MD5

    2cbbb74b7da1f720b48ed31085cbd5b8

    SHA1

    79caa9a3ea8abe1b9c4326c3633da64a5f724964

    SHA256

    e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

    SHA512

    ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    627073ee3ca9676911bee35548eff2b8

    SHA1

    4c4b68c65e2cab9864b51167d710aa29ebdcff2e

    SHA256

    85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

    SHA512

    3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    d0a4a3b9a52b8fe3b019f6cd0ef3dad6

    SHA1

    fed70ce7834c3b97edbd078eccda1e5effa527cd

    SHA256

    21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

    SHA512

    1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    051a74485331f9d9f5014e58ec71566c

    SHA1

    4ed0256a84f2e95609a0b4d5c249bca624db8fe4

    SHA256

    3f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888

    SHA512

    1f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    9fe02a19db183cbe69c8d87c0f89d375

    SHA1

    2b4a654c0737c5b57b5ce554f2287425f3598f7c

    SHA256

    cb09b3f417a451a348671d01b81b91bb6142270e7d16934bda6598102c3107d9

    SHA512

    b334642b57fe8fb476c99c939b2a7d81e8fd091157f534b973e6f88cf21e71dd06bb510901debb8ec33388b3bd8f0be19471db3a2b75dc58d1f357ac1a024070

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a1ifud1l.yuz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1488-48-0x0000026E31BB0000-0x0000026E31BD2000-memory.dmp

    Filesize

    136KB

  • memory/3356-28-0x0000000000020000-0x0000000000036000-memory.dmp

    Filesize

    88KB

  • memory/3356-89-0x0000000002120000-0x0000000002130000-memory.dmp

    Filesize

    64KB

  • memory/3356-86-0x00007FFEFBC50000-0x00007FFEFC712000-memory.dmp

    Filesize

    10.8MB

  • memory/3356-85-0x0000000002120000-0x0000000002130000-memory.dmp

    Filesize

    64KB

  • memory/3356-29-0x00007FFEFBC50000-0x00007FFEFC712000-memory.dmp

    Filesize

    10.8MB

  • memory/3372-1-0x0000000000070000-0x00000000002DE000-memory.dmp

    Filesize

    2.4MB

  • memory/3372-0-0x00007FFEFBC53000-0x00007FFEFBC55000-memory.dmp

    Filesize

    8KB

  • memory/5000-33-0x00000000053C0000-0x0000000005452000-memory.dmp

    Filesize

    584KB

  • memory/5000-31-0x0000000000A10000-0x0000000000A54000-memory.dmp

    Filesize

    272KB

  • memory/5000-32-0x0000000005970000-0x0000000005F16000-memory.dmp

    Filesize

    5.6MB

  • memory/5000-35-0x0000000074490000-0x0000000074C41000-memory.dmp

    Filesize

    7.7MB

  • memory/5000-39-0x0000000005F20000-0x0000000006132000-memory.dmp

    Filesize

    2.1MB

  • memory/5000-87-0x000000007449E000-0x000000007449F000-memory.dmp

    Filesize

    4KB

  • memory/5000-88-0x0000000074490000-0x0000000074C41000-memory.dmp

    Filesize

    7.7MB

  • memory/5000-30-0x000000007449E000-0x000000007449F000-memory.dmp

    Filesize

    4KB

  • memory/5000-34-0x0000000005570000-0x000000000557A000-memory.dmp

    Filesize

    40KB