Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 19:06

General

  • Target

    Z-Launcher-GPS5.exe

  • Size

    1.6MB

  • MD5

    e6db71cc80920480219f16c0c54013c7

  • SHA1

    4c7370868e5187d5d017c69df552dd809b76c1a2

  • SHA256

    5b9a78809c6718019832322023e94982761032adb51e1a44ba139d4f63369542

  • SHA512

    0b229b4b3e2cac3cd25748af0cbcc37840825b2d4f9d098e97e183f2f763fe240d0df89ef98a8c19c32e4cee61145d9e6f478598b6598384b6035ab714ebce55

  • SSDEEP

    49152:TkTq24GjdGSiqkqXfd+/9AqYanieKdsfM:T1EjdGSiqkqXf0FLYWC

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1279142597218013264/8mlljrcp8pu-na1Kxr-pwaQv-IeIN4qXz3iwqKTXrY-DPCA89wjqOAQeRKn7qMqu3BR6

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Z-Launcher-GPS5.exe
    "C:\Users\Admin\AppData\Local\Temp\Z-Launcher-GPS5.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2864
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show profile
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:2016
      • C:\Windows\SysWOW64\findstr.exe
        findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2536
      2⤵
      • Program crash
      PID:2120
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1560
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7789758,0x7fef7789768,0x7fef7789778
      2⤵
        PID:1768
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:2
        2⤵
          PID:1944
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
          2⤵
            PID:1264
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
            2⤵
              PID:932
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:1
              2⤵
                PID:2492
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:1
                2⤵
                  PID:1844
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:2
                  2⤵
                    PID:2572
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1400 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:1
                    2⤵
                      PID:1924
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3480 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
                      2⤵
                        PID:3004
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3600 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
                        2⤵
                          PID:836
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1388 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
                          2⤵
                            PID:2384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3620 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
                            2⤵
                              PID:2776
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1252,i,5475554662549712792,14701451192088499644,131072 /prefetch:8
                              2⤵
                                PID:2792
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2708

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\Browsers\Firefox\Bookmarks.txt

                                Filesize

                                105B

                                MD5

                                2e9d094dda5cdc3ce6519f75943a4ff4

                                SHA1

                                5d989b4ac8b699781681fe75ed9ef98191a5096c

                                SHA256

                                c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                SHA512

                                d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\Directories\Startup.txt

                                Filesize

                                24B

                                MD5

                                68c93da4981d591704cea7b71cebfb97

                                SHA1

                                fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                                SHA256

                                889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                                SHA512

                                63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\Directories\Videos.txt

                                Filesize

                                23B

                                MD5

                                1fddbf1169b6c75898b86e7e24bc7c1f

                                SHA1

                                d2091060cb5191ff70eb99c0088c182e80c20f8c

                                SHA256

                                a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

                                SHA512

                                20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\System\Apps.txt

                                Filesize

                                6KB

                                MD5

                                d4dfd8f54cf637dd0d9e10b140e02bfd

                                SHA1

                                98d9fbe4f53989291b08c04a375f19c637e9ac2d

                                SHA256

                                92e1af080111ecf2b55da63da61f7d208025c7efe8a44175a3bccdb95d56846d

                                SHA512

                                a46b134947c4f9e59a266dbc41aa6af1d558c3ae7bc4d0ff05aa72d93e0c166f2004b95514bb5cb39961b9a3784c06efb855724c46378ef1c607ca5f0ebda9df

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\System\Debug.txt

                                Filesize

                                320B

                                MD5

                                0c642100a837d38444963ae281a03f66

                                SHA1

                                310f48914d500cf2b9a990373e26712f7b2fcf14

                                SHA256

                                796876d2832f30410538bff33590909ca72ea9ac4e26bb89ba98fec9568bbd66

                                SHA512

                                7afc30f6bab29598d04b6fa3a46d2097ec8c8ecbb1d6d73a5bb28a799e105d60759f29b2f0426d7df79832e628c8de63cc57720623666aa5726aa29aee2645d1

                              • C:\Users\Admin\AppData\Local\33a044bb646f624279445a20c9329b6f\Admin@ELZYPTFV_en-US\System\ProductKey.txt

                                Filesize

                                29B

                                MD5

                                cad6c6bee6c11c88f5e2f69f0be6deb7

                                SHA1

                                289d74c3bebe6cca4e1d2e084482ad6d21316c84

                                SHA256

                                dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0

                                SHA512

                                e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                Filesize

                                16B

                                MD5

                                aefd77f47fb84fae5ea194496b44c67a

                                SHA1

                                dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                SHA256

                                4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                SHA512

                                b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                Filesize

                                16B

                                MD5

                                18e723571b00fb1694a3bad6c78e4054

                                SHA1

                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                SHA256

                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                SHA512

                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                              • memory/2936-9-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

                                Filesize

                                4KB

                              • memory/2936-8-0x00000000006C0000-0x00000000006C8000-memory.dmp

                                Filesize

                                32KB

                              • memory/2936-11-0x0000000000930000-0x000000000093A000-memory.dmp

                                Filesize

                                40KB

                              • memory/2936-133-0x00000000062A0000-0x000000000631A000-memory.dmp

                                Filesize

                                488KB

                              • memory/2936-12-0x0000000000940000-0x0000000000948000-memory.dmp

                                Filesize

                                32KB

                              • memory/2936-10-0x0000000074D00000-0x00000000753EE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2936-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

                                Filesize

                                4KB

                              • memory/2936-13-0x00000000009E0000-0x00000000009FE000-memory.dmp

                                Filesize

                                120KB

                              • memory/2936-197-0x0000000005EC0000-0x0000000005F72000-memory.dmp

                                Filesize

                                712KB

                              • memory/2936-199-0x0000000074D00000-0x00000000753EE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2936-7-0x0000000000710000-0x0000000000736000-memory.dmp

                                Filesize

                                152KB

                              • memory/2936-6-0x0000000001260000-0x00000000012F2000-memory.dmp

                                Filesize

                                584KB

                              • memory/2936-2-0x0000000074D00000-0x00000000753EE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2936-1-0x00000000012F0000-0x000000000148C000-memory.dmp

                                Filesize

                                1.6MB