Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 00:23
Behavioral task
behavioral1
Sample
Stealerium/Stealerium.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Stealerium/Stealerium.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Stealerium/install.bat
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Stealerium/install.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Stealerium/install_python.bat
Resource
win7-20240903-en
General
-
Target
Stealerium/install_python.bat
-
Size
687B
-
MD5
821f007d1c56bb3f4511bab928ce8f63
-
SHA1
a22b0d76f5ef0e145629dded82e195486675774a
-
SHA256
434f9d4a2a7a5088aa393b47ad8e957a15481cd3078f10b3c0f7ec6fe5f497c2
-
SHA512
f1db8db20e25d8d06828ead22e70a28411bf32faa7dd14816ef833efe548a046e9383cb51aa100d49555f2cc9c1f74bf10aef871a0e6724da5f96c690770dd4d
Malware Config
Signatures
-
pid Process 3052 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3052 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3044 2904 cmd.exe 31 PID 2904 wrote to memory of 3044 2904 cmd.exe 31 PID 2904 wrote to memory of 3044 2904 cmd.exe 31 PID 3044 wrote to memory of 3052 3044 cmd.exe 32 PID 3044 wrote to memory of 3052 3044 cmd.exe 32 PID 3044 wrote to memory of 3052 3044 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Stealerium\install_python.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-