Resubmissions

04-02-2025 15:52

250204-ta6g9szrg1 10

04-02-2025 15:27

250204-svsaps1rcr 10

Analysis

  • max time kernel
    43s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 15:52

General

  • Target

    Pdf Reader.exe

  • Size

    73KB

  • MD5

    9d347d5ac998a89f78ba00e74b951f55

  • SHA1

    73df3d5c8388a4d6693cbb24f719dba8833c9157

  • SHA256

    2ea5686422bd8fb6eda542e9a96588f9deb1c97c45f3cb7d3b21ac4da540b57c

  • SHA512

    3db7421aa98e8e108bf982048dda7e0f09428c6498cf5f9f56ef499fb2fafc5deabde8ecb99e1fdd570d54ae9c0533b7502de5848c9e772708cf75509d0c9d9e

  • SSDEEP

    384:ytBuEejMVr2gy0mK1SvySYS4SRmbESgSNSsiKjHxqD4fpBSIxoI2AAgz:y+EjXQL6SYS4SRmbESgSNSsiQJxBSQH

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot6926474815:AAFx9tLAnf5OAVQZp2teS3G2_6T1wCP67xM/sendMessage?chat_id=-4224073938

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pdf Reader.exe
    "C:\Users\Admin\AppData\Local\Temp\Pdf Reader.exe"
    1⤵
    • Downloads MZ/PE file
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Users\Admin\AppData\Local\Temp\SecurityHealthHost.exe
      "C:\Users\Admin\AppData\Local\Temp\SecurityHealthHost.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\caecb329-86eb-4871-9c5e-5dcbb906ded9.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:4716
          • C:\Windows\system32\taskkill.exe
            taskkill /F /PID 3604
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2488
          • C:\Windows\system32\timeout.exe
            timeout /T 2 /NOBREAK
            4⤵
            • Delays execution with timeout.exe
            PID:3840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SecurityHealthHost.exe

      Filesize

      3.7MB

      MD5

      6967a105bf22f11871cf14fb2fda7bf1

      SHA1

      9be5af0232c8219b9ba0df4cb2b924b07e467ac2

      SHA256

      d06a144d1382d9fb1596b5a7a94d43377249bc95faee1d7b23dce3d6ac98dd3d

      SHA512

      df232d8915746eac5383a179fbcf322d697eacca9104da95962826a85416555c708575ffb84a769d8699c03597309a84269f310f3d555525a39f86967f85dcc5

    • C:\Users\Admin\AppData\Local\Temp\caecb329-86eb-4871-9c5e-5dcbb906ded9.bat

      Filesize

      152B

      MD5

      41105e006f62d935936ea0b93fc073c9

      SHA1

      d8e3b2c7aadc43b5ff60ab716b4e70865f380564

      SHA256

      45a76d8288c690f9f6a3672c9aa6389754fd4af3a15f90974cad5e9865c569cf

      SHA512

      61359e592a0f9a545189414b0a9bf78571bdc9718ed0787e7421e6b2be5ae86410c8d2ebff0715fcf260a25eed09817eda247f6074ccde59f041870e4d01fbc3

    • memory/3164-0-0x00000000752CE000-0x00000000752CF000-memory.dmp

      Filesize

      4KB

    • memory/3164-1-0x0000000000D80000-0x0000000000D98000-memory.dmp

      Filesize

      96KB

    • memory/3164-2-0x00000000752C0000-0x0000000075A70000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-10-0x00000000752CE000-0x00000000752CF000-memory.dmp

      Filesize

      4KB

    • memory/3164-15-0x00000000752C0000-0x0000000075A70000-memory.dmp

      Filesize

      7.7MB

    • memory/3604-8-0x0000023AC1230000-0x0000023AC15E6000-memory.dmp

      Filesize

      3.7MB

    • memory/3604-7-0x00007FF9483C3000-0x00007FF9483C5000-memory.dmp

      Filesize

      8KB

    • memory/3604-9-0x00007FF9483C0000-0x00007FF948E81000-memory.dmp

      Filesize

      10.8MB

    • memory/3604-13-0x00007FF9483C0000-0x00007FF948E81000-memory.dmp

      Filesize

      10.8MB