Analysis

  • max time kernel
    36s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2025 16:06

General

  • Target

    9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe

  • Size

    3.6MB

  • MD5

    33bc39d2b142aac254ce2c8efc8de27a

  • SHA1

    95780b1b6c7f23f72b3e790d0809216bdfd670ba

  • SHA256

    9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489

  • SHA512

    eee09541f45bff4b304afd7e315711fcb9cc122f8418ea540d0a1672c149730dbbe51eb57a8344e0dfa15218d0ef5f78a2c67d25229fa564a62258ba0449c120

  • SSDEEP

    98304:CEjdGSi3kqXf0FLYWCLbi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13:k3kSILYWqZAkuujCPX9YG9he5GnQCAJS

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot7570347185:AAEz_VpR809OhOYFdcL_J8sQ3jA3OcwYJ8E/sendMessage?chat_id=

Attributes

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
    "C:\Users\Admin\AppData\Local\Temp\9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2b821c5d-01b0-4c12-8ebe-6234f5f7c65d.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1388
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /PID 1820
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2788
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 2 /NOBREAK
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2b821c5d-01b0-4c12-8ebe-6234f5f7c65d.bat

    Filesize

    152B

    MD5

    0bdc3e147a1fc71c54eeca05314f61e1

    SHA1

    f9d67954b464685014585b0554195ec769bf765e

    SHA256

    bdc8bccb308304877bf376be7bdae0265262f6d5ad543a82fbb41fa7e8fa388a

    SHA512

    54ab12db15580bc0c3e9581472c4be53f37751d614643026be396b924944e7a89e4b6849f13eb70b5fb3a440f3962b280f279945850c95f58d94b2ef0265c959

  • memory/1820-0-0x00000000748BE000-0x00000000748BF000-memory.dmp

    Filesize

    4KB

  • memory/1820-1-0x0000000000E10000-0x00000000011BA000-memory.dmp

    Filesize

    3.7MB

  • memory/1820-2-0x00000000748B0000-0x0000000074F9E000-memory.dmp

    Filesize

    6.9MB

  • memory/1820-3-0x00000000748BE000-0x00000000748BF000-memory.dmp

    Filesize

    4KB

  • memory/1820-4-0x00000000748B0000-0x0000000074F9E000-memory.dmp

    Filesize

    6.9MB

  • memory/1820-7-0x00000000748B0000-0x0000000074F9E000-memory.dmp

    Filesize

    6.9MB