Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-02-2025 16:06
Behavioral task
behavioral1
Sample
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
Resource
win10v2004-20250129-en
General
-
Target
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
-
Size
3.6MB
-
MD5
33bc39d2b142aac254ce2c8efc8de27a
-
SHA1
95780b1b6c7f23f72b3e790d0809216bdfd670ba
-
SHA256
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489
-
SHA512
eee09541f45bff4b304afd7e315711fcb9cc122f8418ea540d0a1672c149730dbbe51eb57a8344e0dfa15218d0ef5f78a2c67d25229fa564a62258ba0449c120
-
SSDEEP
98304:CEjdGSi3kqXf0FLYWCLbi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13:k3kSILYWqZAkuujCPX9YG9he5GnQCAJS
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7570347185:AAEz_VpR809OhOYFdcL_J8sQ3jA3OcwYJ8E/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 540 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2788 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1820 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe Token: SeDebugPrivilege 2788 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2896 1820 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe 30 PID 1820 wrote to memory of 2896 1820 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe 30 PID 1820 wrote to memory of 2896 1820 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe 30 PID 1820 wrote to memory of 2896 1820 9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe 30 PID 2896 wrote to memory of 1388 2896 cmd.exe 32 PID 2896 wrote to memory of 1388 2896 cmd.exe 32 PID 2896 wrote to memory of 1388 2896 cmd.exe 32 PID 2896 wrote to memory of 1388 2896 cmd.exe 32 PID 2896 wrote to memory of 2788 2896 cmd.exe 33 PID 2896 wrote to memory of 2788 2896 cmd.exe 33 PID 2896 wrote to memory of 2788 2896 cmd.exe 33 PID 2896 wrote to memory of 2788 2896 cmd.exe 33 PID 2896 wrote to memory of 540 2896 cmd.exe 34 PID 2896 wrote to memory of 540 2896 cmd.exe 34 PID 2896 wrote to memory of 540 2896 cmd.exe 34 PID 2896 wrote to memory of 540 2896 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe"C:\Users\Admin\AppData\Local\Temp\9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2b821c5d-01b0-4c12-8ebe-6234f5f7c65d.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 18203⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 2 /NOBREAK3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50bdc3e147a1fc71c54eeca05314f61e1
SHA1f9d67954b464685014585b0554195ec769bf765e
SHA256bdc8bccb308304877bf376be7bdae0265262f6d5ad543a82fbb41fa7e8fa388a
SHA51254ab12db15580bc0c3e9581472c4be53f37751d614643026be396b924944e7a89e4b6849f13eb70b5fb3a440f3962b280f279945850c95f58d94b2ef0265c959