Malware Analysis Report

2025-04-13 12:23

Sample ID 250319-qky96azr15
Target Cooperbuild34.exe
SHA256 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
Tags
stealerium stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992

Threat Level: Known bad

The file Cooperbuild34.exe was found to be: Known bad.

Malicious Activity Summary

stealerium stealer

Stealerium family

Stealerium

Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Delays execution with timeout.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-03-19 13:19

Signatures

Stealerium family

stealerium

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-03-19 13:19

Reported

2025-03-19 13:22

Platform

win7-20240903-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"

Signatures

Stealerium

stealer stealerium

Stealerium family

stealerium

Enumerates physical storage devices

Delays execution with timeout.exe

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Kills process with taskkill

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe

"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0942f001-868f-4bfe-8f05-93bf3587a131.bat"

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1668

C:\Windows\system32\timeout.exe

timeout /T 2 /NOBREAK

Network

N/A

Files

memory/1668-0-0x000007FEF5DC3000-0x000007FEF5DC4000-memory.dmp

memory/1668-1-0x0000000000BC0000-0x00000000012CE000-memory.dmp

memory/1668-2-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0942f001-868f-4bfe-8f05-93bf3587a131.bat

MD5 195b3d5a37375fcb4d1fa0ede1030fb9
SHA1 c57174332c9e5d7da456dc78eb978bfb00a6bcbb
SHA256 38e1cbd9d7cc2d542fde9daf5c3b28bd3b9eb45223ac11b184a2232cfdd0476d
SHA512 d185b33f65ade7f3322b6976b8f61578c142df65646357745e3cad0038b52f8006c3c596a32a4fc0948f3fd76d83b78996f85903547c6869d5b00523f5a431b9

memory/1668-7-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-03-19 13:19

Reported

2025-03-19 13:22

Platform

win10v2004-20250314-en

Max time kernel

103s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"

Signatures

Stealerium

stealer stealerium

Stealerium family

stealerium

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe N/A

Enumerates physical storage devices

Delays execution with timeout.exe

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Kills process with taskkill

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe

"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e3d0bdf8-c626-406c-8d93-c21ea4ef4bf3.bat"

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4372

C:\Windows\system32\timeout.exe

timeout /T 2 /NOBREAK

Network

Country Destination Domain Proto
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

memory/4372-0-0x00007FFF4DC63000-0x00007FFF4DC65000-memory.dmp

memory/4372-1-0x000001AAABE20000-0x000001AAAC52E000-memory.dmp

memory/4372-2-0x00007FFF4DC60000-0x00007FFF4E721000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e3d0bdf8-c626-406c-8d93-c21ea4ef4bf3.bat

MD5 b9fe333a3923d09bcc502f08edec936e
SHA1 d260213d73ad12573b4f60ac79fdd506dd99a6ae
SHA256 bbdfdfd6f277e18e73fd9026917ca535fe53fd6f842b1c82fcf764eb9127f7a6
SHA512 b370057cb0726be9260d9605b191bb558dacbbf289be68cbfac8bdcd68c4efb2e40d5f455e4c83f4eb9ea30e5a0326052a658466c4543a6b87813386596a5908

memory/4372-7-0x00007FFF4DC60000-0x00007FFF4E721000-memory.dmp