Analysis
-
max time kernel
16s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
17-07-2021 02:00
Static task
static1
Behavioral task
behavioral1
Sample
AntiPublic.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
AntiPublic.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
AntiPublic.exe
-
Size
449KB
-
MD5
b3102c8ff03714b22e9408fcf3d63ade
-
SHA1
22da268e12c894698d4cf7cd6c4f69762ff68c4a
-
SHA256
fd492b317c4004ce5046da22cbd0f14a698dec548eff87eee4f062284bf41505
-
SHA512
f8231bc2b6a81861a6890416568bdb7e0268c01b5083c5f6990abf66cf7f3109a6e5e72e011374d43cec0951f10521e6384fb6a4a3c22e012515a535b593e144
Score
10/10
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Payload 1 IoCs
resource yara_rule behavioral2/memory/632-116-0x0000012926030000-0x0000012926036000-memory.dmp elysiumstealer -
Loads dropped DLL 1 IoCs
pid Process 632 AntiPublic.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3916 632 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AntiPublic.exe"C:\Users\Admin\AppData\Local\Temp\AntiPublic.exe"1⤵
- Loads dropped DLL
PID:632 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 632 -s 9402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-