Resubmissions

17-07-2021 02:00

210717-6br9ezqcla 10

17-07-2021 01:54

210717-da4l3zkc22 10

Analysis

  • max time kernel
    16s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    17-07-2021 02:00

General

  • Target

    AntiPublic.exe

  • Size

    449KB

  • MD5

    b3102c8ff03714b22e9408fcf3d63ade

  • SHA1

    22da268e12c894698d4cf7cd6c4f69762ff68c4a

  • SHA256

    fd492b317c4004ce5046da22cbd0f14a698dec548eff87eee4f062284bf41505

  • SHA512

    f8231bc2b6a81861a6890416568bdb7e0268c01b5083c5f6990abf66cf7f3109a6e5e72e011374d43cec0951f10521e6384fb6a4a3c22e012515a535b593e144

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AntiPublic.exe
    "C:\Users\Admin\AppData\Local\Temp\AntiPublic.exe"
    1⤵
    • Loads dropped DLL
    PID:632
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 632 -s 940
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/632-114-0x00000129244A0000-0x00000129244A1000-memory.dmp

    Filesize

    4KB

  • memory/632-116-0x0000012926030000-0x0000012926036000-memory.dmp

    Filesize

    24KB

  • memory/632-118-0x000001293EA70000-0x000001293EA72000-memory.dmp

    Filesize

    8KB