Analysis
-
max time kernel
131s -
max time network
24s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
12-08-2021 20:09
Static task
static1
Behavioral task
behavioral1
Sample
2468852.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2468852.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
4422625.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
4422625.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
4701556.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
4701556.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
8383001.exe
Resource
win7v20210408
General
-
Target
8383001.exe
-
Size
181KB
-
MD5
36acd7e8f309426cb30aeda6c58234a6
-
SHA1
e111555e3324dcb03fda2b03fd4f765dec10ee75
-
SHA256
d17fbe43bc63006f1f11be7948fc385457eb4e830567f5f564cc3d3316ce6a3d
-
SHA512
62449c4e2d9c5faae15164e5751901d2e8e978aa52a7e156e7001b44bb61ed0cc14ee2230458a239ab7a85198826fe704246043ae800ee9c55951b7182b2ea6c
Malware Config
Signatures
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1600 980 WerFault.exe 8383001.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
8383001.exeWerFault.exepid process 980 8383001.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1600 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8383001.exeWerFault.exedescription pid process Token: SeDebugPrivilege 980 8383001.exe Token: SeDebugPrivilege 1600 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8383001.exedescription pid process target process PID 980 wrote to memory of 1600 980 8383001.exe WerFault.exe PID 980 wrote to memory of 1600 980 8383001.exe WerFault.exe PID 980 wrote to memory of 1600 980 8383001.exe WerFault.exe PID 980 wrote to memory of 1600 980 8383001.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8383001.exe"C:\Users\Admin\AppData\Local\Temp\8383001.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 19482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1600
-