Analysis
-
max time kernel
55s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-08-2021 21:51
Static task
static1
Behavioral task
behavioral1
Sample
eufive_20210830-223756.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
eufive_20210830-223756.exe
-
Size
264KB
-
MD5
134fac2ca9c3723cd6107a69f7f06c9e
-
SHA1
dd81965431606b8e940bb4a5f8f83a9b060d7f10
-
SHA256
111dd17966a5f7058eb1cfc468c1d062602437a69694aa05eff97d121d611408
-
SHA512
3d170c5cfaae1ad3f0288afae0a45ce43b852196c74b779618ccaa6dd53009ca3342aa867c6e44164c34b295698b9bf096b640cceeb183e82b1e6cb4f379ada3
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 920 created 572 920 WerFault.exe 67 -
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/572-115-0x00000000001C0000-0x00000000001D9000-memory.dmp family_arkei behavioral2/memory/572-116-0x0000000000400000-0x00000000023AC000-memory.dmp family_arkei -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 572 eufive_20210830-223756.exe 572 eufive_20210830-223756.exe 572 eufive_20210830-223756.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 920 572 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 920 WerFault.exe Token: SeBackupPrivilege 920 WerFault.exe Token: SeDebugPrivilege 920 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eufive_20210830-223756.exe"C:\Users\Admin\AppData\Local\Temp\eufive_20210830-223756.exe"1⤵
- Loads dropped DLL
PID:572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 11082⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-