Analysis

  • max time kernel
    117s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-09-2021 11:19

General

  • Target

    76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe

  • Size

    79KB

  • MD5

    3896edc09a969420502d0a1d9f5b5263

  • SHA1

    a62410c99c35802bc3ce7062e005b847636e661e

  • SHA256

    76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967

  • SHA512

    47ccb086e2fdea53d5712ae773ba0dac3cbe7eb5ee2123c4f3278345625a4e58bb894b2aed4530b98938d8c578cce17193da2a33ccfc0d2eef3442fe877f814b

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
    "C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 1856
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-64-0x00000000002C0000-0x00000000002D8000-memory.dmp

    Filesize

    96KB

  • memory/2044-59-0x0000000000E10000-0x0000000000E11000-memory.dmp

    Filesize

    4KB

  • memory/2044-61-0x0000000000330000-0x000000000034B000-memory.dmp

    Filesize

    108KB

  • memory/2044-62-0x0000000004A90000-0x0000000004A91000-memory.dmp

    Filesize

    4KB