Analysis
-
max time kernel
117s -
max time network
58s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-09-2021 11:19
Static task
static1
Behavioral task
behavioral1
Sample
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
Resource
win10-en
General
-
Target
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
-
Size
79KB
-
MD5
3896edc09a969420502d0a1d9f5b5263
-
SHA1
a62410c99c35802bc3ce7062e005b847636e661e
-
SHA256
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967
-
SHA512
47ccb086e2fdea53d5712ae773ba0dac3cbe7eb5ee2123c4f3278345625a4e58bb894b2aed4530b98938d8c578cce17193da2a33ccfc0d2eef3442fe877f814b
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1752 2044 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1752 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe Token: SeDebugPrivilege 1752 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1752 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 30 PID 2044 wrote to memory of 1752 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 30 PID 2044 wrote to memory of 1752 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 30 PID 2044 wrote to memory of 1752 2044 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 18562⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1752
-