Analysis

  • max time kernel
    135s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    13-09-2021 11:19

General

  • Target

    76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe

  • Size

    79KB

  • MD5

    3896edc09a969420502d0a1d9f5b5263

  • SHA1

    a62410c99c35802bc3ce7062e005b847636e661e

  • SHA256

    76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967

  • SHA512

    47ccb086e2fdea53d5712ae773ba0dac3cbe7eb5ee2123c4f3278345625a4e58bb894b2aed4530b98938d8c578cce17193da2a33ccfc0d2eef3442fe877f814b

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
    "C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 2124
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3908-115-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/3908-117-0x00000000025C0000-0x00000000025DB000-memory.dmp

    Filesize

    108KB

  • memory/3908-118-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/3908-119-0x0000000007BB0000-0x0000000007BB1000-memory.dmp

    Filesize

    4KB

  • memory/3908-120-0x0000000008000000-0x0000000008001000-memory.dmp

    Filesize

    4KB

  • memory/3908-121-0x00000000085A0000-0x00000000085A1000-memory.dmp

    Filesize

    4KB

  • memory/3908-122-0x0000000008240000-0x0000000008241000-memory.dmp

    Filesize

    4KB