Analysis
-
max time kernel
135s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en -
submitted
13-09-2021 11:19
Static task
static1
Behavioral task
behavioral1
Sample
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
Resource
win10-en
General
-
Target
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe
-
Size
79KB
-
MD5
3896edc09a969420502d0a1d9f5b5263
-
SHA1
a62410c99c35802bc3ce7062e005b847636e661e
-
SHA256
76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967
-
SHA512
47ccb086e2fdea53d5712ae773ba0dac3cbe7eb5ee2123c4f3278345625a4e58bb894b2aed4530b98938d8c578cce17193da2a33ccfc0d2eef3442fe877f814b
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2192 3908 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3908 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3908 76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe Token: SeRestorePrivilege 2192 WerFault.exe Token: SeBackupPrivilege 2192 WerFault.exe Token: SeDebugPrivilege 2192 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"C:\Users\Admin\AppData\Local\Temp\76c9e8371da7ef22583f4eae6320f4cace5f0187bf643f388b14ca36182a4967.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 21242⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-