Analysis
-
max time kernel
123s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en -
submitted
13-09-2021 11:19
Static task
static1
Behavioral task
behavioral1
Sample
acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe
Resource
win10-en
General
-
Target
acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe
-
Size
80KB
-
MD5
5ced52ef1c1837c87ed28952075f7d9c
-
SHA1
d591519679f607f829e915f3ff06dd1cb9c47f23
-
SHA256
acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846
-
SHA512
49b83b4189ad40bb12a04e4b88572d57287f0f9404f1c4b84239c03bbaa0a360c573703c09f404099c1b4ef6e7130ffc5bdb1aa8345428d9769c81b97b046b25
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 580 2900 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2900 acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2900 acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe Token: SeRestorePrivilege 580 WerFault.exe Token: SeBackupPrivilege 580 WerFault.exe Token: SeDebugPrivilege 580 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe"C:\Users\Admin\AppData\Local\Temp\acc44cc2950b1f22e96d38ec627bf1092a0d2c726da20ec1b3fafd5ece710846.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 19242⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-