Analysis
-
max time kernel
65s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-10-2021 11:15
Static task
static1
Behavioral task
behavioral1
Sample
a9dea10c6d4d205faab1ac8db69384e9c3dc91fd5a718266957e4e164f76cd4a.bin.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
a9dea10c6d4d205faab1ac8db69384e9c3dc91fd5a718266957e4e164f76cd4a.bin.exe
-
Size
311KB
-
MD5
0050729426253655c88625a8ad93d7a2
-
SHA1
a8ea376bc26eba3ff32e72cb2bf43cccfa1c87d7
-
SHA256
a9dea10c6d4d205faab1ac8db69384e9c3dc91fd5a718266957e4e164f76cd4a
-
SHA512
1947c78aba1933c3da2eed125d760bf7c4b3bf75a113139a22db0d2f1e1e3e8b4640c0330b5220712275884567daf9548467a96747fb550fc8cb24dfc989d37c
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 928 created 3128 928 WerFault.exe 67 -
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/3128-116-0x0000000000400000-0x00000000016C0000-memory.dmp family_arkei behavioral2/memory/3128-115-0x0000000001930000-0x0000000001949000-memory.dmp family_arkei -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 928 3128 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe 928 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 928 WerFault.exe Token: SeBackupPrivilege 928 WerFault.exe Token: SeDebugPrivilege 928 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9dea10c6d4d205faab1ac8db69384e9c3dc91fd5a718266957e4e164f76cd4a.bin.exe"C:\Users\Admin\AppData\Local\Temp\a9dea10c6d4d205faab1ac8db69384e9c3dc91fd5a718266957e4e164f76cd4a.bin.exe"1⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 12122⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-