Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-03-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe
Resource
win10v2004-en-20220112
General
-
Target
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe
-
Size
2.5MB
-
MD5
e72c5e8bef42ca93d84809c6f7d1b47e
-
SHA1
8009768ac1472a6b73ba77db882f1cc621ca53d5
-
SHA256
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6
-
SHA512
28f3f1eef5bfedda2484b6768f5e086d05803574e514296466b9c9e6e262f87bbcda7cdcfec7ebe72954bf10a7bc9a74e347eff1ffeb6ecd7b9e08f29b2a79bb
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-59-0x0000000000400000-0x000000000062C000-memory.dmp elysiumstealer behavioral1/memory/1648-61-0x0000000002770000-0x000000000277C000-memory.dmp elysiumstealer -
Loads dropped DLL 1 IoCs
Processes:
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exepid Process 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exedescription pid Process Token: SeDebugPrivilege 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exedescription pid Process procid_target PID 1648 wrote to memory of 112 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 28 PID 1648 wrote to memory of 112 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 28 PID 1648 wrote to memory of 112 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 28 PID 1648 wrote to memory of 112 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 28 PID 1648 wrote to memory of 668 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 30 PID 1648 wrote to memory of 668 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 30 PID 1648 wrote to memory of 668 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 30 PID 1648 wrote to memory of 668 1648 dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe"C:\Users\Admin\AppData\Local\Temp\dc68c56376057b68b1d9339e321e30cb35824772dd0eba0714ca8d1a0697fcc6.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵PID:112
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵PID:668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4fa23d4e3390b324b06fe8d71a2a3d89
SHA135466bba9f46aa1c52ae48c2166b01d8b61073b7
SHA256143d6d42556ab0d79703c0a05a545a03bda5842e71a926fa4311150350d30052
SHA512fd842ef1e6f8beebc452a5b79d195473e780906d3c927d6dca11ed4477caf05bff15818c9dc5a87e6217009b1fed3257eb04e4cb46f01b10063fe778619543e3