Analysis

  • max time kernel
    127s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-04-2022 03:41

General

  • Target

    2245bcc8a29546d7857680789e3c5570.exe

  • Size

    345KB

  • MD5

    2245bcc8a29546d7857680789e3c5570

  • SHA1

    67603329135d4729a9929c42f5176f4f5e3d748f

  • SHA256

    94b78106989de9df32a0db19e58d3c79292bad1c125e3b699b7f5f2c099c8156

  • SHA512

    c4d6552aa5c2d51938ed5e32283e853a1de0149584c47d08a55881293f65c89e24e0cd77598de6712d40fba00dc017e6f22e58ff05f8a8fc8362622c171b07df

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2245bcc8a29546d7857680789e3c5570.exe
    "C:\Users\Admin\AppData\Local\Temp\2245bcc8a29546d7857680789e3c5570.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 1804
      2⤵
      • Program crash
      PID:3092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 664 -ip 664
    1⤵
      PID:3140

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/664-130-0x0000000000577000-0x00000000005A1000-memory.dmp

      Filesize

      168KB

    • memory/664-131-0x0000000004B20000-0x00000000050C4000-memory.dmp

      Filesize

      5.6MB

    • memory/664-132-0x0000000000577000-0x00000000005A1000-memory.dmp

      Filesize

      168KB

    • memory/664-133-0x00000000008E0000-0x0000000000917000-memory.dmp

      Filesize

      220KB

    • memory/664-134-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/664-135-0x00000000050D0000-0x00000000056E8000-memory.dmp

      Filesize

      6.1MB

    • memory/664-136-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/664-137-0x00000000056F0000-0x00000000057FA000-memory.dmp

      Filesize

      1.0MB

    • memory/664-138-0x0000000005840000-0x000000000587C000-memory.dmp

      Filesize

      240KB

    • memory/664-139-0x0000000004B14000-0x0000000004B16000-memory.dmp

      Filesize

      8KB

    • memory/664-140-0x0000000005B20000-0x0000000005BB2000-memory.dmp

      Filesize

      584KB

    • memory/664-141-0x0000000005BC0000-0x0000000005C36000-memory.dmp

      Filesize

      472KB

    • memory/664-142-0x0000000005CC0000-0x0000000005CDE000-memory.dmp

      Filesize

      120KB

    • memory/664-143-0x0000000005EA0000-0x0000000005F06000-memory.dmp

      Filesize

      408KB

    • memory/664-144-0x0000000006580000-0x0000000006742000-memory.dmp

      Filesize

      1.8MB

    • memory/664-145-0x0000000006750000-0x0000000006C7C000-memory.dmp

      Filesize

      5.2MB