Analysis

  • max time kernel
    108s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    12/04/2022, 17:07

General

  • Target

    12641c927d9ac97f1d6bcc3e9ba44f5f.exe

  • Size

    364KB

  • MD5

    12641c927d9ac97f1d6bcc3e9ba44f5f

  • SHA1

    0911ab6e5b2717db5a5491524e70ddd98872a16c

  • SHA256

    2ff897898ea61c755da22b2bffd9342c57f43db7e47aae4ec93d61f4fb09d21f

  • SHA512

    6b1b54d1ce5270589ec10843d1e978950c115c967267cc4ed22055e5e657fade446f947bdb706f72a57df51cdbbbb299b469c3f056cbe7b4df374662e2b190ad

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12641c927d9ac97f1d6bcc3e9ba44f5f.exe
    "C:\Users\Admin\AppData\Local\Temp\12641c927d9ac97f1d6bcc3e9ba44f5f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 1304
      2⤵
      • Program crash
      PID:3456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4968 -ip 4968
    1⤵
      PID:308

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4968-124-0x00000000007F2000-0x000000000081C000-memory.dmp

      Filesize

      168KB

    • memory/4968-125-0x00000000007F2000-0x000000000081C000-memory.dmp

      Filesize

      168KB

    • memory/4968-126-0x0000000000710000-0x0000000000747000-memory.dmp

      Filesize

      220KB

    • memory/4968-127-0x0000000000400000-0x0000000000484000-memory.dmp

      Filesize

      528KB

    • memory/4968-128-0x0000000004D30000-0x00000000052D4000-memory.dmp

      Filesize

      5.6MB

    • memory/4968-129-0x00000000052E0000-0x00000000058F8000-memory.dmp

      Filesize

      6.1MB

    • memory/4968-130-0x0000000004C40000-0x0000000004C52000-memory.dmp

      Filesize

      72KB

    • memory/4968-131-0x0000000005900000-0x0000000005A0A000-memory.dmp

      Filesize

      1.0MB

    • memory/4968-132-0x0000000004CE0000-0x0000000004D1C000-memory.dmp

      Filesize

      240KB

    • memory/4968-133-0x0000000004D24000-0x0000000004D26000-memory.dmp

      Filesize

      8KB

    • memory/4968-134-0x0000000006040000-0x00000000060D2000-memory.dmp

      Filesize

      584KB

    • memory/4968-135-0x00000000060E0000-0x0000000006146000-memory.dmp

      Filesize

      408KB

    • memory/4968-136-0x0000000006570000-0x00000000065E6000-memory.dmp

      Filesize

      472KB

    • memory/4968-137-0x0000000006640000-0x000000000665E000-memory.dmp

      Filesize

      120KB

    • memory/4968-138-0x0000000006A70000-0x0000000006C32000-memory.dmp

      Filesize

      1.8MB

    • memory/4968-139-0x0000000006C40000-0x000000000716C000-memory.dmp

      Filesize

      5.2MB