Analysis

  • max time kernel
    156s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    13-04-2022 09:03

General

  • Target

    b28fc9836a813d8b248224a3fd2a5e32.exe

  • Size

    352KB

  • MD5

    b28fc9836a813d8b248224a3fd2a5e32

  • SHA1

    0549eb66e64febe4805b63a303c806efc0c66816

  • SHA256

    5c7a8f5ee1e39a49be7fa173ed0f3a447908c03d5dbde65669dcc483e19bad9b

  • SHA512

    e06c9ad2495e27a66b0cd9d3bab1a2638e3faf30f7af4e063e29b1f7c34ff45a5bfccd400c53540fd8dd9785b268483908ba078852266040dc3ed7ec6ffce907

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b28fc9836a813d8b248224a3fd2a5e32.exe
    "C:\Users\Admin\AppData\Local\Temp\b28fc9836a813d8b248224a3fd2a5e32.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 1140
      2⤵
      • Program crash
      PID:2848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 644 -ip 644
    1⤵
      PID:2040

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/644-124-0x00000000007AC000-0x00000000007D6000-memory.dmp
      Filesize

      168KB

    • memory/644-125-0x00000000007AC000-0x00000000007D6000-memory.dmp
      Filesize

      168KB

    • memory/644-126-0x0000000000710000-0x0000000000747000-memory.dmp
      Filesize

      220KB

    • memory/644-127-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/644-128-0x0000000004B30000-0x00000000050D4000-memory.dmp
      Filesize

      5.6MB

    • memory/644-129-0x0000000005150000-0x0000000005768000-memory.dmp
      Filesize

      6.1MB

    • memory/644-130-0x0000000005800000-0x0000000005812000-memory.dmp
      Filesize

      72KB

    • memory/644-131-0x0000000005820000-0x000000000592A000-memory.dmp
      Filesize

      1.0MB

    • memory/644-132-0x0000000005970000-0x00000000059AC000-memory.dmp
      Filesize

      240KB

    • memory/644-133-0x0000000004B24000-0x0000000004B26000-memory.dmp
      Filesize

      8KB

    • memory/644-134-0x0000000005C50000-0x0000000005CC6000-memory.dmp
      Filesize

      472KB

    • memory/644-135-0x0000000005CD0000-0x0000000005D62000-memory.dmp
      Filesize

      584KB

    • memory/644-136-0x0000000005DF0000-0x0000000005E0E000-memory.dmp
      Filesize

      120KB

    • memory/644-137-0x0000000005F70000-0x0000000005FD6000-memory.dmp
      Filesize

      408KB

    • memory/644-138-0x00000000067C0000-0x0000000006982000-memory.dmp
      Filesize

      1.8MB

    • memory/644-139-0x0000000006990000-0x0000000006EBC000-memory.dmp
      Filesize

      5.2MB