Analysis

  • max time kernel
    91s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 11:48

General

  • Target

    331c4997c96e9ff6527f1391da806ab74922c42bc79b7fd4e8892d964d8bb721.exe

  • Size

    418KB

  • MD5

    9e7e30cc84c286348cdfe8368d70f4c4

  • SHA1

    8ed40a98c971941f62739d0b151630bdc77c062e

  • SHA256

    331c4997c96e9ff6527f1391da806ab74922c42bc79b7fd4e8892d964d8bb721

  • SHA512

    6f66ccf24b289082f14b84031940a925aca35e21dff57486019fb661da0fd732dd4616175f7c707e4e3f464e209acb3495952cff52ea4e550d7bb8771c311c45

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\331c4997c96e9ff6527f1391da806ab74922c42bc79b7fd4e8892d964d8bb721.exe
    "C:\Users\Admin\AppData\Local\Temp\331c4997c96e9ff6527f1391da806ab74922c42bc79b7fd4e8892d964d8bb721.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 1740
      2⤵
      • Program crash
      PID:3820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 940 -ip 940
    1⤵
      PID:5004

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/940-130-0x0000000000520000-0x000000000058E000-memory.dmp

      Filesize

      440KB

    • memory/940-131-0x000000000AD70000-0x000000000ADD6000-memory.dmp

      Filesize

      408KB

    • memory/940-132-0x000000000B080000-0x000000000B112000-memory.dmp

      Filesize

      584KB

    • memory/940-133-0x000000000B6D0000-0x000000000BC74000-memory.dmp

      Filesize

      5.6MB

    • memory/940-134-0x000000000B430000-0x000000000B4CC000-memory.dmp

      Filesize

      624KB