Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:14
Static task
static1
Behavioral task
behavioral1
Sample
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe
Resource
win10v2004-20220414-en
General
-
Target
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe
-
Size
239KB
-
MD5
83c90a20a056438389c364ca393dbda0
-
SHA1
1eb244c4a779ec8e1325dc1610145e15f2b72730
-
SHA256
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb
-
SHA512
db6e9dea465a383d3214a153cc746b9aeecf79975eedad52ae56430c1789ca80bef64081a36b5a5835110235d45eb9950d77b1b98080bd27f7be5a8008169235
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1176 1384 WerFault.exe 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exepid process 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exedescription pid process Token: SeDebugPrivilege 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exedescription pid process target process PID 1384 wrote to memory of 1176 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe WerFault.exe PID 1384 wrote to memory of 1176 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe WerFault.exe PID 1384 wrote to memory of 1176 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe WerFault.exe PID 1384 wrote to memory of 1176 1384 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe"C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11962⤵
- Program crash
PID:1176
-