Analysis Overview
SHA256
07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb
Threat Level: Known bad
The file 07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb was found to be: Known bad.
Malicious Activity Summary
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-05-02 15:14
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-02 15:14
Reported
2022-05-02 15:59
Platform
win10v2004-20220414-en
Max time kernel
151s
Max time network
162s
Command Line
Signatures
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe
"C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2032 -ip 2032
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1748
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
Network
| Country | Destination | Domain | Proto |
| FR | 2.18.109.224:443 | tcp | |
| FR | 2.18.109.224:443 | storesdk.dsx.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | t4p.xyz | udp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| US | 20.189.173.1:443 | tcp | |
| US | 8.8.8.8:53 | tsfe.trafficshaping.dsp.mp.microsoft.com | udp |
| IE | 20.54.110.119:443 | tsfe.trafficshaping.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | tlu.dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 104.18.25.243:80 | tcp | |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
Files
memory/2032-130-0x00000000005F0000-0x0000000000634000-memory.dmp
memory/2032-131-0x000000000E290000-0x000000000E2F6000-memory.dmp
memory/2032-132-0x000000000E4C0000-0x000000000E552000-memory.dmp
memory/2032-133-0x000000000EB10000-0x000000000F0B4000-memory.dmp
memory/2032-134-0x000000000E9D0000-0x000000000EA6C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-02 15:14
Reported
2022-05-02 16:00
Platform
win7-20220414-en
Max time kernel
118s
Max time network
122s
Command Line
Signatures
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1384 wrote to memory of 1176 | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1384 wrote to memory of 1176 | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1384 wrote to memory of 1176 | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1384 wrote to memory of 1176 | N/A | C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe
"C:\Users\Admin\AppData\Local\Temp\07b53afa85d5cbf56d52fe81e8e565f2378b2c98a32975f6e455703080b5adcb.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 1196
Network
| Country | Destination | Domain | Proto |
| US | 158.101.44.242:80 | tcp | |
| US | 8.8.8.8:53 | t4p.xyz | udp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
Files
memory/1384-54-0x0000000000A20000-0x0000000000A64000-memory.dmp
memory/1384-55-0x0000000000340000-0x0000000000346000-memory.dmp
memory/1384-56-0x00000000003E0000-0x000000000041C000-memory.dmp
memory/1384-57-0x0000000000420000-0x0000000000426000-memory.dmp
memory/1384-58-0x0000000075FC1000-0x0000000075FC3000-memory.dmp
memory/1176-59-0x0000000000000000-mapping.dmp