Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 20:19
Static task
static1
Behavioral task
behavioral1
Sample
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
Resource
win10v2004-20220414-en
General
-
Target
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
-
Size
405KB
-
MD5
4328a8e91296320c208b5ac9f7634bf9
-
SHA1
a173f1352345d9e5aa1aa8b37d288dcd953dad48
-
SHA256
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3
-
SHA512
8463c544199c85d96124dfac3d92229b3a29d0002b79328554c00b6af74309059c163f0ea70c378ca80bf0360fc728c1f2ed7f3bd71a8f47ba82c9f679227428
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1368 968 WerFault.exe ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exepid process 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exedescription pid process Token: SeDebugPrivilege 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exedescription pid process target process PID 968 wrote to memory of 1368 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe WerFault.exe PID 968 wrote to memory of 1368 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe WerFault.exe PID 968 wrote to memory of 1368 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe WerFault.exe PID 968 wrote to memory of 1368 968 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe"C:\Users\Admin\AppData\Local\Temp\ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 12482⤵
- Program crash
PID:1368
-