Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:19
Static task
static1
Behavioral task
behavioral1
Sample
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
Resource
win10v2004-20220414-en
General
-
Target
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
-
Size
405KB
-
MD5
4328a8e91296320c208b5ac9f7634bf9
-
SHA1
a173f1352345d9e5aa1aa8b37d288dcd953dad48
-
SHA256
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3
-
SHA512
8463c544199c85d96124dfac3d92229b3a29d0002b79328554c00b6af74309059c163f0ea70c378ca80bf0360fc728c1f2ed7f3bd71a8f47ba82c9f679227428
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4308 548 WerFault.exe ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exepid process 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exedescription pid process Token: SeDebugPrivilege 548 ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe"C:\Users\Admin\AppData\Local\Temp\ea073da8a4bb2e317f717a2d43a7aee76a92c42f568f724ea70beb2794938ee3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 17722⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 548 -ip 5481⤵PID:3540