Malware Analysis Report

2024-08-06 08:28

Sample ID 220512-n9j6esgecm
Target 03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516
SHA256 03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516
Tags
elysiumstealer discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516

Threat Level: Known bad

The file 03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516 was found to be: Known bad.

Malicious Activity Summary

elysiumstealer discovery spyware stealer

ElysiumStealer

Reads user/profile data of web browsers

Checks installed software on the system

Program crash

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2022-05-12 12:05

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-12 12:05

Reported

2022-05-12 12:32

Platform

win7-20220414-en

Max time kernel

53s

Max time network

99s

Command Line

"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe

"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 1192

Network

Country Destination Domain Proto
US 8.8.8.8:53 t4p.xyz udp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp

Files

memory/952-54-0x0000000001390000-0x00000000013D6000-memory.dmp

memory/952-55-0x0000000000380000-0x0000000000386000-memory.dmp

memory/952-56-0x00000000004C0000-0x0000000000500000-memory.dmp

memory/952-57-0x0000000000540000-0x0000000000546000-memory.dmp

memory/952-58-0x00000000753B1000-0x00000000753B3000-memory.dmp

memory/336-59-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-12 12:05

Reported

2022-05-12 12:30

Platform

win10v2004-20220414-en

Max time kernel

100s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe

"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4328 -ip 4328

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1764

Network

Country Destination Domain Proto
NL 104.110.191.133:80 tcp
US 8.8.8.8:53 t4p.xyz udp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp
DE 52.58.78.16:80 t4p.xyz tcp
US 20.189.173.13:443 tcp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
NL 95.101.78.209:80 tcp

Files

memory/4328-130-0x0000000000860000-0x00000000008A6000-memory.dmp

memory/4328-131-0x00000000081A0000-0x0000000008206000-memory.dmp

memory/4328-132-0x00000000083F0000-0x0000000008482000-memory.dmp

memory/4328-133-0x0000000008A40000-0x0000000008FE4000-memory.dmp

memory/4328-134-0x0000000008840000-0x0000000008890000-memory.dmp

memory/4328-135-0x0000000008930000-0x00000000089CC000-memory.dmp