Analysis Overview
SHA256
03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516
Threat Level: Known bad
The file 03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516 was found to be: Known bad.
Malicious Activity Summary
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-05-12 12:05
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-12 12:05
Reported
2022-05-12 12:32
Platform
win7-20220414-en
Max time kernel
53s
Max time network
99s
Command Line
Signatures
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 952 wrote to memory of 336 | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 952 wrote to memory of 336 | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 952 wrote to memory of 336 | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 952 wrote to memory of 336 | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe
"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 1192
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | t4p.xyz | udp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
Files
memory/952-54-0x0000000001390000-0x00000000013D6000-memory.dmp
memory/952-55-0x0000000000380000-0x0000000000386000-memory.dmp
memory/952-56-0x00000000004C0000-0x0000000000500000-memory.dmp
memory/952-57-0x0000000000540000-0x0000000000546000-memory.dmp
memory/952-58-0x00000000753B1000-0x00000000753B3000-memory.dmp
memory/336-59-0x0000000000000000-mapping.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-12 12:05
Reported
2022-05-12 12:30
Platform
win10v2004-20220414-en
Max time kernel
100s
Max time network
150s
Command Line
Signatures
ElysiumStealer
Reads user/profile data of web browsers
Checks installed software on the system
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe
"C:\Users\Admin\AppData\Local\Temp\03cd951548e9fd6336318f2b12e075c196e295c29a8003e67fc3c0ac77c95516.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4328 -ip 4328
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1764
Network
| Country | Destination | Domain | Proto |
| NL | 104.110.191.133:80 | tcp | |
| US | 8.8.8.8:53 | t4p.xyz | udp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| DE | 52.58.78.16:80 | t4p.xyz | tcp |
| US | 20.189.173.13:443 | tcp | |
| NL | 104.110.191.133:80 | tcp | |
| NL | 104.110.191.133:80 | tcp | |
| NL | 95.101.78.209:80 | tcp |
Files
memory/4328-130-0x0000000000860000-0x00000000008A6000-memory.dmp
memory/4328-131-0x00000000081A0000-0x0000000008206000-memory.dmp
memory/4328-132-0x00000000083F0000-0x0000000008482000-memory.dmp
memory/4328-133-0x0000000008A40000-0x0000000008FE4000-memory.dmp
memory/4328-134-0x0000000008840000-0x0000000008890000-memory.dmp
memory/4328-135-0x0000000008930000-0x00000000089CC000-memory.dmp