Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
bba7db09449a22cfe8f3310bf1238210.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
bba7db09449a22cfe8f3310bf1238210.exe
-
Size
371KB
-
MD5
bba7db09449a22cfe8f3310bf1238210
-
SHA1
49ce80fb77d7a06c4de52ddf2457e1dfceb7661c
-
SHA256
ffd0e59168d8d32c26f16e557b26d7fc45a748ae3d2621f40c740848762249a6
-
SHA512
930a6dae0d84521584022956aa8f6fffc2f1bd17d4b009647fd23dfc600da9936360ac56f3b5c393a9a61e1f6f1c9846d29b3786f6713383c7cf060653fc5168
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 452 3136 WerFault.exe bba7db09449a22cfe8f3310bf1238210.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bba7db09449a22cfe8f3310bf1238210.exepid process 3136 bba7db09449a22cfe8f3310bf1238210.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bba7db09449a22cfe8f3310bf1238210.exedescription pid process Token: SeDebugPrivilege 3136 bba7db09449a22cfe8f3310bf1238210.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba7db09449a22cfe8f3310bf1238210.exe"C:\Users\Admin\AppData\Local\Temp\bba7db09449a22cfe8f3310bf1238210.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 18002⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3136 -ip 31361⤵PID:4340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4472