Analysis
-
max time kernel
139s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-05-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
Offscum.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
Offscum.exe
-
Size
432KB
-
MD5
b4ba22a13b1a66f8bfc47f85bea75518
-
SHA1
4e9a9617ce6a63bd594b7bb85fef8653f0dce90f
-
SHA256
c20499e98929a331bf3eb05ecddb60fa6a331ba882864d94fd5c622cbfb0e140
-
SHA512
50a6e4f78a8aacd26136b6277f1dcdcf4fb95ef78be29f61e955bad03a197ed8f94461ff80b6c4f333e96276d2636497a02ffcdf80ff8e431c7d1d7d56dad2a6
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1284 3552 WerFault.exe Offscum.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Offscum.exepid process 3552 Offscum.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Offscum.exedescription pid process Token: SeDebugPrivilege 3552 Offscum.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Offscum.exe"C:\Users\Admin\AppData\Local\Temp\Offscum.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 23882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3552 -ip 35521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3552-130-0x0000000002ECD000-0x0000000002EF7000-memory.dmpFilesize
168KB
-
memory/3552-131-0x0000000002E30000-0x0000000002E67000-memory.dmpFilesize
220KB
-
memory/3552-132-0x0000000000400000-0x0000000002B8A000-memory.dmpFilesize
39.5MB
-
memory/3552-133-0x00000000073F0000-0x0000000007994000-memory.dmpFilesize
5.6MB
-
memory/3552-134-0x00000000079A0000-0x0000000007FB8000-memory.dmpFilesize
6.1MB
-
memory/3552-135-0x0000000007330000-0x0000000007342000-memory.dmpFilesize
72KB
-
memory/3552-136-0x0000000007FC0000-0x00000000080CA000-memory.dmpFilesize
1.0MB
-
memory/3552-137-0x0000000007350000-0x000000000738C000-memory.dmpFilesize
240KB
-
memory/3552-138-0x0000000008FB0000-0x0000000009026000-memory.dmpFilesize
472KB
-
memory/3552-139-0x0000000009070000-0x0000000009102000-memory.dmpFilesize
584KB
-
memory/3552-140-0x0000000009290000-0x00000000092AE000-memory.dmpFilesize
120KB
-
memory/3552-141-0x0000000009310000-0x0000000009376000-memory.dmpFilesize
408KB
-
memory/3552-142-0x00000000097C0000-0x0000000009982000-memory.dmpFilesize
1.8MB
-
memory/3552-143-0x0000000009990000-0x0000000009EBC000-memory.dmpFilesize
5.2MB