Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
5444bb6ecd7a6a7cf116727b040dce76.exe
Resource
win7-20220715-en
General
-
Target
5444bb6ecd7a6a7cf116727b040dce76.exe
-
Size
286KB
-
MD5
5444bb6ecd7a6a7cf116727b040dce76
-
SHA1
a6b4491e2725856660d813d6d584dab208ac4107
-
SHA256
35e6c3107e12e99a041a0d5a1d467b9c985463d1c04ecef5b02a70ea52974133
-
SHA512
03d11c8eeb016a3ee418383b440b670e6e75c565874a22e4201063e7ba9ed73bd0d9b4d4aeb3a57843516c532f7aab9b130142f516df30c9e5237d224c92b620
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3028 4492 WerFault.exe 5444bb6ecd7a6a7cf116727b040dce76.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5444bb6ecd7a6a7cf116727b040dce76.exepid process 4492 5444bb6ecd7a6a7cf116727b040dce76.exe 4492 5444bb6ecd7a6a7cf116727b040dce76.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5444bb6ecd7a6a7cf116727b040dce76.exedescription pid process Token: SeDebugPrivilege 4492 5444bb6ecd7a6a7cf116727b040dce76.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5444bb6ecd7a6a7cf116727b040dce76.exe"C:\Users\Admin\AppData\Local\Temp\5444bb6ecd7a6a7cf116727b040dce76.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 25202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4492 -ip 44921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4492-132-0x0000000002798000-0x00000000027C3000-memory.dmpFilesize
172KB
-
memory/4492-133-0x0000000002610000-0x0000000002648000-memory.dmpFilesize
224KB
-
memory/4492-134-0x0000000000400000-0x00000000024CA000-memory.dmpFilesize
32.8MB
-
memory/4492-135-0x0000000006E30000-0x00000000073D4000-memory.dmpFilesize
5.6MB
-
memory/4492-136-0x00000000073E0000-0x00000000079F8000-memory.dmpFilesize
6.1MB
-
memory/4492-137-0x0000000006C80000-0x0000000006C92000-memory.dmpFilesize
72KB
-
memory/4492-138-0x0000000006CA0000-0x0000000006DAA000-memory.dmpFilesize
1.0MB
-
memory/4492-139-0x0000000006DD0000-0x0000000006E0C000-memory.dmpFilesize
240KB
-
memory/4492-140-0x0000000002798000-0x00000000027C3000-memory.dmpFilesize
172KB
-
memory/4492-141-0x0000000000400000-0x00000000024CA000-memory.dmpFilesize
32.8MB
-
memory/4492-142-0x0000000008920000-0x00000000089B2000-memory.dmpFilesize
584KB
-
memory/4492-143-0x00000000089D0000-0x0000000008A36000-memory.dmpFilesize
408KB
-
memory/4492-144-0x0000000008D20000-0x0000000008D96000-memory.dmpFilesize
472KB
-
memory/4492-145-0x0000000008F40000-0x0000000008F5E000-memory.dmpFilesize
120KB
-
memory/4492-146-0x0000000009230000-0x0000000009280000-memory.dmpFilesize
320KB
-
memory/4492-147-0x00000000095E0000-0x00000000097A2000-memory.dmpFilesize
1.8MB
-
memory/4492-148-0x00000000097B0000-0x0000000009CDC000-memory.dmpFilesize
5.2MB
-
memory/4492-149-0x0000000002798000-0x00000000027C3000-memory.dmpFilesize
172KB
-
memory/4492-150-0x0000000000400000-0x00000000024CA000-memory.dmpFilesize
32.8MB