Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2022 21:01
Static task
static1
General
-
Target
00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe
-
Size
391KB
-
MD5
c84175424742f493d651528b48c78625
-
SHA1
e285f6ab88db41d061a0fe1bdb4c27a4e7bf4cd1
-
SHA256
00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e
-
SHA512
4af7f80b2553aac62ac39fe90bef98e7ab9f718a3545bc9d5774b8eef5ae922d266e2ca1800ab98ed7cb0cf7721fe5a4bb9e8781a21b8bb22377f520ed6e0160
-
SSDEEP
6144:LUmp8bNhfKU69+2cby4kktoOiymoR3wqSDvgWQeQIm/pBuIz/um/:LpcgE2cby4kktoOcTqaZ8xBj
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{96A3073D-F54A-4FCD-998E-D393F024ECC2}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{6FB1736B-B66A-4757-A2B0-D3E1CAB3266F}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2388 2228 WerFault.exe 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe 2228 00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe"C:\Users\Admin\AppData\Local\Temp\00831b5a524994073f457da9d77070d1b9f13cc54af51ef327e1d650416c740e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 26442⤵
- Program crash
PID:2388
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2228 -ip 22281⤵PID:1672