Analysis
-
max time kernel
124s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 18:40
Static task
static1
General
-
Target
10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe
-
Size
4.7MB
-
MD5
a00d4b3c4562117a45c82c5c4a55938e
-
SHA1
72d1c9cba5e147051804b409d2be87da6eb618aa
-
SHA256
10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78
-
SHA512
02d771c511129224f560a480595823dcfc4c07126f157ace802522ab3e5bab52f9a278feb40330384831c915ac4d3a7993f46231a3059798053bb40c9c34244b
-
SSDEEP
98304:z2hzpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7:z+bFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 4856 4248 WerFault.exe 81 4940 4248 WerFault.exe 81 2684 4248 WerFault.exe 81 5004 4248 WerFault.exe 81 1116 4248 WerFault.exe 81 3176 4248 WerFault.exe 81 1772 4248 WerFault.exe 81 3236 4248 WerFault.exe 81 2116 4248 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3304 wmic.exe Token: SeSecurityPrivilege 3304 wmic.exe Token: SeTakeOwnershipPrivilege 3304 wmic.exe Token: SeLoadDriverPrivilege 3304 wmic.exe Token: SeSystemProfilePrivilege 3304 wmic.exe Token: SeSystemtimePrivilege 3304 wmic.exe Token: SeProfSingleProcessPrivilege 3304 wmic.exe Token: SeIncBasePriorityPrivilege 3304 wmic.exe Token: SeCreatePagefilePrivilege 3304 wmic.exe Token: SeBackupPrivilege 3304 wmic.exe Token: SeRestorePrivilege 3304 wmic.exe Token: SeShutdownPrivilege 3304 wmic.exe Token: SeDebugPrivilege 3304 wmic.exe Token: SeSystemEnvironmentPrivilege 3304 wmic.exe Token: SeRemoteShutdownPrivilege 3304 wmic.exe Token: SeUndockPrivilege 3304 wmic.exe Token: SeManageVolumePrivilege 3304 wmic.exe Token: 33 3304 wmic.exe Token: 34 3304 wmic.exe Token: 35 3304 wmic.exe Token: 36 3304 wmic.exe Token: SeIncreaseQuotaPrivilege 3304 wmic.exe Token: SeSecurityPrivilege 3304 wmic.exe Token: SeTakeOwnershipPrivilege 3304 wmic.exe Token: SeLoadDriverPrivilege 3304 wmic.exe Token: SeSystemProfilePrivilege 3304 wmic.exe Token: SeSystemtimePrivilege 3304 wmic.exe Token: SeProfSingleProcessPrivilege 3304 wmic.exe Token: SeIncBasePriorityPrivilege 3304 wmic.exe Token: SeCreatePagefilePrivilege 3304 wmic.exe Token: SeBackupPrivilege 3304 wmic.exe Token: SeRestorePrivilege 3304 wmic.exe Token: SeShutdownPrivilege 3304 wmic.exe Token: SeDebugPrivilege 3304 wmic.exe Token: SeSystemEnvironmentPrivilege 3304 wmic.exe Token: SeRemoteShutdownPrivilege 3304 wmic.exe Token: SeUndockPrivilege 3304 wmic.exe Token: SeManageVolumePrivilege 3304 wmic.exe Token: 33 3304 wmic.exe Token: 34 3304 wmic.exe Token: 35 3304 wmic.exe Token: 36 3304 wmic.exe Token: SeIncreaseQuotaPrivilege 3656 WMIC.exe Token: SeSecurityPrivilege 3656 WMIC.exe Token: SeTakeOwnershipPrivilege 3656 WMIC.exe Token: SeLoadDriverPrivilege 3656 WMIC.exe Token: SeSystemProfilePrivilege 3656 WMIC.exe Token: SeSystemtimePrivilege 3656 WMIC.exe Token: SeProfSingleProcessPrivilege 3656 WMIC.exe Token: SeIncBasePriorityPrivilege 3656 WMIC.exe Token: SeCreatePagefilePrivilege 3656 WMIC.exe Token: SeBackupPrivilege 3656 WMIC.exe Token: SeRestorePrivilege 3656 WMIC.exe Token: SeShutdownPrivilege 3656 WMIC.exe Token: SeDebugPrivilege 3656 WMIC.exe Token: SeSystemEnvironmentPrivilege 3656 WMIC.exe Token: SeRemoteShutdownPrivilege 3656 WMIC.exe Token: SeUndockPrivilege 3656 WMIC.exe Token: SeManageVolumePrivilege 3656 WMIC.exe Token: 33 3656 WMIC.exe Token: 34 3656 WMIC.exe Token: 35 3656 WMIC.exe Token: 36 3656 WMIC.exe Token: SeIncreaseQuotaPrivilege 3656 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3304 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 97 PID 4248 wrote to memory of 3304 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 97 PID 4248 wrote to memory of 3304 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 97 PID 4248 wrote to memory of 4268 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 103 PID 4248 wrote to memory of 4268 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 103 PID 4248 wrote to memory of 4268 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 103 PID 4268 wrote to memory of 3656 4268 cmd.exe 105 PID 4268 wrote to memory of 3656 4268 cmd.exe 105 PID 4268 wrote to memory of 3656 4268 cmd.exe 105 PID 4248 wrote to memory of 4444 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 106 PID 4248 wrote to memory of 4444 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 106 PID 4248 wrote to memory of 4444 4248 10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe 106 PID 4444 wrote to memory of 4016 4444 cmd.exe 108 PID 4444 wrote to memory of 4016 4444 cmd.exe 108 PID 4444 wrote to memory of 4016 4444 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe"C:\Users\Admin\AppData\Local\Temp\10abef66a898027d0659b3681b5ca6692d8e26c15980b64b6e2d5c978c54be78.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 5362⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 5402⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 5402⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6162⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6562⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6882⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 8642⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 13842⤵
- Program crash
PID:3236
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 1402⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4248 -ip 42481⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4248 -ip 42481⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4248 -ip 42481⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4248 -ip 42481⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4248 -ip 42481⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4248 -ip 42481⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4248 -ip 42481⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4248 -ip 42481⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4248 -ip 42481⤵PID:1564