Analysis
-
max time kernel
49s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 06:46
Static task
static1
General
-
Target
b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe
-
Size
4.7MB
-
MD5
60b955e722f561bcd1ce5e09ec92c638
-
SHA1
e55a37b9f59f3b9d97b9ceff552000052a50769e
-
SHA256
b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae
-
SHA512
16b66211f8b806a7e1b0c6ee0faa24979840db96fbffcc09fc5d32854dd399a854d14dbae06c72687df4591f4ea8164f2c40962c52aede2aa7aa98d0f8473f8a
-
SSDEEP
98304:m2hlpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7:mMbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 2320 328 WerFault.exe 65 3096 328 WerFault.exe 65 3488 328 WerFault.exe 65 3980 328 WerFault.exe 65 1300 328 WerFault.exe 65 4560 328 WerFault.exe 65 2428 328 WerFault.exe 65 3704 328 WerFault.exe 65 4076 328 WerFault.exe 65 2284 328 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4532 wmic.exe Token: SeSecurityPrivilege 4532 wmic.exe Token: SeTakeOwnershipPrivilege 4532 wmic.exe Token: SeLoadDriverPrivilege 4532 wmic.exe Token: SeSystemProfilePrivilege 4532 wmic.exe Token: SeSystemtimePrivilege 4532 wmic.exe Token: SeProfSingleProcessPrivilege 4532 wmic.exe Token: SeIncBasePriorityPrivilege 4532 wmic.exe Token: SeCreatePagefilePrivilege 4532 wmic.exe Token: SeBackupPrivilege 4532 wmic.exe Token: SeRestorePrivilege 4532 wmic.exe Token: SeShutdownPrivilege 4532 wmic.exe Token: SeDebugPrivilege 4532 wmic.exe Token: SeSystemEnvironmentPrivilege 4532 wmic.exe Token: SeRemoteShutdownPrivilege 4532 wmic.exe Token: SeUndockPrivilege 4532 wmic.exe Token: SeManageVolumePrivilege 4532 wmic.exe Token: 33 4532 wmic.exe Token: 34 4532 wmic.exe Token: 35 4532 wmic.exe Token: 36 4532 wmic.exe Token: SeIncreaseQuotaPrivilege 4532 wmic.exe Token: SeSecurityPrivilege 4532 wmic.exe Token: SeTakeOwnershipPrivilege 4532 wmic.exe Token: SeLoadDriverPrivilege 4532 wmic.exe Token: SeSystemProfilePrivilege 4532 wmic.exe Token: SeSystemtimePrivilege 4532 wmic.exe Token: SeProfSingleProcessPrivilege 4532 wmic.exe Token: SeIncBasePriorityPrivilege 4532 wmic.exe Token: SeCreatePagefilePrivilege 4532 wmic.exe Token: SeBackupPrivilege 4532 wmic.exe Token: SeRestorePrivilege 4532 wmic.exe Token: SeShutdownPrivilege 4532 wmic.exe Token: SeDebugPrivilege 4532 wmic.exe Token: SeSystemEnvironmentPrivilege 4532 wmic.exe Token: SeRemoteShutdownPrivilege 4532 wmic.exe Token: SeUndockPrivilege 4532 wmic.exe Token: SeManageVolumePrivilege 4532 wmic.exe Token: 33 4532 wmic.exe Token: 34 4532 wmic.exe Token: 35 4532 wmic.exe Token: 36 4532 wmic.exe Token: SeIncreaseQuotaPrivilege 4884 WMIC.exe Token: SeSecurityPrivilege 4884 WMIC.exe Token: SeTakeOwnershipPrivilege 4884 WMIC.exe Token: SeLoadDriverPrivilege 4884 WMIC.exe Token: SeSystemProfilePrivilege 4884 WMIC.exe Token: SeSystemtimePrivilege 4884 WMIC.exe Token: SeProfSingleProcessPrivilege 4884 WMIC.exe Token: SeIncBasePriorityPrivilege 4884 WMIC.exe Token: SeCreatePagefilePrivilege 4884 WMIC.exe Token: SeBackupPrivilege 4884 WMIC.exe Token: SeRestorePrivilege 4884 WMIC.exe Token: SeShutdownPrivilege 4884 WMIC.exe Token: SeDebugPrivilege 4884 WMIC.exe Token: SeSystemEnvironmentPrivilege 4884 WMIC.exe Token: SeRemoteShutdownPrivilege 4884 WMIC.exe Token: SeUndockPrivilege 4884 WMIC.exe Token: SeManageVolumePrivilege 4884 WMIC.exe Token: 33 4884 WMIC.exe Token: 34 4884 WMIC.exe Token: 35 4884 WMIC.exe Token: 36 4884 WMIC.exe Token: SeIncreaseQuotaPrivilege 4884 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 328 wrote to memory of 4532 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 73 PID 328 wrote to memory of 4532 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 73 PID 328 wrote to memory of 4532 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 73 PID 328 wrote to memory of 4356 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 78 PID 328 wrote to memory of 4356 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 78 PID 328 wrote to memory of 4356 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 78 PID 4356 wrote to memory of 4884 4356 cmd.exe 81 PID 4356 wrote to memory of 4884 4356 cmd.exe 81 PID 4356 wrote to memory of 4884 4356 cmd.exe 81 PID 328 wrote to memory of 5012 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 82 PID 328 wrote to memory of 5012 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 82 PID 328 wrote to memory of 5012 328 b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe 82 PID 5012 wrote to memory of 1820 5012 cmd.exe 84 PID 5012 wrote to memory of 1820 5012 cmd.exe 84 PID 5012 wrote to memory of 1820 5012 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe"C:\Users\Admin\AppData\Local\Temp\b9468b825024d6a9c0eb0466a2565d3107a84e5118a4f4f8530b0d5ba6882dae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 5242⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 5442⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 5682⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 6202⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 7282⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 8842⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 13362⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 12962⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 13722⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:1820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 2722⤵
- Program crash
PID:2284
-