Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 09:17
Static task
static1
General
-
Target
2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe
-
Size
4.7MB
-
MD5
95c9fbdf2d5fa3612543b10032c7761b
-
SHA1
f14cecdef4be1304142057bcdcd17dcdf05edee7
-
SHA256
2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b
-
SHA512
2cfcacc017cbe52e29f33984ad40f4049328f80b64eebd34c34f62d6fbf1c7406736449398bd64d69d328dfdcd904778dc69bdeb09ee18349d95ed73ae27374d
-
SSDEEP
98304:m2hGpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7:mlbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 2072 2700 WerFault.exe 65 4760 2700 WerFault.exe 65 4776 2700 WerFault.exe 65 5068 2700 WerFault.exe 65 2928 2700 WerFault.exe 65 1200 2700 WerFault.exe 65 4228 2700 WerFault.exe 65 4732 2700 WerFault.exe 65 4224 2700 WerFault.exe 65 1508 2700 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2296 wmic.exe Token: SeSecurityPrivilege 2296 wmic.exe Token: SeTakeOwnershipPrivilege 2296 wmic.exe Token: SeLoadDriverPrivilege 2296 wmic.exe Token: SeSystemProfilePrivilege 2296 wmic.exe Token: SeSystemtimePrivilege 2296 wmic.exe Token: SeProfSingleProcessPrivilege 2296 wmic.exe Token: SeIncBasePriorityPrivilege 2296 wmic.exe Token: SeCreatePagefilePrivilege 2296 wmic.exe Token: SeBackupPrivilege 2296 wmic.exe Token: SeRestorePrivilege 2296 wmic.exe Token: SeShutdownPrivilege 2296 wmic.exe Token: SeDebugPrivilege 2296 wmic.exe Token: SeSystemEnvironmentPrivilege 2296 wmic.exe Token: SeRemoteShutdownPrivilege 2296 wmic.exe Token: SeUndockPrivilege 2296 wmic.exe Token: SeManageVolumePrivilege 2296 wmic.exe Token: 33 2296 wmic.exe Token: 34 2296 wmic.exe Token: 35 2296 wmic.exe Token: 36 2296 wmic.exe Token: SeIncreaseQuotaPrivilege 2296 wmic.exe Token: SeSecurityPrivilege 2296 wmic.exe Token: SeTakeOwnershipPrivilege 2296 wmic.exe Token: SeLoadDriverPrivilege 2296 wmic.exe Token: SeSystemProfilePrivilege 2296 wmic.exe Token: SeSystemtimePrivilege 2296 wmic.exe Token: SeProfSingleProcessPrivilege 2296 wmic.exe Token: SeIncBasePriorityPrivilege 2296 wmic.exe Token: SeCreatePagefilePrivilege 2296 wmic.exe Token: SeBackupPrivilege 2296 wmic.exe Token: SeRestorePrivilege 2296 wmic.exe Token: SeShutdownPrivilege 2296 wmic.exe Token: SeDebugPrivilege 2296 wmic.exe Token: SeSystemEnvironmentPrivilege 2296 wmic.exe Token: SeRemoteShutdownPrivilege 2296 wmic.exe Token: SeUndockPrivilege 2296 wmic.exe Token: SeManageVolumePrivilege 2296 wmic.exe Token: 33 2296 wmic.exe Token: 34 2296 wmic.exe Token: 35 2296 wmic.exe Token: 36 2296 wmic.exe Token: SeIncreaseQuotaPrivilege 2252 WMIC.exe Token: SeSecurityPrivilege 2252 WMIC.exe Token: SeTakeOwnershipPrivilege 2252 WMIC.exe Token: SeLoadDriverPrivilege 2252 WMIC.exe Token: SeSystemProfilePrivilege 2252 WMIC.exe Token: SeSystemtimePrivilege 2252 WMIC.exe Token: SeProfSingleProcessPrivilege 2252 WMIC.exe Token: SeIncBasePriorityPrivilege 2252 WMIC.exe Token: SeCreatePagefilePrivilege 2252 WMIC.exe Token: SeBackupPrivilege 2252 WMIC.exe Token: SeRestorePrivilege 2252 WMIC.exe Token: SeShutdownPrivilege 2252 WMIC.exe Token: SeDebugPrivilege 2252 WMIC.exe Token: SeSystemEnvironmentPrivilege 2252 WMIC.exe Token: SeRemoteShutdownPrivilege 2252 WMIC.exe Token: SeUndockPrivilege 2252 WMIC.exe Token: SeManageVolumePrivilege 2252 WMIC.exe Token: 33 2252 WMIC.exe Token: 34 2252 WMIC.exe Token: 35 2252 WMIC.exe Token: 36 2252 WMIC.exe Token: SeIncreaseQuotaPrivilege 2252 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2296 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 73 PID 2700 wrote to memory of 2296 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 73 PID 2700 wrote to memory of 2296 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 73 PID 2700 wrote to memory of 3880 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 79 PID 2700 wrote to memory of 3880 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 79 PID 2700 wrote to memory of 3880 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 79 PID 3880 wrote to memory of 2252 3880 cmd.exe 81 PID 3880 wrote to memory of 2252 3880 cmd.exe 81 PID 3880 wrote to memory of 2252 3880 cmd.exe 81 PID 2700 wrote to memory of 4392 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 82 PID 2700 wrote to memory of 4392 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 82 PID 2700 wrote to memory of 4392 2700 2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe 82 PID 4392 wrote to memory of 752 4392 cmd.exe 84 PID 4392 wrote to memory of 752 4392 cmd.exe 84 PID 4392 wrote to memory of 752 4392 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe"C:\Users\Admin\AppData\Local\Temp\2ac5193560871f71a63257d6974b12a8ec87fe86f9c1f07c3b651e3a841e090b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5242⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5442⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5002⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 6202⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7282⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 8682⤵
- Program crash
PID:1200
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13082⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13242⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13362⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 3202⤵
- Program crash
PID:1508
-