Analysis
-
max time kernel
52s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 12:09
Static task
static1
General
-
Target
c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe
-
Size
4.7MB
-
MD5
1ce60bdb282d6bc31a3b498fd23a4176
-
SHA1
e23d82d3216c905381db12d3e94b03b0fee7a67a
-
SHA256
c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356
-
SHA512
e9fa7e6249695d2fe2741fc3c4256a011218020ff09a002778d89c5e3c5c789787598ddb733cb6b2e88438a66b1e5ba75d7f697a21c0ef6216adbed7dc314b39
-
SSDEEP
98304:m2hxpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7:mQbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 3476 2732 WerFault.exe 65 3552 2732 WerFault.exe 65 4304 2732 WerFault.exe 65 4336 2732 WerFault.exe 65 4896 2732 WerFault.exe 65 2176 2732 WerFault.exe 65 4380 2732 WerFault.exe 65 4248 2732 WerFault.exe 65 4260 2732 WerFault.exe 65 3268 2732 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeIncreaseQuotaPrivilege 4616 WMIC.exe Token: SeSecurityPrivilege 4616 WMIC.exe Token: SeTakeOwnershipPrivilege 4616 WMIC.exe Token: SeLoadDriverPrivilege 4616 WMIC.exe Token: SeSystemProfilePrivilege 4616 WMIC.exe Token: SeSystemtimePrivilege 4616 WMIC.exe Token: SeProfSingleProcessPrivilege 4616 WMIC.exe Token: SeIncBasePriorityPrivilege 4616 WMIC.exe Token: SeCreatePagefilePrivilege 4616 WMIC.exe Token: SeBackupPrivilege 4616 WMIC.exe Token: SeRestorePrivilege 4616 WMIC.exe Token: SeShutdownPrivilege 4616 WMIC.exe Token: SeDebugPrivilege 4616 WMIC.exe Token: SeSystemEnvironmentPrivilege 4616 WMIC.exe Token: SeRemoteShutdownPrivilege 4616 WMIC.exe Token: SeUndockPrivilege 4616 WMIC.exe Token: SeManageVolumePrivilege 4616 WMIC.exe Token: 33 4616 WMIC.exe Token: 34 4616 WMIC.exe Token: 35 4616 WMIC.exe Token: 36 4616 WMIC.exe Token: SeIncreaseQuotaPrivilege 4616 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3036 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 73 PID 2732 wrote to memory of 3036 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 73 PID 2732 wrote to memory of 3036 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 73 PID 2732 wrote to memory of 4484 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 79 PID 2732 wrote to memory of 4484 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 79 PID 2732 wrote to memory of 4484 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 79 PID 4484 wrote to memory of 4616 4484 cmd.exe 81 PID 4484 wrote to memory of 4616 4484 cmd.exe 81 PID 4484 wrote to memory of 4616 4484 cmd.exe 81 PID 2732 wrote to memory of 4732 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 82 PID 2732 wrote to memory of 4732 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 82 PID 2732 wrote to memory of 4732 2732 c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe 82 PID 4732 wrote to memory of 4436 4732 cmd.exe 84 PID 4732 wrote to memory of 4436 4732 cmd.exe 84 PID 4732 wrote to memory of 4436 4732 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe"C:\Users\Admin\AppData\Local\Temp\c97255945262b84ab9b376f56b29cc544823885216137434b3aab8a110da1356.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5242⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5002⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5682⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5842⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 7562⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 8522⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 13002⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 13162⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 13722⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3122⤵
- Program crash
PID:3268
-