Analysis
-
max time kernel
91s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2022 14:50
Static task
static1
General
-
Target
0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe
-
Size
4.7MB
-
MD5
bf32fd3654acf31b51124e0c9963a43d
-
SHA1
d63699ded55d701c1725fd463294c97400afcb2b
-
SHA256
0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce
-
SHA512
72ed989993923d79f8352fd088dff22fec0cda29167487dd8e8064648257c7f9def4ef4c985d4d53c788c0c812cdd2091cc62ab33fb60448431bae0683951aa3
-
SSDEEP
98304:m2hBpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7:mwbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 4548 1776 WerFault.exe 76 2064 1776 WerFault.exe 76 312 1776 WerFault.exe 76 4140 1776 WerFault.exe 76 2244 1776 WerFault.exe 76 4848 1776 WerFault.exe 76 1508 1776 WerFault.exe 76 3704 1776 WerFault.exe 76 2336 1776 WerFault.exe 76 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4804 wmic.exe Token: SeSecurityPrivilege 4804 wmic.exe Token: SeTakeOwnershipPrivilege 4804 wmic.exe Token: SeLoadDriverPrivilege 4804 wmic.exe Token: SeSystemProfilePrivilege 4804 wmic.exe Token: SeSystemtimePrivilege 4804 wmic.exe Token: SeProfSingleProcessPrivilege 4804 wmic.exe Token: SeIncBasePriorityPrivilege 4804 wmic.exe Token: SeCreatePagefilePrivilege 4804 wmic.exe Token: SeBackupPrivilege 4804 wmic.exe Token: SeRestorePrivilege 4804 wmic.exe Token: SeShutdownPrivilege 4804 wmic.exe Token: SeDebugPrivilege 4804 wmic.exe Token: SeSystemEnvironmentPrivilege 4804 wmic.exe Token: SeRemoteShutdownPrivilege 4804 wmic.exe Token: SeUndockPrivilege 4804 wmic.exe Token: SeManageVolumePrivilege 4804 wmic.exe Token: 33 4804 wmic.exe Token: 34 4804 wmic.exe Token: 35 4804 wmic.exe Token: 36 4804 wmic.exe Token: SeIncreaseQuotaPrivilege 4804 wmic.exe Token: SeSecurityPrivilege 4804 wmic.exe Token: SeTakeOwnershipPrivilege 4804 wmic.exe Token: SeLoadDriverPrivilege 4804 wmic.exe Token: SeSystemProfilePrivilege 4804 wmic.exe Token: SeSystemtimePrivilege 4804 wmic.exe Token: SeProfSingleProcessPrivilege 4804 wmic.exe Token: SeIncBasePriorityPrivilege 4804 wmic.exe Token: SeCreatePagefilePrivilege 4804 wmic.exe Token: SeBackupPrivilege 4804 wmic.exe Token: SeRestorePrivilege 4804 wmic.exe Token: SeShutdownPrivilege 4804 wmic.exe Token: SeDebugPrivilege 4804 wmic.exe Token: SeSystemEnvironmentPrivilege 4804 wmic.exe Token: SeRemoteShutdownPrivilege 4804 wmic.exe Token: SeUndockPrivilege 4804 wmic.exe Token: SeManageVolumePrivilege 4804 wmic.exe Token: 33 4804 wmic.exe Token: 34 4804 wmic.exe Token: 35 4804 wmic.exe Token: 36 4804 wmic.exe Token: SeIncreaseQuotaPrivilege 876 WMIC.exe Token: SeSecurityPrivilege 876 WMIC.exe Token: SeTakeOwnershipPrivilege 876 WMIC.exe Token: SeLoadDriverPrivilege 876 WMIC.exe Token: SeSystemProfilePrivilege 876 WMIC.exe Token: SeSystemtimePrivilege 876 WMIC.exe Token: SeProfSingleProcessPrivilege 876 WMIC.exe Token: SeIncBasePriorityPrivilege 876 WMIC.exe Token: SeCreatePagefilePrivilege 876 WMIC.exe Token: SeBackupPrivilege 876 WMIC.exe Token: SeRestorePrivilege 876 WMIC.exe Token: SeShutdownPrivilege 876 WMIC.exe Token: SeDebugPrivilege 876 WMIC.exe Token: SeSystemEnvironmentPrivilege 876 WMIC.exe Token: SeRemoteShutdownPrivilege 876 WMIC.exe Token: SeUndockPrivilege 876 WMIC.exe Token: SeManageVolumePrivilege 876 WMIC.exe Token: 33 876 WMIC.exe Token: 34 876 WMIC.exe Token: 35 876 WMIC.exe Token: 36 876 WMIC.exe Token: SeIncreaseQuotaPrivilege 876 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4804 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 101 PID 1776 wrote to memory of 4804 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 101 PID 1776 wrote to memory of 4804 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 101 PID 1776 wrote to memory of 4024 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 105 PID 1776 wrote to memory of 4024 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 105 PID 1776 wrote to memory of 4024 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 105 PID 4024 wrote to memory of 876 4024 cmd.exe 107 PID 4024 wrote to memory of 876 4024 cmd.exe 107 PID 4024 wrote to memory of 876 4024 cmd.exe 107 PID 1776 wrote to memory of 4364 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 108 PID 1776 wrote to memory of 4364 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 108 PID 1776 wrote to memory of 4364 1776 0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe 108 PID 4364 wrote to memory of 4568 4364 cmd.exe 110 PID 4364 wrote to memory of 4568 4364 cmd.exe 110 PID 4364 wrote to memory of 4568 4364 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe"C:\Users\Admin\AppData\Local\Temp\0aee22f6f0975d099ce715e981f96223edfbce783a09cba64061e2522e42b8ce.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5362⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5402⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5402⤵
- Program crash
PID:312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 6242⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 6562⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 6802⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 8642⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 13162⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 1402⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1776 -ip 17761⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1776 -ip 17761⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1776 -ip 17761⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1776 -ip 17761⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1776 -ip 17761⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1776 -ip 17761⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1776 -ip 17761⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1776 -ip 17761⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1776 -ip 17761⤵PID:384