Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07-10-2022 01:30
Static task
static1
General
-
Target
ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe
-
Size
4.8MB
-
MD5
06cd0e4fb834636463de1fd8f8490839
-
SHA1
4a32d37e51f1ac28efd84f2b407c064143e63a4a
-
SHA256
ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80
-
SHA512
afc9761d598ada1f358b4d31584e904824462d9d5e800400258cfb88e556f59a7245c7f628c8b63a716a663fbf8426542035d94900fbd95c06e318cfee0716db
-
SSDEEP
98304:F6aOpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:F2bFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 4212 4820 WerFault.exe 66 3444 4820 WerFault.exe 66 3368 4820 WerFault.exe 66 3636 4820 WerFault.exe 66 2208 4820 WerFault.exe 66 2952 4820 WerFault.exe 66 4440 4820 WerFault.exe 66 3172 4820 WerFault.exe 66 1100 4820 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4092 wmic.exe Token: SeSecurityPrivilege 4092 wmic.exe Token: SeTakeOwnershipPrivilege 4092 wmic.exe Token: SeLoadDriverPrivilege 4092 wmic.exe Token: SeSystemProfilePrivilege 4092 wmic.exe Token: SeSystemtimePrivilege 4092 wmic.exe Token: SeProfSingleProcessPrivilege 4092 wmic.exe Token: SeIncBasePriorityPrivilege 4092 wmic.exe Token: SeCreatePagefilePrivilege 4092 wmic.exe Token: SeBackupPrivilege 4092 wmic.exe Token: SeRestorePrivilege 4092 wmic.exe Token: SeShutdownPrivilege 4092 wmic.exe Token: SeDebugPrivilege 4092 wmic.exe Token: SeSystemEnvironmentPrivilege 4092 wmic.exe Token: SeRemoteShutdownPrivilege 4092 wmic.exe Token: SeUndockPrivilege 4092 wmic.exe Token: SeManageVolumePrivilege 4092 wmic.exe Token: 33 4092 wmic.exe Token: 34 4092 wmic.exe Token: 35 4092 wmic.exe Token: 36 4092 wmic.exe Token: SeIncreaseQuotaPrivilege 4092 wmic.exe Token: SeSecurityPrivilege 4092 wmic.exe Token: SeTakeOwnershipPrivilege 4092 wmic.exe Token: SeLoadDriverPrivilege 4092 wmic.exe Token: SeSystemProfilePrivilege 4092 wmic.exe Token: SeSystemtimePrivilege 4092 wmic.exe Token: SeProfSingleProcessPrivilege 4092 wmic.exe Token: SeIncBasePriorityPrivilege 4092 wmic.exe Token: SeCreatePagefilePrivilege 4092 wmic.exe Token: SeBackupPrivilege 4092 wmic.exe Token: SeRestorePrivilege 4092 wmic.exe Token: SeShutdownPrivilege 4092 wmic.exe Token: SeDebugPrivilege 4092 wmic.exe Token: SeSystemEnvironmentPrivilege 4092 wmic.exe Token: SeRemoteShutdownPrivilege 4092 wmic.exe Token: SeUndockPrivilege 4092 wmic.exe Token: SeManageVolumePrivilege 4092 wmic.exe Token: 33 4092 wmic.exe Token: 34 4092 wmic.exe Token: 35 4092 wmic.exe Token: 36 4092 wmic.exe Token: SeIncreaseQuotaPrivilege 3188 WMIC.exe Token: SeSecurityPrivilege 3188 WMIC.exe Token: SeTakeOwnershipPrivilege 3188 WMIC.exe Token: SeLoadDriverPrivilege 3188 WMIC.exe Token: SeSystemProfilePrivilege 3188 WMIC.exe Token: SeSystemtimePrivilege 3188 WMIC.exe Token: SeProfSingleProcessPrivilege 3188 WMIC.exe Token: SeIncBasePriorityPrivilege 3188 WMIC.exe Token: SeCreatePagefilePrivilege 3188 WMIC.exe Token: SeBackupPrivilege 3188 WMIC.exe Token: SeRestorePrivilege 3188 WMIC.exe Token: SeShutdownPrivilege 3188 WMIC.exe Token: SeDebugPrivilege 3188 WMIC.exe Token: SeSystemEnvironmentPrivilege 3188 WMIC.exe Token: SeRemoteShutdownPrivilege 3188 WMIC.exe Token: SeUndockPrivilege 3188 WMIC.exe Token: SeManageVolumePrivilege 3188 WMIC.exe Token: 33 3188 WMIC.exe Token: 34 3188 WMIC.exe Token: 35 3188 WMIC.exe Token: 36 3188 WMIC.exe Token: SeIncreaseQuotaPrivilege 3188 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4092 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 75 PID 4820 wrote to memory of 4092 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 75 PID 4820 wrote to memory of 4092 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 75 PID 4820 wrote to memory of 4708 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 79 PID 4820 wrote to memory of 4708 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 79 PID 4820 wrote to memory of 4708 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 79 PID 4708 wrote to memory of 3188 4708 cmd.exe 81 PID 4708 wrote to memory of 3188 4708 cmd.exe 81 PID 4708 wrote to memory of 3188 4708 cmd.exe 81 PID 4820 wrote to memory of 1672 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 82 PID 4820 wrote to memory of 1672 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 82 PID 4820 wrote to memory of 1672 4820 ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe 82 PID 1672 wrote to memory of 1912 1672 cmd.exe 84 PID 1672 wrote to memory of 1912 1672 cmd.exe 84 PID 1672 wrote to memory of 1912 1672 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe"C:\Users\Admin\AppData\Local\Temp\ee9e5daae03c9186ab596fdbc0afe629a73c056aba35c08a4da3b19353e93a80.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 5442⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 5922⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 5042⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 6442⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 6962⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 6842⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 10082⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 13322⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 3162⤵
- Program crash
PID:1100
-