Analysis
-
max time kernel
91s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2022 14:34
Static task
static1
General
-
Target
d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe
-
Size
4.7MB
-
MD5
58df6dd5765088594795f3342aa08321
-
SHA1
8fa0f6f74a6149777478ed54636911af47b8f4a6
-
SHA256
d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b
-
SHA512
6074c8a3796064f8243cef1eecdd5c246b9f7985bb3ba6275248ddb076464450fd37241ab7909a33029f60938818b2a764e3647270969e41d27b31dce775f3bd
-
SSDEEP
98304:1W7IupKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7i:1WrbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 3692 3660 WerFault.exe 76 2064 3660 WerFault.exe 76 4232 3660 WerFault.exe 76 4140 3660 WerFault.exe 76 2244 3660 WerFault.exe 76 1088 3660 WerFault.exe 76 4468 3660 WerFault.exe 76 868 3660 WerFault.exe 76 4844 3660 WerFault.exe 76 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1584 wmic.exe Token: SeSecurityPrivilege 1584 wmic.exe Token: SeTakeOwnershipPrivilege 1584 wmic.exe Token: SeLoadDriverPrivilege 1584 wmic.exe Token: SeSystemProfilePrivilege 1584 wmic.exe Token: SeSystemtimePrivilege 1584 wmic.exe Token: SeProfSingleProcessPrivilege 1584 wmic.exe Token: SeIncBasePriorityPrivilege 1584 wmic.exe Token: SeCreatePagefilePrivilege 1584 wmic.exe Token: SeBackupPrivilege 1584 wmic.exe Token: SeRestorePrivilege 1584 wmic.exe Token: SeShutdownPrivilege 1584 wmic.exe Token: SeDebugPrivilege 1584 wmic.exe Token: SeSystemEnvironmentPrivilege 1584 wmic.exe Token: SeRemoteShutdownPrivilege 1584 wmic.exe Token: SeUndockPrivilege 1584 wmic.exe Token: SeManageVolumePrivilege 1584 wmic.exe Token: 33 1584 wmic.exe Token: 34 1584 wmic.exe Token: 35 1584 wmic.exe Token: 36 1584 wmic.exe Token: SeIncreaseQuotaPrivilege 1584 wmic.exe Token: SeSecurityPrivilege 1584 wmic.exe Token: SeTakeOwnershipPrivilege 1584 wmic.exe Token: SeLoadDriverPrivilege 1584 wmic.exe Token: SeSystemProfilePrivilege 1584 wmic.exe Token: SeSystemtimePrivilege 1584 wmic.exe Token: SeProfSingleProcessPrivilege 1584 wmic.exe Token: SeIncBasePriorityPrivilege 1584 wmic.exe Token: SeCreatePagefilePrivilege 1584 wmic.exe Token: SeBackupPrivilege 1584 wmic.exe Token: SeRestorePrivilege 1584 wmic.exe Token: SeShutdownPrivilege 1584 wmic.exe Token: SeDebugPrivilege 1584 wmic.exe Token: SeSystemEnvironmentPrivilege 1584 wmic.exe Token: SeRemoteShutdownPrivilege 1584 wmic.exe Token: SeUndockPrivilege 1584 wmic.exe Token: SeManageVolumePrivilege 1584 wmic.exe Token: 33 1584 wmic.exe Token: 34 1584 wmic.exe Token: 35 1584 wmic.exe Token: 36 1584 wmic.exe Token: SeIncreaseQuotaPrivilege 1348 WMIC.exe Token: SeSecurityPrivilege 1348 WMIC.exe Token: SeTakeOwnershipPrivilege 1348 WMIC.exe Token: SeLoadDriverPrivilege 1348 WMIC.exe Token: SeSystemProfilePrivilege 1348 WMIC.exe Token: SeSystemtimePrivilege 1348 WMIC.exe Token: SeProfSingleProcessPrivilege 1348 WMIC.exe Token: SeIncBasePriorityPrivilege 1348 WMIC.exe Token: SeCreatePagefilePrivilege 1348 WMIC.exe Token: SeBackupPrivilege 1348 WMIC.exe Token: SeRestorePrivilege 1348 WMIC.exe Token: SeShutdownPrivilege 1348 WMIC.exe Token: SeDebugPrivilege 1348 WMIC.exe Token: SeSystemEnvironmentPrivilege 1348 WMIC.exe Token: SeRemoteShutdownPrivilege 1348 WMIC.exe Token: SeUndockPrivilege 1348 WMIC.exe Token: SeManageVolumePrivilege 1348 WMIC.exe Token: 33 1348 WMIC.exe Token: 34 1348 WMIC.exe Token: 35 1348 WMIC.exe Token: 36 1348 WMIC.exe Token: SeIncreaseQuotaPrivilege 1348 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3660 wrote to memory of 1584 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 99 PID 3660 wrote to memory of 1584 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 99 PID 3660 wrote to memory of 1584 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 99 PID 3660 wrote to memory of 2368 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 105 PID 3660 wrote to memory of 2368 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 105 PID 3660 wrote to memory of 2368 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 105 PID 2368 wrote to memory of 1348 2368 cmd.exe 107 PID 2368 wrote to memory of 1348 2368 cmd.exe 107 PID 2368 wrote to memory of 1348 2368 cmd.exe 107 PID 3660 wrote to memory of 3168 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 108 PID 3660 wrote to memory of 3168 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 108 PID 3660 wrote to memory of 3168 3660 d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe 108 PID 3168 wrote to memory of 4064 3168 cmd.exe 111 PID 3168 wrote to memory of 4064 3168 cmd.exe 111 PID 3168 wrote to memory of 4064 3168 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe"C:\Users\Admin\AppData\Local\Temp\d168c91e8c4b5f63a6e928f1694b2d81036d071210fcdf5ba2e0f1bf44e1ba4b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 5362⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 5602⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 5602⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 6682⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 7602⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 8442⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 12962⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 12842⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 1522⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3660 -ip 36601⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3660 -ip 36601⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3660 -ip 36601⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3660 -ip 36601⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3660 -ip 36601⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3660 -ip 36601⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3660 -ip 36601⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3660 -ip 36601⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3660 -ip 36601⤵PID:4520