Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-10-2022 05:14
Static task
static1
General
-
Target
809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe
-
Size
5.3MB
-
MD5
9b73f0e38b059f5391b5d7ae2e09bae9
-
SHA1
d5187215f337488de99efd077c7387f60f25edf7
-
SHA256
809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69
-
SHA512
f5ccf8dec512eef2bf050a31056ff77a3016d1cf8c8f1f8f269986d6a96fbb8f7c162dfa3075a18e31f0dbf5f88569a4d7a2b1bc95abf09c37056d5d1a48cab4
-
SSDEEP
98304:ByIwfYjslpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:BaEslbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 4784 2432 WerFault.exe 65 2064 2432 WerFault.exe 65 4804 2432 WerFault.exe 65 4888 2432 WerFault.exe 65 4300 2432 WerFault.exe 65 3648 2432 WerFault.exe 65 4104 2432 WerFault.exe 65 3556 2432 WerFault.exe 65 2588 2432 WerFault.exe 65 3424 2432 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4868 wmic.exe Token: SeSecurityPrivilege 4868 wmic.exe Token: SeTakeOwnershipPrivilege 4868 wmic.exe Token: SeLoadDriverPrivilege 4868 wmic.exe Token: SeSystemProfilePrivilege 4868 wmic.exe Token: SeSystemtimePrivilege 4868 wmic.exe Token: SeProfSingleProcessPrivilege 4868 wmic.exe Token: SeIncBasePriorityPrivilege 4868 wmic.exe Token: SeCreatePagefilePrivilege 4868 wmic.exe Token: SeBackupPrivilege 4868 wmic.exe Token: SeRestorePrivilege 4868 wmic.exe Token: SeShutdownPrivilege 4868 wmic.exe Token: SeDebugPrivilege 4868 wmic.exe Token: SeSystemEnvironmentPrivilege 4868 wmic.exe Token: SeRemoteShutdownPrivilege 4868 wmic.exe Token: SeUndockPrivilege 4868 wmic.exe Token: SeManageVolumePrivilege 4868 wmic.exe Token: 33 4868 wmic.exe Token: 34 4868 wmic.exe Token: 35 4868 wmic.exe Token: 36 4868 wmic.exe Token: SeIncreaseQuotaPrivilege 4868 wmic.exe Token: SeSecurityPrivilege 4868 wmic.exe Token: SeTakeOwnershipPrivilege 4868 wmic.exe Token: SeLoadDriverPrivilege 4868 wmic.exe Token: SeSystemProfilePrivilege 4868 wmic.exe Token: SeSystemtimePrivilege 4868 wmic.exe Token: SeProfSingleProcessPrivilege 4868 wmic.exe Token: SeIncBasePriorityPrivilege 4868 wmic.exe Token: SeCreatePagefilePrivilege 4868 wmic.exe Token: SeBackupPrivilege 4868 wmic.exe Token: SeRestorePrivilege 4868 wmic.exe Token: SeShutdownPrivilege 4868 wmic.exe Token: SeDebugPrivilege 4868 wmic.exe Token: SeSystemEnvironmentPrivilege 4868 wmic.exe Token: SeRemoteShutdownPrivilege 4868 wmic.exe Token: SeUndockPrivilege 4868 wmic.exe Token: SeManageVolumePrivilege 4868 wmic.exe Token: 33 4868 wmic.exe Token: 34 4868 wmic.exe Token: 35 4868 wmic.exe Token: 36 4868 wmic.exe Token: SeIncreaseQuotaPrivilege 4340 WMIC.exe Token: SeSecurityPrivilege 4340 WMIC.exe Token: SeTakeOwnershipPrivilege 4340 WMIC.exe Token: SeLoadDriverPrivilege 4340 WMIC.exe Token: SeSystemProfilePrivilege 4340 WMIC.exe Token: SeSystemtimePrivilege 4340 WMIC.exe Token: SeProfSingleProcessPrivilege 4340 WMIC.exe Token: SeIncBasePriorityPrivilege 4340 WMIC.exe Token: SeCreatePagefilePrivilege 4340 WMIC.exe Token: SeBackupPrivilege 4340 WMIC.exe Token: SeRestorePrivilege 4340 WMIC.exe Token: SeShutdownPrivilege 4340 WMIC.exe Token: SeDebugPrivilege 4340 WMIC.exe Token: SeSystemEnvironmentPrivilege 4340 WMIC.exe Token: SeRemoteShutdownPrivilege 4340 WMIC.exe Token: SeUndockPrivilege 4340 WMIC.exe Token: SeManageVolumePrivilege 4340 WMIC.exe Token: 33 4340 WMIC.exe Token: 34 4340 WMIC.exe Token: 35 4340 WMIC.exe Token: 36 4340 WMIC.exe Token: SeIncreaseQuotaPrivilege 4340 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4868 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 73 PID 2432 wrote to memory of 4868 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 73 PID 2432 wrote to memory of 4868 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 73 PID 2432 wrote to memory of 4864 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 78 PID 2432 wrote to memory of 4864 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 78 PID 2432 wrote to memory of 4864 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 78 PID 4864 wrote to memory of 4340 4864 cmd.exe 81 PID 4864 wrote to memory of 4340 4864 cmd.exe 81 PID 4864 wrote to memory of 4340 4864 cmd.exe 81 PID 2432 wrote to memory of 4528 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 82 PID 2432 wrote to memory of 4528 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 82 PID 2432 wrote to memory of 4528 2432 809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe 82 PID 4528 wrote to memory of 4448 4528 cmd.exe 84 PID 4528 wrote to memory of 4448 4528 cmd.exe 84 PID 4528 wrote to memory of 4448 4528 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe"C:\Users\Admin\AppData\Local\Temp\809c72810d8d0d993905833926f0445ade721b07f878a4cde4d24b3c5b2efe69.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 5442⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 5202⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 5802⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 6402⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 7482⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 8882⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 13442⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 13042⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 13562⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 3122⤵
- Program crash
PID:3424
-