Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 05:25
Static task
static1
General
-
Target
2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe
-
Size
5.3MB
-
MD5
0d2ba2e9984f3b9ebc3c952e171a74bd
-
SHA1
0cf3440c045f07976dd54727dcecf492c0e6517d
-
SHA256
2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4
-
SHA512
f47c31fd0e73430443cd9e31b4f0ca2d3c7a7d42f62406fb1c13d7a9445cf1237e9d985712731b047224b798171ae93759ee9ca33999d8a42720cc568cf42ef6
-
SSDEEP
98304:ByIwfYjsbpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:BaEsrbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 520 1068 WerFault.exe 81 4132 1068 WerFault.exe 81 1240 1068 WerFault.exe 81 5068 1068 WerFault.exe 81 216 1068 WerFault.exe 81 1592 1068 WerFault.exe 81 944 1068 WerFault.exe 81 1252 1068 WerFault.exe 81 2520 1068 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1540 wmic.exe Token: SeSecurityPrivilege 1540 wmic.exe Token: SeTakeOwnershipPrivilege 1540 wmic.exe Token: SeLoadDriverPrivilege 1540 wmic.exe Token: SeSystemProfilePrivilege 1540 wmic.exe Token: SeSystemtimePrivilege 1540 wmic.exe Token: SeProfSingleProcessPrivilege 1540 wmic.exe Token: SeIncBasePriorityPrivilege 1540 wmic.exe Token: SeCreatePagefilePrivilege 1540 wmic.exe Token: SeBackupPrivilege 1540 wmic.exe Token: SeRestorePrivilege 1540 wmic.exe Token: SeShutdownPrivilege 1540 wmic.exe Token: SeDebugPrivilege 1540 wmic.exe Token: SeSystemEnvironmentPrivilege 1540 wmic.exe Token: SeRemoteShutdownPrivilege 1540 wmic.exe Token: SeUndockPrivilege 1540 wmic.exe Token: SeManageVolumePrivilege 1540 wmic.exe Token: 33 1540 wmic.exe Token: 34 1540 wmic.exe Token: 35 1540 wmic.exe Token: 36 1540 wmic.exe Token: SeIncreaseQuotaPrivilege 1540 wmic.exe Token: SeSecurityPrivilege 1540 wmic.exe Token: SeTakeOwnershipPrivilege 1540 wmic.exe Token: SeLoadDriverPrivilege 1540 wmic.exe Token: SeSystemProfilePrivilege 1540 wmic.exe Token: SeSystemtimePrivilege 1540 wmic.exe Token: SeProfSingleProcessPrivilege 1540 wmic.exe Token: SeIncBasePriorityPrivilege 1540 wmic.exe Token: SeCreatePagefilePrivilege 1540 wmic.exe Token: SeBackupPrivilege 1540 wmic.exe Token: SeRestorePrivilege 1540 wmic.exe Token: SeShutdownPrivilege 1540 wmic.exe Token: SeDebugPrivilege 1540 wmic.exe Token: SeSystemEnvironmentPrivilege 1540 wmic.exe Token: SeRemoteShutdownPrivilege 1540 wmic.exe Token: SeUndockPrivilege 1540 wmic.exe Token: SeManageVolumePrivilege 1540 wmic.exe Token: 33 1540 wmic.exe Token: 34 1540 wmic.exe Token: 35 1540 wmic.exe Token: 36 1540 wmic.exe Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe Token: SeSecurityPrivilege 2792 WMIC.exe Token: SeTakeOwnershipPrivilege 2792 WMIC.exe Token: SeLoadDriverPrivilege 2792 WMIC.exe Token: SeSystemProfilePrivilege 2792 WMIC.exe Token: SeSystemtimePrivilege 2792 WMIC.exe Token: SeProfSingleProcessPrivilege 2792 WMIC.exe Token: SeIncBasePriorityPrivilege 2792 WMIC.exe Token: SeCreatePagefilePrivilege 2792 WMIC.exe Token: SeBackupPrivilege 2792 WMIC.exe Token: SeRestorePrivilege 2792 WMIC.exe Token: SeShutdownPrivilege 2792 WMIC.exe Token: SeDebugPrivilege 2792 WMIC.exe Token: SeSystemEnvironmentPrivilege 2792 WMIC.exe Token: SeRemoteShutdownPrivilege 2792 WMIC.exe Token: SeUndockPrivilege 2792 WMIC.exe Token: SeManageVolumePrivilege 2792 WMIC.exe Token: 33 2792 WMIC.exe Token: 34 2792 WMIC.exe Token: 35 2792 WMIC.exe Token: 36 2792 WMIC.exe Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1540 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 101 PID 1068 wrote to memory of 1540 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 101 PID 1068 wrote to memory of 1540 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 101 PID 1068 wrote to memory of 384 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 107 PID 1068 wrote to memory of 384 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 107 PID 1068 wrote to memory of 384 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 107 PID 384 wrote to memory of 2792 384 cmd.exe 109 PID 384 wrote to memory of 2792 384 cmd.exe 109 PID 384 wrote to memory of 2792 384 cmd.exe 109 PID 1068 wrote to memory of 4720 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 110 PID 1068 wrote to memory of 4720 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 110 PID 1068 wrote to memory of 4720 1068 2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe 110 PID 4720 wrote to memory of 1664 4720 cmd.exe 112 PID 4720 wrote to memory of 1664 4720 cmd.exe 112 PID 4720 wrote to memory of 1664 4720 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe"C:\Users\Admin\AppData\Local\Temp\2109e7df7ad9492dab0d0fd6ada43bf212bf504ba02428e36890a53025c5baa4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 5602⤵
- Program crash
PID:520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 5802⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 6002⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 6402⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 8202⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 8402⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 13882⤵
- Program crash
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 13282⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1402⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1068 -ip 10681⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1068 -ip 10681⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1068 -ip 10681⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1068 -ip 10681⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1068 -ip 10681⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1068 -ip 10681⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1068 -ip 10681⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1068 -ip 10681⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1068 -ip 10681⤵PID:4308