Analysis
-
max time kernel
53s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-10-2022 08:19
Static task
static1
General
-
Target
266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe
-
Size
5.6MB
-
MD5
da80a621832f8acb2eebc0f1b5dd7071
-
SHA1
34aa3d0fe7eadd2a0ac01ce0006428151209e7e1
-
SHA256
266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f
-
SHA512
f83cc3cbdaaa8375904635118c4994b0c0ef97ae2ee12fe32bb41485eb7f176b5ca53a82750fcc26e59a6c332fa185f654736cc2e52f798c69469711d0755a7c
-
SSDEEP
49152:9Hq0TgTFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:9Hqm7SjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 2136 2700 WerFault.exe 65 4788 2700 WerFault.exe 65 3244 2700 WerFault.exe 65 4848 2700 WerFault.exe 65 4744 2700 WerFault.exe 65 4228 2700 WerFault.exe 65 4424 2700 WerFault.exe 65 3956 2700 WerFault.exe 65 2712 2700 WerFault.exe 65 3316 2700 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4052 wmic.exe Token: SeSecurityPrivilege 4052 wmic.exe Token: SeTakeOwnershipPrivilege 4052 wmic.exe Token: SeLoadDriverPrivilege 4052 wmic.exe Token: SeSystemProfilePrivilege 4052 wmic.exe Token: SeSystemtimePrivilege 4052 wmic.exe Token: SeProfSingleProcessPrivilege 4052 wmic.exe Token: SeIncBasePriorityPrivilege 4052 wmic.exe Token: SeCreatePagefilePrivilege 4052 wmic.exe Token: SeBackupPrivilege 4052 wmic.exe Token: SeRestorePrivilege 4052 wmic.exe Token: SeShutdownPrivilege 4052 wmic.exe Token: SeDebugPrivilege 4052 wmic.exe Token: SeSystemEnvironmentPrivilege 4052 wmic.exe Token: SeRemoteShutdownPrivilege 4052 wmic.exe Token: SeUndockPrivilege 4052 wmic.exe Token: SeManageVolumePrivilege 4052 wmic.exe Token: 33 4052 wmic.exe Token: 34 4052 wmic.exe Token: 35 4052 wmic.exe Token: 36 4052 wmic.exe Token: SeIncreaseQuotaPrivilege 4052 wmic.exe Token: SeSecurityPrivilege 4052 wmic.exe Token: SeTakeOwnershipPrivilege 4052 wmic.exe Token: SeLoadDriverPrivilege 4052 wmic.exe Token: SeSystemProfilePrivilege 4052 wmic.exe Token: SeSystemtimePrivilege 4052 wmic.exe Token: SeProfSingleProcessPrivilege 4052 wmic.exe Token: SeIncBasePriorityPrivilege 4052 wmic.exe Token: SeCreatePagefilePrivilege 4052 wmic.exe Token: SeBackupPrivilege 4052 wmic.exe Token: SeRestorePrivilege 4052 wmic.exe Token: SeShutdownPrivilege 4052 wmic.exe Token: SeDebugPrivilege 4052 wmic.exe Token: SeSystemEnvironmentPrivilege 4052 wmic.exe Token: SeRemoteShutdownPrivilege 4052 wmic.exe Token: SeUndockPrivilege 4052 wmic.exe Token: SeManageVolumePrivilege 4052 wmic.exe Token: 33 4052 wmic.exe Token: 34 4052 wmic.exe Token: 35 4052 wmic.exe Token: 36 4052 wmic.exe Token: SeIncreaseQuotaPrivilege 4920 WMIC.exe Token: SeSecurityPrivilege 4920 WMIC.exe Token: SeTakeOwnershipPrivilege 4920 WMIC.exe Token: SeLoadDriverPrivilege 4920 WMIC.exe Token: SeSystemProfilePrivilege 4920 WMIC.exe Token: SeSystemtimePrivilege 4920 WMIC.exe Token: SeProfSingleProcessPrivilege 4920 WMIC.exe Token: SeIncBasePriorityPrivilege 4920 WMIC.exe Token: SeCreatePagefilePrivilege 4920 WMIC.exe Token: SeBackupPrivilege 4920 WMIC.exe Token: SeRestorePrivilege 4920 WMIC.exe Token: SeShutdownPrivilege 4920 WMIC.exe Token: SeDebugPrivilege 4920 WMIC.exe Token: SeSystemEnvironmentPrivilege 4920 WMIC.exe Token: SeRemoteShutdownPrivilege 4920 WMIC.exe Token: SeUndockPrivilege 4920 WMIC.exe Token: SeManageVolumePrivilege 4920 WMIC.exe Token: 33 4920 WMIC.exe Token: 34 4920 WMIC.exe Token: 35 4920 WMIC.exe Token: 36 4920 WMIC.exe Token: SeIncreaseQuotaPrivilege 4920 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4052 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 73 PID 2700 wrote to memory of 4052 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 73 PID 2700 wrote to memory of 4052 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 73 PID 2700 wrote to memory of 4828 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 79 PID 2700 wrote to memory of 4828 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 79 PID 2700 wrote to memory of 4828 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 79 PID 4828 wrote to memory of 4920 4828 cmd.exe 81 PID 4828 wrote to memory of 4920 4828 cmd.exe 81 PID 4828 wrote to memory of 4920 4828 cmd.exe 81 PID 2700 wrote to memory of 4684 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 82 PID 2700 wrote to memory of 4684 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 82 PID 2700 wrote to memory of 4684 2700 266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe 82 PID 4684 wrote to memory of 4508 4684 cmd.exe 84 PID 4684 wrote to memory of 4508 4684 cmd.exe 84 PID 4684 wrote to memory of 4508 4684 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe"C:\Users\Admin\AppData\Local\Temp\266fe6b16e0d9dc20ec1542413a84806eb2a5114ed62c747d5c25fdc96f9869f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5242⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5002⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5762⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 6202⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7282⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 8762⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13082⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13242⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 12602⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 3162⤵
- Program crash
PID:3316
-