Analysis
-
max time kernel
77s -
max time network
83s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-10-2022 07:29
Static task
static1
General
-
Target
eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe
-
Size
5.6MB
-
MD5
e0b62b7fbd684811a3938e43fe87fe9c
-
SHA1
9f9d3da5d0ef676c2b72797c213e5fc84eb7ee44
-
SHA256
eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2
-
SHA512
a5a216e6f1550790684dc5c8d4457f10d4cdc398441652a1d58324a50bd6732990c66a5d677d92749fda6c8d52d841ff25bdbf5833c26610bf496a199a70c31f
-
SSDEEP
49152:9Hq0Tg4Fe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:9HqmCSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 12 IoCs
pid pid_target Process procid_target 4792 2584 WerFault.exe 65 60 2584 WerFault.exe 65 4796 2584 WerFault.exe 65 4836 2584 WerFault.exe 65 384 2584 WerFault.exe 65 2344 2584 WerFault.exe 65 4832 2584 WerFault.exe 65 3744 2584 WerFault.exe 65 3932 2584 WerFault.exe 65 164 2584 WerFault.exe 65 212 2584 WerFault.exe 65 524 2584 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4272 wmic.exe Token: SeSecurityPrivilege 4272 wmic.exe Token: SeTakeOwnershipPrivilege 4272 wmic.exe Token: SeLoadDriverPrivilege 4272 wmic.exe Token: SeSystemProfilePrivilege 4272 wmic.exe Token: SeSystemtimePrivilege 4272 wmic.exe Token: SeProfSingleProcessPrivilege 4272 wmic.exe Token: SeIncBasePriorityPrivilege 4272 wmic.exe Token: SeCreatePagefilePrivilege 4272 wmic.exe Token: SeBackupPrivilege 4272 wmic.exe Token: SeRestorePrivilege 4272 wmic.exe Token: SeShutdownPrivilege 4272 wmic.exe Token: SeDebugPrivilege 4272 wmic.exe Token: SeSystemEnvironmentPrivilege 4272 wmic.exe Token: SeRemoteShutdownPrivilege 4272 wmic.exe Token: SeUndockPrivilege 4272 wmic.exe Token: SeManageVolumePrivilege 4272 wmic.exe Token: 33 4272 wmic.exe Token: 34 4272 wmic.exe Token: 35 4272 wmic.exe Token: 36 4272 wmic.exe Token: SeIncreaseQuotaPrivilege 4272 wmic.exe Token: SeSecurityPrivilege 4272 wmic.exe Token: SeTakeOwnershipPrivilege 4272 wmic.exe Token: SeLoadDriverPrivilege 4272 wmic.exe Token: SeSystemProfilePrivilege 4272 wmic.exe Token: SeSystemtimePrivilege 4272 wmic.exe Token: SeProfSingleProcessPrivilege 4272 wmic.exe Token: SeIncBasePriorityPrivilege 4272 wmic.exe Token: SeCreatePagefilePrivilege 4272 wmic.exe Token: SeBackupPrivilege 4272 wmic.exe Token: SeRestorePrivilege 4272 wmic.exe Token: SeShutdownPrivilege 4272 wmic.exe Token: SeDebugPrivilege 4272 wmic.exe Token: SeSystemEnvironmentPrivilege 4272 wmic.exe Token: SeRemoteShutdownPrivilege 4272 wmic.exe Token: SeUndockPrivilege 4272 wmic.exe Token: SeManageVolumePrivilege 4272 wmic.exe Token: 33 4272 wmic.exe Token: 34 4272 wmic.exe Token: 35 4272 wmic.exe Token: 36 4272 wmic.exe Token: SeIncreaseQuotaPrivilege 4940 WMIC.exe Token: SeSecurityPrivilege 4940 WMIC.exe Token: SeTakeOwnershipPrivilege 4940 WMIC.exe Token: SeLoadDriverPrivilege 4940 WMIC.exe Token: SeSystemProfilePrivilege 4940 WMIC.exe Token: SeSystemtimePrivilege 4940 WMIC.exe Token: SeProfSingleProcessPrivilege 4940 WMIC.exe Token: SeIncBasePriorityPrivilege 4940 WMIC.exe Token: SeCreatePagefilePrivilege 4940 WMIC.exe Token: SeBackupPrivilege 4940 WMIC.exe Token: SeRestorePrivilege 4940 WMIC.exe Token: SeShutdownPrivilege 4940 WMIC.exe Token: SeDebugPrivilege 4940 WMIC.exe Token: SeSystemEnvironmentPrivilege 4940 WMIC.exe Token: SeRemoteShutdownPrivilege 4940 WMIC.exe Token: SeUndockPrivilege 4940 WMIC.exe Token: SeManageVolumePrivilege 4940 WMIC.exe Token: 33 4940 WMIC.exe Token: 34 4940 WMIC.exe Token: 35 4940 WMIC.exe Token: 36 4940 WMIC.exe Token: SeIncreaseQuotaPrivilege 4940 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2584 wrote to memory of 4272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 73 PID 2584 wrote to memory of 4272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 73 PID 2584 wrote to memory of 4272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 73 PID 2584 wrote to memory of 2272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 79 PID 2584 wrote to memory of 2272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 79 PID 2584 wrote to memory of 2272 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 79 PID 2272 wrote to memory of 4940 2272 cmd.exe 81 PID 2272 wrote to memory of 4940 2272 cmd.exe 81 PID 2272 wrote to memory of 4940 2272 cmd.exe 81 PID 2584 wrote to memory of 4596 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 82 PID 2584 wrote to memory of 4596 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 82 PID 2584 wrote to memory of 4596 2584 eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe 82 PID 4596 wrote to memory of 4548 4596 cmd.exe 84 PID 4596 wrote to memory of 4548 4596 cmd.exe 84 PID 4596 wrote to memory of 4548 4596 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe"C:\Users\Admin\AppData\Local\Temp\eda9684904496a45c2f9b41f1ef4739e5bfa5bcdd9730541496b018a51d04ed2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5242⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5402⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5802⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5562⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 6162⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 8682⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 13202⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 13722⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 14162⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 15002⤵
- Program crash
PID:164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 12282⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 6722⤵
- Program crash
PID:524
-