Analysis
-
max time kernel
52s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 22:47
Static task
static1
General
-
Target
1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe
-
Size
5.8MB
-
MD5
4da2dd0bb88bb8c1bdd8ceca5f70ec74
-
SHA1
ca03c629127e3653ee5549a33021954428f32424
-
SHA256
1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37
-
SHA512
43d4a7f442b55feac82f2f6ad717ce778eb3b62ce1bd95ac4aae4f39e2301c81a0014d496b9119e1fc927ce2ad35925e38091868fce979b514a6cf0b3b9d634f
-
SSDEEP
49152:qnV9xaJFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:qnV9xLSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 664 736 WerFault.exe 82 636 736 WerFault.exe 82 4896 736 WerFault.exe 82 1740 736 WerFault.exe 82 4868 736 WerFault.exe 82 1980 736 WerFault.exe 82 2828 736 WerFault.exe 82 3704 736 WerFault.exe 82 1528 736 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4812 wmic.exe Token: SeSecurityPrivilege 4812 wmic.exe Token: SeTakeOwnershipPrivilege 4812 wmic.exe Token: SeLoadDriverPrivilege 4812 wmic.exe Token: SeSystemProfilePrivilege 4812 wmic.exe Token: SeSystemtimePrivilege 4812 wmic.exe Token: SeProfSingleProcessPrivilege 4812 wmic.exe Token: SeIncBasePriorityPrivilege 4812 wmic.exe Token: SeCreatePagefilePrivilege 4812 wmic.exe Token: SeBackupPrivilege 4812 wmic.exe Token: SeRestorePrivilege 4812 wmic.exe Token: SeShutdownPrivilege 4812 wmic.exe Token: SeDebugPrivilege 4812 wmic.exe Token: SeSystemEnvironmentPrivilege 4812 wmic.exe Token: SeRemoteShutdownPrivilege 4812 wmic.exe Token: SeUndockPrivilege 4812 wmic.exe Token: SeManageVolumePrivilege 4812 wmic.exe Token: 33 4812 wmic.exe Token: 34 4812 wmic.exe Token: 35 4812 wmic.exe Token: 36 4812 wmic.exe Token: SeIncreaseQuotaPrivilege 4812 wmic.exe Token: SeSecurityPrivilege 4812 wmic.exe Token: SeTakeOwnershipPrivilege 4812 wmic.exe Token: SeLoadDriverPrivilege 4812 wmic.exe Token: SeSystemProfilePrivilege 4812 wmic.exe Token: SeSystemtimePrivilege 4812 wmic.exe Token: SeProfSingleProcessPrivilege 4812 wmic.exe Token: SeIncBasePriorityPrivilege 4812 wmic.exe Token: SeCreatePagefilePrivilege 4812 wmic.exe Token: SeBackupPrivilege 4812 wmic.exe Token: SeRestorePrivilege 4812 wmic.exe Token: SeShutdownPrivilege 4812 wmic.exe Token: SeDebugPrivilege 4812 wmic.exe Token: SeSystemEnvironmentPrivilege 4812 wmic.exe Token: SeRemoteShutdownPrivilege 4812 wmic.exe Token: SeUndockPrivilege 4812 wmic.exe Token: SeManageVolumePrivilege 4812 wmic.exe Token: 33 4812 wmic.exe Token: 34 4812 wmic.exe Token: 35 4812 wmic.exe Token: 36 4812 wmic.exe Token: SeIncreaseQuotaPrivilege 4552 WMIC.exe Token: SeSecurityPrivilege 4552 WMIC.exe Token: SeTakeOwnershipPrivilege 4552 WMIC.exe Token: SeLoadDriverPrivilege 4552 WMIC.exe Token: SeSystemProfilePrivilege 4552 WMIC.exe Token: SeSystemtimePrivilege 4552 WMIC.exe Token: SeProfSingleProcessPrivilege 4552 WMIC.exe Token: SeIncBasePriorityPrivilege 4552 WMIC.exe Token: SeCreatePagefilePrivilege 4552 WMIC.exe Token: SeBackupPrivilege 4552 WMIC.exe Token: SeRestorePrivilege 4552 WMIC.exe Token: SeShutdownPrivilege 4552 WMIC.exe Token: SeDebugPrivilege 4552 WMIC.exe Token: SeSystemEnvironmentPrivilege 4552 WMIC.exe Token: SeRemoteShutdownPrivilege 4552 WMIC.exe Token: SeUndockPrivilege 4552 WMIC.exe Token: SeManageVolumePrivilege 4552 WMIC.exe Token: 33 4552 WMIC.exe Token: 34 4552 WMIC.exe Token: 35 4552 WMIC.exe Token: 36 4552 WMIC.exe Token: SeIncreaseQuotaPrivilege 4552 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 736 wrote to memory of 4812 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 96 PID 736 wrote to memory of 4812 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 96 PID 736 wrote to memory of 4812 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 96 PID 736 wrote to memory of 224 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 102 PID 736 wrote to memory of 224 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 102 PID 736 wrote to memory of 224 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 102 PID 224 wrote to memory of 4552 224 cmd.exe 104 PID 224 wrote to memory of 4552 224 cmd.exe 104 PID 224 wrote to memory of 4552 224 cmd.exe 104 PID 736 wrote to memory of 4152 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 105 PID 736 wrote to memory of 4152 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 105 PID 736 wrote to memory of 4152 736 1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe 105 PID 4152 wrote to memory of 4008 4152 cmd.exe 107 PID 4152 wrote to memory of 4008 4152 cmd.exe 107 PID 4152 wrote to memory of 4008 4152 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe"C:\Users\Admin\AppData\Local\Temp\1bf9c09a63b19fd3c5d6c10675cc1dcabcf9b974e7a33e7836b243d154994c37.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 4962⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 4882⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 4882⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6362⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 7842⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 8802⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 13362⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 13042⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 1602⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 736 -ip 7361⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 736 -ip 7361⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 736 -ip 7361⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 736 -ip 7361⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 736 -ip 7361⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 736 -ip 7361⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 736 -ip 7361⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 736 -ip 7361⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 736 -ip 7361⤵PID:484