Analysis
-
max time kernel
53s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/10/2022, 21:25
Static task
static1
General
-
Target
6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe
-
Size
5.8MB
-
MD5
a99f3bde50029a27c5ed0a4f3d9dc157
-
SHA1
38c5b905e9691e9643c9187985ab60c88a8688ab
-
SHA256
6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1
-
SHA512
38f8efe5f3f619d6b673f19f44f5346db23c6c0c1bf266a2fdc973df083d8b683d19aedf0baa398df52bc37ff224aa20b3390bc1b2dd451a12ca5ac11b0fdb95
-
SSDEEP
49152:qnV9xagFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:qnV9xoSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 1652 2696 WerFault.exe 65 5036 2696 WerFault.exe 65 5100 2696 WerFault.exe 65 1008 2696 WerFault.exe 65 4436 2696 WerFault.exe 65 3788 2696 WerFault.exe 65 3944 2696 WerFault.exe 65 5076 2696 WerFault.exe 65 4236 2696 WerFault.exe 65 2264 2696 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3364 wmic.exe Token: SeSecurityPrivilege 3364 wmic.exe Token: SeTakeOwnershipPrivilege 3364 wmic.exe Token: SeLoadDriverPrivilege 3364 wmic.exe Token: SeSystemProfilePrivilege 3364 wmic.exe Token: SeSystemtimePrivilege 3364 wmic.exe Token: SeProfSingleProcessPrivilege 3364 wmic.exe Token: SeIncBasePriorityPrivilege 3364 wmic.exe Token: SeCreatePagefilePrivilege 3364 wmic.exe Token: SeBackupPrivilege 3364 wmic.exe Token: SeRestorePrivilege 3364 wmic.exe Token: SeShutdownPrivilege 3364 wmic.exe Token: SeDebugPrivilege 3364 wmic.exe Token: SeSystemEnvironmentPrivilege 3364 wmic.exe Token: SeRemoteShutdownPrivilege 3364 wmic.exe Token: SeUndockPrivilege 3364 wmic.exe Token: SeManageVolumePrivilege 3364 wmic.exe Token: 33 3364 wmic.exe Token: 34 3364 wmic.exe Token: 35 3364 wmic.exe Token: 36 3364 wmic.exe Token: SeIncreaseQuotaPrivilege 3364 wmic.exe Token: SeSecurityPrivilege 3364 wmic.exe Token: SeTakeOwnershipPrivilege 3364 wmic.exe Token: SeLoadDriverPrivilege 3364 wmic.exe Token: SeSystemProfilePrivilege 3364 wmic.exe Token: SeSystemtimePrivilege 3364 wmic.exe Token: SeProfSingleProcessPrivilege 3364 wmic.exe Token: SeIncBasePriorityPrivilege 3364 wmic.exe Token: SeCreatePagefilePrivilege 3364 wmic.exe Token: SeBackupPrivilege 3364 wmic.exe Token: SeRestorePrivilege 3364 wmic.exe Token: SeShutdownPrivilege 3364 wmic.exe Token: SeDebugPrivilege 3364 wmic.exe Token: SeSystemEnvironmentPrivilege 3364 wmic.exe Token: SeRemoteShutdownPrivilege 3364 wmic.exe Token: SeUndockPrivilege 3364 wmic.exe Token: SeManageVolumePrivilege 3364 wmic.exe Token: 33 3364 wmic.exe Token: 34 3364 wmic.exe Token: 35 3364 wmic.exe Token: 36 3364 wmic.exe Token: SeIncreaseQuotaPrivilege 4232 WMIC.exe Token: SeSecurityPrivilege 4232 WMIC.exe Token: SeTakeOwnershipPrivilege 4232 WMIC.exe Token: SeLoadDriverPrivilege 4232 WMIC.exe Token: SeSystemProfilePrivilege 4232 WMIC.exe Token: SeSystemtimePrivilege 4232 WMIC.exe Token: SeProfSingleProcessPrivilege 4232 WMIC.exe Token: SeIncBasePriorityPrivilege 4232 WMIC.exe Token: SeCreatePagefilePrivilege 4232 WMIC.exe Token: SeBackupPrivilege 4232 WMIC.exe Token: SeRestorePrivilege 4232 WMIC.exe Token: SeShutdownPrivilege 4232 WMIC.exe Token: SeDebugPrivilege 4232 WMIC.exe Token: SeSystemEnvironmentPrivilege 4232 WMIC.exe Token: SeRemoteShutdownPrivilege 4232 WMIC.exe Token: SeUndockPrivilege 4232 WMIC.exe Token: SeManageVolumePrivilege 4232 WMIC.exe Token: 33 4232 WMIC.exe Token: 34 4232 WMIC.exe Token: 35 4232 WMIC.exe Token: 36 4232 WMIC.exe Token: SeIncreaseQuotaPrivilege 4232 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3364 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 73 PID 2696 wrote to memory of 3364 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 73 PID 2696 wrote to memory of 3364 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 73 PID 2696 wrote to memory of 2304 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 78 PID 2696 wrote to memory of 2304 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 78 PID 2696 wrote to memory of 2304 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 78 PID 2304 wrote to memory of 4232 2304 cmd.exe 81 PID 2304 wrote to memory of 4232 2304 cmd.exe 81 PID 2304 wrote to memory of 4232 2304 cmd.exe 81 PID 2696 wrote to memory of 4784 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 82 PID 2696 wrote to memory of 4784 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 82 PID 2696 wrote to memory of 4784 2696 6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe 82 PID 4784 wrote to memory of 4836 4784 cmd.exe 84 PID 4784 wrote to memory of 4836 4784 cmd.exe 84 PID 4784 wrote to memory of 4836 4784 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe"C:\Users\Admin\AppData\Local\Temp\6e89207dde0d162a73640353fd7100ce243ec10ad78ea5c1509d0da83f3ee2f1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 5442⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 5242⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 5042⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 6402⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 7482⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 8962⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 13562⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 13882⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 12802⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 3122⤵
- Program crash
PID:2264
-