Analysis
-
max time kernel
52s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-10-2022 11:46
Static task
static1
General
-
Target
92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe
-
Size
5.8MB
-
MD5
aa91de9959374554d6ce5ed91206523c
-
SHA1
e4e1e1747672940ac5aff7145707f66f790fbee1
-
SHA256
92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f
-
SHA512
706d2741b4b0983ee66afa5eef75d684ea0d6bcff538cef9c10e1fe79c84ed52e78c50dfcf168af7c0fa0b98c8fb74d9414692fd39a511696fd36d94afdf58cd
-
SSDEEP
49152:qnV9xaaFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:qnV9xWSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 2316 2732 WerFault.exe 65 3528 2732 WerFault.exe 65 4320 2732 WerFault.exe 65 4344 2732 WerFault.exe 65 4892 2732 WerFault.exe 65 2176 2732 WerFault.exe 65 4948 2732 WerFault.exe 65 4252 2732 WerFault.exe 65 4484 2732 WerFault.exe 65 1060 2732 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeIncreaseQuotaPrivilege 2224 WMIC.exe Token: SeSecurityPrivilege 2224 WMIC.exe Token: SeTakeOwnershipPrivilege 2224 WMIC.exe Token: SeLoadDriverPrivilege 2224 WMIC.exe Token: SeSystemProfilePrivilege 2224 WMIC.exe Token: SeSystemtimePrivilege 2224 WMIC.exe Token: SeProfSingleProcessPrivilege 2224 WMIC.exe Token: SeIncBasePriorityPrivilege 2224 WMIC.exe Token: SeCreatePagefilePrivilege 2224 WMIC.exe Token: SeBackupPrivilege 2224 WMIC.exe Token: SeRestorePrivilege 2224 WMIC.exe Token: SeShutdownPrivilege 2224 WMIC.exe Token: SeDebugPrivilege 2224 WMIC.exe Token: SeSystemEnvironmentPrivilege 2224 WMIC.exe Token: SeRemoteShutdownPrivilege 2224 WMIC.exe Token: SeUndockPrivilege 2224 WMIC.exe Token: SeManageVolumePrivilege 2224 WMIC.exe Token: 33 2224 WMIC.exe Token: 34 2224 WMIC.exe Token: 35 2224 WMIC.exe Token: 36 2224 WMIC.exe Token: SeIncreaseQuotaPrivilege 2224 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3036 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 73 PID 2732 wrote to memory of 3036 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 73 PID 2732 wrote to memory of 3036 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 73 PID 2732 wrote to memory of 4244 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 79 PID 2732 wrote to memory of 4244 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 79 PID 2732 wrote to memory of 4244 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 79 PID 4244 wrote to memory of 2224 4244 cmd.exe 81 PID 4244 wrote to memory of 2224 4244 cmd.exe 81 PID 4244 wrote to memory of 2224 4244 cmd.exe 81 PID 2732 wrote to memory of 4688 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 82 PID 2732 wrote to memory of 4688 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 82 PID 2732 wrote to memory of 4688 2732 92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe 82 PID 4688 wrote to memory of 4432 4688 cmd.exe 84 PID 4688 wrote to memory of 4432 4688 cmd.exe 84 PID 4688 wrote to memory of 4432 4688 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe"C:\Users\Admin\AppData\Local\Temp\92b9fc928f7d678966292917b6d124298b23f74c35011c681af92cc4cbfd3f4f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5442⤵
- Program crash
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5482⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5842⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 6402⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 7762⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 8802⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 13682⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 13762⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 14642⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3202⤵
- Program crash
PID:1060
-