Analysis
-
max time kernel
66s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2022 12:36
Static task
static1
General
-
Target
a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe
-
Size
6.3MB
-
MD5
88b198508d4fcbc156e79d1eb2b78b85
-
SHA1
62770942aa1c5681dca1421bf7dfe7c2c8121290
-
SHA256
a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db
-
SHA512
b4b6204092694f18e218afe4092b10b049319a574e9d8d96dd7313e652e87339d0bf4b45e58153543622820e3b1728d42829fabfab4d7ad0e824569a6edda8bd
-
SSDEEP
49152:bkmZbQsxBXQbKXmugFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcr:bkcbf6bKXzSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 4988 4876 WerFault.exe 82 5012 4876 WerFault.exe 82 1340 4876 WerFault.exe 82 2796 4876 WerFault.exe 82 652 4876 WerFault.exe 82 4812 4876 WerFault.exe 82 1628 4876 WerFault.exe 82 2248 4876 WerFault.exe 82 900 4876 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe Token: SeManageVolumePrivilege 1104 wmic.exe Token: 33 1104 wmic.exe Token: 34 1104 wmic.exe Token: 35 1104 wmic.exe Token: 36 1104 wmic.exe Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe Token: SeManageVolumePrivilege 1104 wmic.exe Token: 33 1104 wmic.exe Token: 34 1104 wmic.exe Token: 35 1104 wmic.exe Token: 36 1104 wmic.exe Token: SeIncreaseQuotaPrivilege 1244 WMIC.exe Token: SeSecurityPrivilege 1244 WMIC.exe Token: SeTakeOwnershipPrivilege 1244 WMIC.exe Token: SeLoadDriverPrivilege 1244 WMIC.exe Token: SeSystemProfilePrivilege 1244 WMIC.exe Token: SeSystemtimePrivilege 1244 WMIC.exe Token: SeProfSingleProcessPrivilege 1244 WMIC.exe Token: SeIncBasePriorityPrivilege 1244 WMIC.exe Token: SeCreatePagefilePrivilege 1244 WMIC.exe Token: SeBackupPrivilege 1244 WMIC.exe Token: SeRestorePrivilege 1244 WMIC.exe Token: SeShutdownPrivilege 1244 WMIC.exe Token: SeDebugPrivilege 1244 WMIC.exe Token: SeSystemEnvironmentPrivilege 1244 WMIC.exe Token: SeRemoteShutdownPrivilege 1244 WMIC.exe Token: SeUndockPrivilege 1244 WMIC.exe Token: SeManageVolumePrivilege 1244 WMIC.exe Token: 33 1244 WMIC.exe Token: 34 1244 WMIC.exe Token: 35 1244 WMIC.exe Token: 36 1244 WMIC.exe Token: SeIncreaseQuotaPrivilege 1244 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1104 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 96 PID 4876 wrote to memory of 1104 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 96 PID 4876 wrote to memory of 1104 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 96 PID 4876 wrote to memory of 228 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 102 PID 4876 wrote to memory of 228 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 102 PID 4876 wrote to memory of 228 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 102 PID 228 wrote to memory of 1244 228 cmd.exe 104 PID 228 wrote to memory of 1244 228 cmd.exe 104 PID 228 wrote to memory of 1244 228 cmd.exe 104 PID 4876 wrote to memory of 4060 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 105 PID 4876 wrote to memory of 4060 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 105 PID 4876 wrote to memory of 4060 4876 a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe 105 PID 4060 wrote to memory of 4324 4060 cmd.exe 107 PID 4060 wrote to memory of 4324 4060 cmd.exe 107 PID 4060 wrote to memory of 4324 4060 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe"C:\Users\Admin\AppData\Local\Temp\a51965b83aa781d74dfaa494891dd8bbe9909f51132b80debf0111f1ae2c69db.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 5042⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 5842⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 6242⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 6682⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 7882⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 8802⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 13242⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 13842⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 1402⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4876 -ip 48761⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4876 -ip 48761⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4876 -ip 48761⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4876 -ip 48761⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4876 -ip 48761⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4876 -ip 48761⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4876 -ip 48761⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4876 -ip 48761⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4876 -ip 48761⤵PID:3388