Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2022 16:49
Static task
static1
General
-
Target
1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe
-
Size
6.3MB
-
MD5
c7763534d7f58ba28c2a01ccc26ee357
-
SHA1
b29a3cb0c78e2bc86dd93be9b77387f181b7605c
-
SHA256
1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7
-
SHA512
5160e71206c71039262fe5f5529a0d1059f4118daa8dfb4a2473cd10631d787ceefb7af404d84b87f018badea42bcfa8cdf629e6e9b11c25629fe611edcc1f2f
-
SSDEEP
49152:bkmZbQsxBXQbKXmu0Fe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcr:bkcbf6bKXPSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 3592 2764 WerFault.exe 65 4868 2764 WerFault.exe 65 2264 2764 WerFault.exe 65 3420 2764 WerFault.exe 65 1612 2764 WerFault.exe 65 1316 2764 WerFault.exe 65 2852 2764 WerFault.exe 65 4964 2764 WerFault.exe 65 4928 2764 WerFault.exe 65 1924 2764 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1156 wmic.exe Token: SeSecurityPrivilege 1156 wmic.exe Token: SeTakeOwnershipPrivilege 1156 wmic.exe Token: SeLoadDriverPrivilege 1156 wmic.exe Token: SeSystemProfilePrivilege 1156 wmic.exe Token: SeSystemtimePrivilege 1156 wmic.exe Token: SeProfSingleProcessPrivilege 1156 wmic.exe Token: SeIncBasePriorityPrivilege 1156 wmic.exe Token: SeCreatePagefilePrivilege 1156 wmic.exe Token: SeBackupPrivilege 1156 wmic.exe Token: SeRestorePrivilege 1156 wmic.exe Token: SeShutdownPrivilege 1156 wmic.exe Token: SeDebugPrivilege 1156 wmic.exe Token: SeSystemEnvironmentPrivilege 1156 wmic.exe Token: SeRemoteShutdownPrivilege 1156 wmic.exe Token: SeUndockPrivilege 1156 wmic.exe Token: SeManageVolumePrivilege 1156 wmic.exe Token: 33 1156 wmic.exe Token: 34 1156 wmic.exe Token: 35 1156 wmic.exe Token: 36 1156 wmic.exe Token: SeIncreaseQuotaPrivilege 1156 wmic.exe Token: SeSecurityPrivilege 1156 wmic.exe Token: SeTakeOwnershipPrivilege 1156 wmic.exe Token: SeLoadDriverPrivilege 1156 wmic.exe Token: SeSystemProfilePrivilege 1156 wmic.exe Token: SeSystemtimePrivilege 1156 wmic.exe Token: SeProfSingleProcessPrivilege 1156 wmic.exe Token: SeIncBasePriorityPrivilege 1156 wmic.exe Token: SeCreatePagefilePrivilege 1156 wmic.exe Token: SeBackupPrivilege 1156 wmic.exe Token: SeRestorePrivilege 1156 wmic.exe Token: SeShutdownPrivilege 1156 wmic.exe Token: SeDebugPrivilege 1156 wmic.exe Token: SeSystemEnvironmentPrivilege 1156 wmic.exe Token: SeRemoteShutdownPrivilege 1156 wmic.exe Token: SeUndockPrivilege 1156 wmic.exe Token: SeManageVolumePrivilege 1156 wmic.exe Token: 33 1156 wmic.exe Token: 34 1156 wmic.exe Token: 35 1156 wmic.exe Token: 36 1156 wmic.exe Token: SeIncreaseQuotaPrivilege 2280 WMIC.exe Token: SeSecurityPrivilege 2280 WMIC.exe Token: SeTakeOwnershipPrivilege 2280 WMIC.exe Token: SeLoadDriverPrivilege 2280 WMIC.exe Token: SeSystemProfilePrivilege 2280 WMIC.exe Token: SeSystemtimePrivilege 2280 WMIC.exe Token: SeProfSingleProcessPrivilege 2280 WMIC.exe Token: SeIncBasePriorityPrivilege 2280 WMIC.exe Token: SeCreatePagefilePrivilege 2280 WMIC.exe Token: SeBackupPrivilege 2280 WMIC.exe Token: SeRestorePrivilege 2280 WMIC.exe Token: SeShutdownPrivilege 2280 WMIC.exe Token: SeDebugPrivilege 2280 WMIC.exe Token: SeSystemEnvironmentPrivilege 2280 WMIC.exe Token: SeRemoteShutdownPrivilege 2280 WMIC.exe Token: SeUndockPrivilege 2280 WMIC.exe Token: SeManageVolumePrivilege 2280 WMIC.exe Token: 33 2280 WMIC.exe Token: 34 2280 WMIC.exe Token: 35 2280 WMIC.exe Token: 36 2280 WMIC.exe Token: SeIncreaseQuotaPrivilege 2280 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1156 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 73 PID 2764 wrote to memory of 1156 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 73 PID 2764 wrote to memory of 1156 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 73 PID 2764 wrote to memory of 4968 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 79 PID 2764 wrote to memory of 4968 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 79 PID 2764 wrote to memory of 4968 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 79 PID 4968 wrote to memory of 2280 4968 cmd.exe 81 PID 4968 wrote to memory of 2280 4968 cmd.exe 81 PID 4968 wrote to memory of 2280 4968 cmd.exe 81 PID 2764 wrote to memory of 444 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 82 PID 2764 wrote to memory of 444 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 82 PID 2764 wrote to memory of 444 2764 1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe 82 PID 444 wrote to memory of 4668 444 cmd.exe 84 PID 444 wrote to memory of 4668 444 cmd.exe 84 PID 444 wrote to memory of 4668 444 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe"C:\Users\Admin\AppData\Local\Temp\1fca93908f66e2b70232b015640525bfcc3475dfc8f05396501f5ecd405ad6a7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 5442⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 5322⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 5882⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 6402⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 7562⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 9842⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 13282⤵
- Program crash
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 13442⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 13762⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 3122⤵
- Program crash
PID:1924
-