Analysis
-
max time kernel
90s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/10/2022, 09:50
Static task
static1
General
-
Target
30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe
-
Size
6.3MB
-
MD5
4559d16581b12662ee65e822c6f771d8
-
SHA1
d3ef97e8eb088dc674dcbeefeb1f1944400f25e8
-
SHA256
30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0
-
SHA512
0c57ccff3a842cdd4a3ec88469bdf224115daf4dc443a684e980b113209f7a3b007fdf15353a516ba48c220e428acf39dc1ca796205910f74e9724aef8febdaf
-
SSDEEP
49152:bkmZbQsxBXQbKXmugFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcr:bkcbf6bKXzSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 2256 4208 WerFault.exe 65 2108 4208 WerFault.exe 65 4792 4208 WerFault.exe 65 4252 4208 WerFault.exe 65 1356 4208 WerFault.exe 65 2688 4208 WerFault.exe 65 4768 4208 WerFault.exe 65 4748 4208 WerFault.exe 65 4332 4208 WerFault.exe 65 2312 4208 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4284 wmic.exe Token: SeSecurityPrivilege 4284 wmic.exe Token: SeTakeOwnershipPrivilege 4284 wmic.exe Token: SeLoadDriverPrivilege 4284 wmic.exe Token: SeSystemProfilePrivilege 4284 wmic.exe Token: SeSystemtimePrivilege 4284 wmic.exe Token: SeProfSingleProcessPrivilege 4284 wmic.exe Token: SeIncBasePriorityPrivilege 4284 wmic.exe Token: SeCreatePagefilePrivilege 4284 wmic.exe Token: SeBackupPrivilege 4284 wmic.exe Token: SeRestorePrivilege 4284 wmic.exe Token: SeShutdownPrivilege 4284 wmic.exe Token: SeDebugPrivilege 4284 wmic.exe Token: SeSystemEnvironmentPrivilege 4284 wmic.exe Token: SeRemoteShutdownPrivilege 4284 wmic.exe Token: SeUndockPrivilege 4284 wmic.exe Token: SeManageVolumePrivilege 4284 wmic.exe Token: 33 4284 wmic.exe Token: 34 4284 wmic.exe Token: 35 4284 wmic.exe Token: 36 4284 wmic.exe Token: SeIncreaseQuotaPrivilege 4284 wmic.exe Token: SeSecurityPrivilege 4284 wmic.exe Token: SeTakeOwnershipPrivilege 4284 wmic.exe Token: SeLoadDriverPrivilege 4284 wmic.exe Token: SeSystemProfilePrivilege 4284 wmic.exe Token: SeSystemtimePrivilege 4284 wmic.exe Token: SeProfSingleProcessPrivilege 4284 wmic.exe Token: SeIncBasePriorityPrivilege 4284 wmic.exe Token: SeCreatePagefilePrivilege 4284 wmic.exe Token: SeBackupPrivilege 4284 wmic.exe Token: SeRestorePrivilege 4284 wmic.exe Token: SeShutdownPrivilege 4284 wmic.exe Token: SeDebugPrivilege 4284 wmic.exe Token: SeSystemEnvironmentPrivilege 4284 wmic.exe Token: SeRemoteShutdownPrivilege 4284 wmic.exe Token: SeUndockPrivilege 4284 wmic.exe Token: SeManageVolumePrivilege 4284 wmic.exe Token: 33 4284 wmic.exe Token: 34 4284 wmic.exe Token: 35 4284 wmic.exe Token: 36 4284 wmic.exe Token: SeIncreaseQuotaPrivilege 3740 WMIC.exe Token: SeSecurityPrivilege 3740 WMIC.exe Token: SeTakeOwnershipPrivilege 3740 WMIC.exe Token: SeLoadDriverPrivilege 3740 WMIC.exe Token: SeSystemProfilePrivilege 3740 WMIC.exe Token: SeSystemtimePrivilege 3740 WMIC.exe Token: SeProfSingleProcessPrivilege 3740 WMIC.exe Token: SeIncBasePriorityPrivilege 3740 WMIC.exe Token: SeCreatePagefilePrivilege 3740 WMIC.exe Token: SeBackupPrivilege 3740 WMIC.exe Token: SeRestorePrivilege 3740 WMIC.exe Token: SeShutdownPrivilege 3740 WMIC.exe Token: SeDebugPrivilege 3740 WMIC.exe Token: SeSystemEnvironmentPrivilege 3740 WMIC.exe Token: SeRemoteShutdownPrivilege 3740 WMIC.exe Token: SeUndockPrivilege 3740 WMIC.exe Token: SeManageVolumePrivilege 3740 WMIC.exe Token: 33 3740 WMIC.exe Token: 34 3740 WMIC.exe Token: 35 3740 WMIC.exe Token: 36 3740 WMIC.exe Token: SeIncreaseQuotaPrivilege 3740 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 73 PID 4208 wrote to memory of 4284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 73 PID 4208 wrote to memory of 4284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 73 PID 4208 wrote to memory of 3284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 79 PID 4208 wrote to memory of 3284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 79 PID 4208 wrote to memory of 3284 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 79 PID 3284 wrote to memory of 3740 3284 cmd.exe 81 PID 3284 wrote to memory of 3740 3284 cmd.exe 81 PID 3284 wrote to memory of 3740 3284 cmd.exe 81 PID 4208 wrote to memory of 4856 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 82 PID 4208 wrote to memory of 4856 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 82 PID 4208 wrote to memory of 4856 4208 30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe 82 PID 4856 wrote to memory of 764 4856 cmd.exe 84 PID 4856 wrote to memory of 764 4856 cmd.exe 84 PID 4856 wrote to memory of 764 4856 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe"C:\Users\Admin\AppData\Local\Temp\30aea6c89c155da505e528cb7b50a92572c4b3d4cea1d6880888b5a99c7b9ae0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 5442⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 5602⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 5202⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 6562⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 7762⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 8762⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 13282⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 13442⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 13962⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 3122⤵
- Program crash
PID:2312
-