Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2022 13:22

General

  • Target

    file.exe

  • Size

    341KB

  • MD5

    f74b8a26c17f34e9d2fab601a89f45e0

  • SHA1

    2fd3ee8afe9dded48f389ebfff16327123565817

  • SHA256

    558e19403ee263bb51b7f77bf32048309935a8237b2e15435b3292455aacbc0f

  • SHA512

    709579aae3d26e7752fb55ed86a982c8a050d00d818ed5e3a7f55073f48079f8cb213343f59ff539982560223a7dcaa5f313ba731c391f848a2fe7033f192cda

  • SSDEEP

    6144:PDFLG5aXiojydFsWlxfblKxu2BiM1Eo9/4J80f4XNjMv9hMOu1:P5C5aXioOnbxfE0+iaNR4Fg9e9Z

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 1784
      2⤵
      • Program crash
      PID:3120
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1112 -ip 1112
    1⤵
      PID:4464

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1112-132-0x0000000004E00000-0x00000000053A4000-memory.dmp
      Filesize

      5.6MB

    • memory/1112-133-0x0000000000889000-0x00000000008BF000-memory.dmp
      Filesize

      216KB

    • memory/1112-134-0x0000000002360000-0x00000000023B9000-memory.dmp
      Filesize

      356KB

    • memory/1112-135-0x0000000000400000-0x00000000005B0000-memory.dmp
      Filesize

      1.7MB

    • memory/1112-136-0x00000000053B0000-0x00000000059C8000-memory.dmp
      Filesize

      6.1MB

    • memory/1112-137-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
      Filesize

      72KB

    • memory/1112-138-0x00000000059D0000-0x0000000005ADA000-memory.dmp
      Filesize

      1.0MB

    • memory/1112-139-0x0000000005AE0000-0x0000000005B1C000-memory.dmp
      Filesize

      240KB

    • memory/1112-140-0x0000000000889000-0x00000000008BF000-memory.dmp
      Filesize

      216KB

    • memory/1112-141-0x0000000005F20000-0x0000000005F86000-memory.dmp
      Filesize

      408KB

    • memory/1112-142-0x00000000065E0000-0x0000000006672000-memory.dmp
      Filesize

      584KB

    • memory/1112-143-0x00000000067B0000-0x0000000006826000-memory.dmp
      Filesize

      472KB

    • memory/1112-144-0x0000000006870000-0x000000000688E000-memory.dmp
      Filesize

      120KB

    • memory/1112-145-0x0000000006990000-0x0000000006B52000-memory.dmp
      Filesize

      1.8MB

    • memory/1112-146-0x0000000006B60000-0x000000000708C000-memory.dmp
      Filesize

      5.2MB

    • memory/1112-147-0x0000000000889000-0x00000000008BF000-memory.dmp
      Filesize

      216KB

    • memory/1112-148-0x0000000000400000-0x00000000005B0000-memory.dmp
      Filesize

      1.7MB