Analysis
-
max time kernel
94s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
373KB
-
MD5
c351500d1e26876f84ac2df4f7cf6577
-
SHA1
d33b50a5c77d4a0992a7b8f73e623e15a114ea3f
-
SHA256
4aa9220963ecf6f912f6ba434a4086817af295fedfb975862e0bd8b967b38dff
-
SHA512
392fd668118d6196e80a3d55e3af86563b4a0f63bb0198389d46f10f7c197456bc6448ba4534382fb8f293375a145a24a9123ffec3cf4888dc35e2503a188059
-
SSDEEP
6144:7qOL9Pky9a80vcTDBv2ZDHFoJQ5VkiLVxQDyYUFvFxGb:7T5cy9a4h2dHF0QTkZ+YsA
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3804 2124 WerFault.exe file.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 2124 file.exe 2124 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 2124 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 12362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2124 -ip 21241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2124-132-0x0000000000AD7000-0x0000000000B0D000-memory.dmpFilesize
216KB
-
memory/2124-133-0x00000000008A0000-0x00000000008F9000-memory.dmpFilesize
356KB
-
memory/2124-134-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB
-
memory/2124-135-0x0000000005150000-0x00000000056F4000-memory.dmpFilesize
5.6MB
-
memory/2124-136-0x0000000005700000-0x0000000005D18000-memory.dmpFilesize
6.1MB
-
memory/2124-137-0x0000000005060000-0x0000000005072000-memory.dmpFilesize
72KB
-
memory/2124-138-0x0000000005D20000-0x0000000005E2A000-memory.dmpFilesize
1.0MB
-
memory/2124-139-0x0000000005080000-0x00000000050BC000-memory.dmpFilesize
240KB
-
memory/2124-140-0x0000000006080000-0x00000000060E6000-memory.dmpFilesize
408KB
-
memory/2124-141-0x0000000006760000-0x00000000067F2000-memory.dmpFilesize
584KB
-
memory/2124-142-0x0000000006920000-0x0000000006AE2000-memory.dmpFilesize
1.8MB
-
memory/2124-143-0x0000000006B10000-0x000000000703C000-memory.dmpFilesize
5.2MB
-
memory/2124-144-0x0000000007150000-0x00000000071C6000-memory.dmpFilesize
472KB
-
memory/2124-145-0x0000000007210000-0x000000000722E000-memory.dmpFilesize
120KB
-
memory/2124-146-0x0000000000AD7000-0x0000000000B0D000-memory.dmpFilesize
216KB
-
memory/2124-147-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB
-
memory/2124-148-0x0000000000AD7000-0x0000000000B0D000-memory.dmpFilesize
216KB
-
memory/2124-149-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB