Analysis
-
max time kernel
181s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8.exe
-
Size
17KB
-
MD5
b8b5015590ef55b4c7276024173fcbe5
-
SHA1
9e249cee8c789b8db513fc48662cade2b4a71da4
-
SHA256
fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8
-
SHA512
2de777e8841a1a979376d74703845845b30e4f5cfc60bb6d68501af8363f8331d8b75018172f64a4e698e06be0919a8c52f5f8e906def378adf822baa804d784
-
SSDEEP
384:ANRGleZythygKYgL46eR+Q6YK4G8pRaBKJG/dvzoIll:0RGleZythxNgL49+k7ucGloIll
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4260 2316 WerFault.exe fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8.exe"C:\Users\Admin\AppData\Local\Temp\fa277514108e03daaa4c340ac70a8281e08076220f8e029eff63bc49ec8496e8.exe"1⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 10042⤵
- Program crash
PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2316 -ip 23161⤵PID:2832