Analysis

  • max time kernel
    152s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 20:21

General

  • Target

    7776016bbea5b4c7e67f9bda2d6493444cf785b9115ce.exe

  • Size

    297KB

  • MD5

    db0eb86ca71632c262136c286b22d7b0

  • SHA1

    f6c27bbc17b2e9d8197a38216faf3bafd15a3526

  • SHA256

    7776016bbea5b4c7e67f9bda2d6493444cf785b9115cee0ee905e865177ecb69

  • SHA512

    12bc96489e2098842d406fbbcfbd7f3b6e401a7cebb83f5e1580e668fd7260a980c175444a8f3efadabfe82e27bebadbfb89568de2b2f49172da00adc7b1bde5

  • SSDEEP

    6144:QsjPWM7wEAm+ANAi1HDHAE9n68XJHnJpcUlGO2D:Q4FlXDHAEJJJHoUw

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7776016bbea5b4c7e67f9bda2d6493444cf785b9115ce.exe
    "C:\Users\Admin\AppData\Local\Temp\7776016bbea5b4c7e67f9bda2d6493444cf785b9115ce.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 1280
      2⤵
      • Program crash
      PID:4344
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3988 -ip 3988
    1⤵
      PID:2336

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3988-132-0x000000000061D000-0x0000000000653000-memory.dmp
      Filesize

      216KB

    • memory/3988-133-0x00000000020A0000-0x00000000020F8000-memory.dmp
      Filesize

      352KB

    • memory/3988-134-0x0000000000400000-0x0000000000480000-memory.dmp
      Filesize

      512KB

    • memory/3988-135-0x0000000004C90000-0x0000000005234000-memory.dmp
      Filesize

      5.6MB

    • memory/3988-136-0x0000000005240000-0x0000000005858000-memory.dmp
      Filesize

      6.1MB

    • memory/3988-137-0x0000000005860000-0x0000000005872000-memory.dmp
      Filesize

      72KB

    • memory/3988-138-0x0000000005880000-0x000000000598A000-memory.dmp
      Filesize

      1.0MB

    • memory/3988-139-0x0000000005990000-0x00000000059CC000-memory.dmp
      Filesize

      240KB

    • memory/3988-140-0x000000000061D000-0x0000000000653000-memory.dmp
      Filesize

      216KB

    • memory/3988-141-0x0000000006060000-0x00000000060C6000-memory.dmp
      Filesize

      408KB

    • memory/3988-142-0x00000000064A0000-0x0000000006532000-memory.dmp
      Filesize

      584KB

    • memory/3988-143-0x0000000006550000-0x00000000065C6000-memory.dmp
      Filesize

      472KB

    • memory/3988-144-0x0000000006610000-0x000000000662E000-memory.dmp
      Filesize

      120KB

    • memory/3988-145-0x00000000066D0000-0x0000000006892000-memory.dmp
      Filesize

      1.8MB

    • memory/3988-146-0x00000000068B0000-0x0000000006DDC000-memory.dmp
      Filesize

      5.2MB

    • memory/3988-147-0x0000000007000000-0x0000000007050000-memory.dmp
      Filesize

      320KB

    • memory/3988-148-0x000000000061D000-0x0000000000653000-memory.dmp
      Filesize

      216KB

    • memory/3988-149-0x0000000000400000-0x0000000000480000-memory.dmp
      Filesize

      512KB