Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2022, 16:40
Static task
static1
General
-
Target
18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe
-
Size
398KB
-
MD5
9b3d455c66f8ac6ed0bb4c26fa75b917
-
SHA1
bbdb6e9e0816dfee1da47b4b4867ee76a41bdf78
-
SHA256
18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538
-
SHA512
a2b2288904a7791fdc50efb4086dd0143f1e81e49fc430c159ac1c72f830017454ce4a0400092d301929040ef5241a2a11e995aff6bac4a22b9958c24f0c632c
-
SSDEEP
6144:caMLg66AmY8bzVQ3QSRqkHHMkpRizUA58xQ3xDPkMo5zXbAc:NMk6qQAHkHH1/iH58xaxDPyrbA
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4768 4600 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4600 18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe 4600 18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4600 18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe"C:\Users\Admin\AppData\Local\Temp\18e66666b3a3d6e8b498fda88368a793ee2d5f54802a8e1b37a29bc351dd3538.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 12802⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4600 -ip 46001⤵PID:4608