Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2023 04:28
Static task
static1
General
-
Target
8f84b3ec26013ee70e8ac2013af527764e5e2003cfd1f14346bba272e9615451.exe
-
Size
299KB
-
MD5
e77d6ac1c3f92b6315be4f1adc4a7543
-
SHA1
c3e4f10acd9ffb7210f20a949a34a70a6102e22c
-
SHA256
8f84b3ec26013ee70e8ac2013af527764e5e2003cfd1f14346bba272e9615451
-
SHA512
421844a52ce2f727859d2e436e9a45db69f1d81f7c9a7c0ac4e72b8372eef17e3aa914258a45a933f83f621e9a19475a981342632c4fd5d7a4ced2246464bbfe
-
SSDEEP
3072:GX7PJPbJK5YpPOnJib6dgmHydhoHuJauaSBxf+BBxesTlTJK/hwxHapb8pBI8jw1:uxJcHy3ySfGBzThTupgpRjFE
Malware Config
Extracted
Family
lumma
C2
77.73.134.68
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4348 4092 WerFault.exe 8f84b3ec26013ee70e8ac2013af527764e5e2003cfd1f14346bba272e9615451.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f84b3ec26013ee70e8ac2013af527764e5e2003cfd1f14346bba272e9615451.exe"C:\Users\Admin\AppData\Local\Temp\8f84b3ec26013ee70e8ac2013af527764e5e2003cfd1f14346bba272e9615451.exe"1⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 13202⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4092 -ip 40921⤵PID:4716