Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2023 14:46
Static task
static1
General
-
Target
114682c8e5db2c28ff8d8caf1e99ed0781b0555f30a5bd34ba11c50472a9adda.exe
-
Size
224KB
-
MD5
9f12ba134af9e047bc4aeec1b72d0ca1
-
SHA1
18aa6574ec21d39fdf8f66a32a848a72150c6fb7
-
SHA256
114682c8e5db2c28ff8d8caf1e99ed0781b0555f30a5bd34ba11c50472a9adda
-
SHA512
75e8caf6594833f9b9fd225ae9a3551dc5ae01cff95746095f9997ce2f8bdf27c52e41623d4a0dc7a74d3a2d4df505e592f3890bb2bc0ad00a1e65f96e414685
-
SSDEEP
3072:r/X3YyQBnQwHOxs51/0QDHtEbbZKBIMmSIM/J5zQigj1NGP5:TgOrQD0sBXmdMLzQigj/G
Malware Config
Extracted
Family
lumma
C2
77.73.134.68
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1892 1776 WerFault.exe 114682c8e5db2c28ff8d8caf1e99ed0781b0555f30a5bd34ba11c50472a9adda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\114682c8e5db2c28ff8d8caf1e99ed0781b0555f30a5bd34ba11c50472a9adda.exe"C:\Users\Admin\AppData\Local\Temp\114682c8e5db2c28ff8d8caf1e99ed0781b0555f30a5bd34ba11c50472a9adda.exe"1⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 13602⤵
- Program crash
PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1776 -ip 17761⤵PID:5008