Analysis Overview
SHA256
f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec
Threat Level: Known bad
The file f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec was found to be: Known bad.
Malicious Activity Summary
ElysiumStealer
ElysiumStealer Support DLL
Loads dropped DLL
Adds Run key to start application
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-29 20:21
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-29 20:21
Reported
2023-01-29 20:25
Platform
win7-20221111-en
Max time kernel
77s
Max time network
34s
Command Line
Signatures
ElysiumStealer
ElysiumStealer Support DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\macaddress = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe" | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1680 wrote to memory of 588 | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1680 wrote to memory of 588 | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1680 wrote to memory of 588 | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1680 wrote to memory of 588 | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe
"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 836
Network
Files
memory/1680-54-0x0000000000940000-0x0000000000F06000-memory.dmp
memory/1680-55-0x0000000000220000-0x000000000022C000-memory.dmp
memory/1680-56-0x0000000004FC5000-0x0000000004FD6000-memory.dmp
\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll
| MD5 | 94173de2e35aa8d621fc1c4f54b2a082 |
| SHA1 | fbb2266ee47f88462560f0370edb329554cd5869 |
| SHA256 | 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f |
| SHA512 | cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798 |
memory/1680-58-0x0000000076581000-0x0000000076583000-memory.dmp
memory/588-59-0x0000000000000000-mapping.dmp
memory/1680-60-0x0000000004FC5000-0x0000000004FD6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-01-29 20:21
Reported
2023-01-29 20:24
Platform
win10v2004-20220812-en
Max time kernel
153s
Max time network
168s
Command Line
Signatures
ElysiumStealer
ElysiumStealer Support DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\macaddress = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe" | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe
"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5104 -ip 5104
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1420
Network
| Country | Destination | Domain | Proto |
| N/A | 104.110.191.133:80 | tcp | |
| N/A | 104.110.191.140:80 | tcp | |
| N/A | 93.184.220.29:80 | tcp | |
| N/A | 20.42.65.89:443 | tcp | |
| N/A | 104.110.191.133:80 | tcp | |
| N/A | 104.110.191.133:80 | tcp |
Files
memory/5104-132-0x0000000000C90000-0x0000000001256000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll
| MD5 | 94173de2e35aa8d621fc1c4f54b2a082 |
| SHA1 | fbb2266ee47f88462560f0370edb329554cd5869 |
| SHA256 | 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f |
| SHA512 | cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798 |
memory/5104-134-0x0000000006870000-0x0000000006E14000-memory.dmp
memory/5104-135-0x0000000006360000-0x00000000063F2000-memory.dmp
memory/5104-136-0x0000000006300000-0x000000000630A000-memory.dmp