Malware Analysis Report

2024-08-06 08:51

Sample ID 230129-y449hsbh94
Target f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec
SHA256 f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec
Tags
elysiumstealer persistence stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec

Threat Level: Known bad

The file f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec was found to be: Known bad.

Malicious Activity Summary

elysiumstealer persistence stealer

ElysiumStealer

ElysiumStealer Support DLL

Loads dropped DLL

Adds Run key to start application

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2023-01-29 20:21

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-29 20:21

Reported

2023-01-29 20:25

Platform

win7-20221111-en

Max time kernel

77s

Max time network

34s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

ElysiumStealer Support DLL

Description Indicator Process Target
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\macaddress = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe" C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe

"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 836

Network

N/A

Files

memory/1680-54-0x0000000000940000-0x0000000000F06000-memory.dmp

memory/1680-55-0x0000000000220000-0x000000000022C000-memory.dmp

memory/1680-56-0x0000000004FC5000-0x0000000004FD6000-memory.dmp

\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

MD5 94173de2e35aa8d621fc1c4f54b2a082
SHA1 fbb2266ee47f88462560f0370edb329554cd5869
SHA256 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512 cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

memory/1680-58-0x0000000076581000-0x0000000076583000-memory.dmp

memory/588-59-0x0000000000000000-mapping.dmp

memory/1680-60-0x0000000004FC5000-0x0000000004FD6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-29 20:21

Reported

2023-01-29 20:24

Platform

win10v2004-20220812-en

Max time kernel

153s

Max time network

168s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

ElysiumStealer Support DLL

Description Indicator Process Target
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\macaddress = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe" C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe

"C:\Users\Admin\AppData\Local\Temp\f3fd64e80feae97427c803a39db0495c6e79dbecd22bbdc13e69bd81c04022ec.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5104 -ip 5104

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1420

Network

Country Destination Domain Proto
N/A 104.110.191.133:80 tcp
N/A 104.110.191.140:80 tcp
N/A 93.184.220.29:80 tcp
N/A 20.42.65.89:443 tcp
N/A 104.110.191.133:80 tcp
N/A 104.110.191.133:80 tcp

Files

memory/5104-132-0x0000000000C90000-0x0000000001256000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

MD5 94173de2e35aa8d621fc1c4f54b2a082
SHA1 fbb2266ee47f88462560f0370edb329554cd5869
SHA256 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512 cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

memory/5104-134-0x0000000006870000-0x0000000006E14000-memory.dmp

memory/5104-135-0x0000000006360000-0x00000000063F2000-memory.dmp

memory/5104-136-0x0000000006300000-0x000000000630A000-memory.dmp