Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 14:01
Static task
static1
General
-
Target
fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436.exe
-
Size
418KB
-
MD5
734380a6efe3062d42ce92ca5d48109e
-
SHA1
265a1c914dcb026c40ea7b1c3f47446a4cf037a7
-
SHA256
fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436
-
SHA512
6cc2dc912f6eb2f08f4e41cce1bcbd477d79177c577c34f2306e5c5cfac4cc19cbd2c94ac45a5a622bf2790ff13af4e47e86a7d7e7dae7ee830d21bcddb24e31
-
SSDEEP
6144:iGLZgWEsZBNppfc/ejsKyW7gDo+TqnHPnMLhLDJrAClRkNQJ:iGtg+pfJjsNBDnuH/MBDplmk
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4156 3440 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3440 fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436.exe"C:\Users\Admin\AppData\Local\Temp\fc751b5c63935482746c70081d6c8c18efa5e96b0c55fb9320bf7c7f1758f436.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 12202⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3440 -ip 34401⤵PID:4304