Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2023 13:32

General

  • Target

    e372b0ea742e5710a19784a8a64db05a806abc1e67a89ad69845a8cd085b2c21.exe

  • Size

    302KB

  • MD5

    6353a0713aa3442792000dc4f217c06a

  • SHA1

    b17dc36aa0c99e79a7196bdbafb2a3ecb6636369

  • SHA256

    e372b0ea742e5710a19784a8a64db05a806abc1e67a89ad69845a8cd085b2c21

  • SHA512

    ab739c2127eeb59dde3ab5d6c4347aa734f5d1c36ec5c055df1550588a78038407b0d4ac0be2d2795cd3508c5c76c6a9fb6f55971002e0154db7330726a3afd3

  • SSDEEP

    6144:YemxAWLe3NnJIDorSK4v5odydy/MvE5P:YemxAWi3stNv5NdyiM

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e372b0ea742e5710a19784a8a64db05a806abc1e67a89ad69845a8cd085b2c21.exe
    "C:\Users\Admin\AppData\Local\Temp\e372b0ea742e5710a19784a8a64db05a806abc1e67a89ad69845a8cd085b2c21.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 1220
      2⤵
      • Program crash
      PID:792
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2824 -ip 2824
    1⤵
      PID:3488

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2824-133-0x00000000022D0000-0x0000000002332000-memory.dmp

      Filesize

      392KB

    • memory/2824-132-0x0000000000848000-0x0000000000876000-memory.dmp

      Filesize

      184KB

    • memory/2824-134-0x0000000004E90000-0x0000000005434000-memory.dmp

      Filesize

      5.6MB

    • memory/2824-135-0x0000000005440000-0x0000000005A58000-memory.dmp

      Filesize

      6.1MB

    • memory/2824-136-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

      Filesize

      72KB

    • memory/2824-137-0x0000000005A60000-0x0000000005B6A000-memory.dmp

      Filesize

      1.0MB

    • memory/2824-138-0x0000000000400000-0x0000000000579000-memory.dmp

      Filesize

      1.5MB

    • memory/2824-139-0x0000000004DD0000-0x0000000004E0C000-memory.dmp

      Filesize

      240KB

    • memory/2824-140-0x0000000005DD0000-0x0000000005E36000-memory.dmp

      Filesize

      408KB

    • memory/2824-141-0x00000000064A0000-0x0000000006532000-memory.dmp

      Filesize

      584KB

    • memory/2824-142-0x0000000006550000-0x00000000065C6000-memory.dmp

      Filesize

      472KB

    • memory/2824-143-0x0000000006610000-0x000000000662E000-memory.dmp

      Filesize

      120KB

    • memory/2824-144-0x00000000066B0000-0x0000000006872000-memory.dmp

      Filesize

      1.8MB

    • memory/2824-145-0x0000000006890000-0x0000000006DBC000-memory.dmp

      Filesize

      5.2MB

    • memory/2824-146-0x0000000000400000-0x0000000000579000-memory.dmp

      Filesize

      1.5MB

    • memory/2824-147-0x0000000000848000-0x0000000000876000-memory.dmp

      Filesize

      184KB