Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
310KB
-
MD5
3619425eaf78e9c5c89ed5f65ccc95e7
-
SHA1
12dcc2becb1c5aba2561ac3da3bca23a49072084
-
SHA256
ba9c201ca52eed0958ad42e1907e460c19eb0c83e901332e8061eec41e136d9e
-
SHA512
e6738795b984ac2328b2274ef4557370add02ad507cca2c43cef423e22ba0559d9ce51377fbfee3ea4e9ff8e02b1ba80f17db3949ae0d05ae5cc5adcc2f8abe3
-
SSDEEP
6144:EwULtHKxOJJegBd0lC9EH28q340ryW269nPmgAmYVCBv:E/RJJhBelV2N1JmzdCB
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4492 3372 WerFault.exe 75 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3372 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3372 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 12242⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3372 -ip 33721⤵PID:3332