Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 04:12
Static task
static1
General
-
Target
2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5.exe
-
Size
285KB
-
MD5
ddd45726a5e5583927416b931cafa2c3
-
SHA1
e9fe34a62be1576e3c31f92ac561ac62585e80bb
-
SHA256
2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5
-
SHA512
2d9a04c0a23195f721cbe6780a94b00f52e59cbe2b776bd729082678a833f2c27cfd25351394ff8f936954a6d5d936d9da73ca99cf8e2cc0085b3519566a5000
-
SSDEEP
3072:kbaWraMEL9pECJ4boo4gpiPABEApj7Ucs7gskqkttnjLXe8JmsmiTYwXwaJHPVoR:qPra5L7JOvoPej7Oeqk7X8L6wyH6b
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 996 2600 WerFault.exe 2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5.exe"C:\Users\Admin\AppData\Local\Temp\2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5.exe"1⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 9522⤵
- Program crash
PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2600 -ip 26001⤵PID:2328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2600-132-0x000000000068F000-0x00000000006AC000-memory.dmpFilesize
116KB
-
memory/2600-134-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/2600-133-0x0000000002320000-0x0000000002351000-memory.dmpFilesize
196KB
-
memory/2600-136-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/2600-135-0x000000000068F000-0x00000000006AC000-memory.dmpFilesize
116KB