Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 05:30
Static task
static1
General
-
Target
d5bb5a62332437da3aa5e35550aece0d093afdf733bfd6a5043485805a5d2b63.exe
-
Size
285KB
-
MD5
02fc337e57a8c0b6207cdfdb64ac9e40
-
SHA1
94b06be8f63477aa80872662f6b968e1e8ab4b28
-
SHA256
d5bb5a62332437da3aa5e35550aece0d093afdf733bfd6a5043485805a5d2b63
-
SHA512
524f94409da4877a6a76cbc0971ca53b359466cb9b46adb6dfe0c2b5784763fa6dd36725ec67695158776cf3999a588ac055759062fda70d99a82c0772f62bcf
-
SSDEEP
3072:tbmNJ6YloLt5pEWerboo4gVJ9WmRKLcGQfhcFOQu1wIhERpwLzHPVKv:VgJULtfevvVjDoLbdF3eIwLzHQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1096 4644 WerFault.exe d5bb5a62332437da3aa5e35550aece0d093afdf733bfd6a5043485805a5d2b63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5bb5a62332437da3aa5e35550aece0d093afdf733bfd6a5043485805a5d2b63.exe"C:\Users\Admin\AppData\Local\Temp\d5bb5a62332437da3aa5e35550aece0d093afdf733bfd6a5043485805a5d2b63.exe"1⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 8762⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4644 -ip 46441⤵PID:1036