Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 05:11
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
285KB
-
MD5
ddd45726a5e5583927416b931cafa2c3
-
SHA1
e9fe34a62be1576e3c31f92ac561ac62585e80bb
-
SHA256
2aee3815033edf7afcad97979a053982be9c03d4c3fb5f5f746366af347699c5
-
SHA512
2d9a04c0a23195f721cbe6780a94b00f52e59cbe2b776bd729082678a833f2c27cfd25351394ff8f936954a6d5d936d9da73ca99cf8e2cc0085b3519566a5000
-
SSDEEP
3072:kbaWraMEL9pECJ4boo4gpiPABEApj7Ucs7gskqkttnjLXe8JmsmiTYwXwaJHPVoR:qPra5L7JOvoPej7Oeqk7X8L6wyH6b
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4060 964 WerFault.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 10042⤵
- Program crash
PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 964 -ip 9641⤵PID:4200