Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2023, 23:26

General

  • Target

    Pathfinder_2.19.3/Pathfinder_Builder.exe

  • Size

    3.8MB

  • MD5

    89817a0ea4add5696282c943839b64c1

  • SHA1

    217890e8db8ea736f8a84ea9c1835c22c845a240

  • SHA256

    0a7e31c92f26713ba2787eb9172d4a5a105e88ca3cc739e4c62890d263fd1fa0

  • SHA512

    0a39c64b90656820ed9298a793f8d3016a0d629e88506c51410d32afe6746b75d510965014b9414a4c3f63efb54bacff16e79bfc74feb76ea15fd22b9c63bedf

  • SSDEEP

    49152:WHFNVHFpNDv8w7v8xQlPRNso1tCbgJ16LC3s3f2gzKpU5EsjpwKjeQO5nGTBLprH:Ib8xQZ3si2uVQSi9jdl

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pathfinder_2.19.3\Pathfinder_Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Pathfinder_2.19.3\Pathfinder_Builder.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3176
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /c "schtasks /Create /TR C:\Users\Admin\AppData\Local\Temp\\system /SC ONLOGON /TN system /IT"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4236
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1508 -s 1152
      2⤵
      • Program crash
      PID:1928
  • C:\Windows\system32\schtasks.exe
    schtasks /Create /TR C:\Users\Admin\AppData\Local\Temp\\system /SC ONLOGON /TN system /IT
    1⤵
    • Creates scheduled task(s)
    PID:3216
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 480 -p 1508 -ip 1508
    1⤵
      PID:3568

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3176-136-0x000002C5FD3A0000-0x000002C5FD3C2000-memory.dmp

      Filesize

      136KB

    • memory/3176-137-0x00007FFCEED30000-0x00007FFCEF7F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3176-138-0x00007FFCEED30000-0x00007FFCEF7F1000-memory.dmp

      Filesize

      10.8MB