Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 02:15
Behavioral task
behavioral1
Sample
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe
Resource
win7-20230220-en
General
-
Target
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe
-
Size
303KB
-
MD5
f9484530eef5af91375b16ad1312dd29
-
SHA1
0bf165ea23cf50314f63efc6b1fe70dfc513fc9a
-
SHA256
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee
-
SHA512
6683fb523fed816538c763859cbad5805b03334521d4ca83be1fff30d8cb84bc836ae1612d677accb984000d45644bfcadf9618e63ede98e2643b5702d93c0ba
-
SSDEEP
6144:n+AC6MDdbICydeBWJaDNnqrMtt1KLIbldMWA1D0Usje:n+vzDNnqrqYd1Dkje
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1095429503737675886/XSOjpaYnkVlwzQqXu4kvtIMhmZQVCMFwUVjdoKgnPXh4ER5XWIZ-0wzCDA36bKxszrIs
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1768 924 WerFault.exe 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exepid process 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exedescription pid process Token: SeDebugPrivilege 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exedescription pid process target process PID 924 wrote to memory of 1768 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe WerFault.exe PID 924 wrote to memory of 1768 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe WerFault.exe PID 924 wrote to memory of 1768 924 29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe"C:\Users\Admin\AppData\Local\Temp\29e74d69dbe506f07c91cd245427379aebc67b1c24dafc2cd0bde49ed6fd5cee.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 924 -s 11802⤵
- Program crash
PID:1768
-