Analysis
-
max time kernel
73s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2023 13:16
Static task
static1
General
-
Target
990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee.exe
-
Size
337KB
-
MD5
51a4769ff1b13c19598237e86a323cce
-
SHA1
03d201cd1a91a0ae30370af765741ed1917f3b0e
-
SHA256
990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee
-
SHA512
9c38b7e4939c388ad3fd54f3fb6de3c493453385c7fa563d280edab4149dcd1b66ada5345789ebe93eba021ab332bac13dff872814608474898cd63fb9b7e9e0
-
SSDEEP
6144:KVQgppUIRhRnllN1p1H795tDetqtPiAuJF4IbRO7iM:AQeBRhRnlnNH79TeaPJu07
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 848 4104 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4104 990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4104 990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee.exe"C:\Users\Admin\AppData\Local\Temp\990fd80b0e6da6f26884d3351642cf9d2a2b62bae4a5d0a02ae3a993524f85ee.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 15362⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4104 -ip 41041⤵PID:224