Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2023, 23:54

General

  • Target

    56b924706b330b586763aef980bca3439130cad8ef8080a7f6a9e9826db0c33c.exe

  • Size

    381KB

  • MD5

    84952f1a077e91a3fc9c10cf984c6987

  • SHA1

    087664d2d20e4f9629f13bf2a37468af1c22f721

  • SHA256

    56b924706b330b586763aef980bca3439130cad8ef8080a7f6a9e9826db0c33c

  • SHA512

    de169362147d9dd4fc1fa4b4ca2f4ce9eb23ce947e6fe998f791f16c92decd51bd96cb046732d30ce3a3fd9ee4e90d8e881177172d1ef5da043369d70c3fbbe1

  • SSDEEP

    6144:Lkf02pjPAIvLhUK/Ipp7BLIBv6uZzgeQKU:LL2pDAIv97IpDL6yGgel

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56b924706b330b586763aef980bca3439130cad8ef8080a7f6a9e9826db0c33c.exe
    "C:\Users\Admin\AppData\Local\Temp\56b924706b330b586763aef980bca3439130cad8ef8080a7f6a9e9826db0c33c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 1236
      2⤵
      • Program crash
      PID:1840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2152 -ip 2152
    1⤵
      PID:1628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2152-134-0x00000000023E0000-0x000000000241E000-memory.dmp

      Filesize

      248KB

    • memory/2152-135-0x0000000004E70000-0x0000000005414000-memory.dmp

      Filesize

      5.6MB

    • memory/2152-136-0x00000000078A0000-0x0000000007EB8000-memory.dmp

      Filesize

      6.1MB

    • memory/2152-137-0x0000000004E40000-0x0000000004E52000-memory.dmp

      Filesize

      72KB

    • memory/2152-138-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2152-140-0x0000000007F00000-0x000000000800A000-memory.dmp

      Filesize

      1.0MB

    • memory/2152-141-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2152-139-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2152-142-0x0000000008010000-0x000000000804C000-memory.dmp

      Filesize

      240KB

    • memory/2152-143-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2152-144-0x0000000008320000-0x0000000008386000-memory.dmp

      Filesize

      408KB

    • memory/2152-145-0x00000000089D0000-0x0000000008A62000-memory.dmp

      Filesize

      584KB

    • memory/2152-146-0x0000000008BA0000-0x0000000008C16000-memory.dmp

      Filesize

      472KB

    • memory/2152-147-0x0000000008C90000-0x0000000008E52000-memory.dmp

      Filesize

      1.8MB

    • memory/2152-148-0x0000000008E60000-0x000000000938C000-memory.dmp

      Filesize

      5.2MB

    • memory/2152-149-0x0000000009490000-0x00000000094AE000-memory.dmp

      Filesize

      120KB

    • memory/2152-151-0x0000000000400000-0x00000000006A5000-memory.dmp

      Filesize

      2.6MB