Analysis
-
max time kernel
87s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 00:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d3ea7d6746f35904fd821dbdd9883e08.exe
Resource
win7-20230621-en
7 signatures
150 seconds
General
-
Target
d3ea7d6746f35904fd821dbdd9883e08.exe
-
Size
285KB
-
MD5
d3ea7d6746f35904fd821dbdd9883e08
-
SHA1
3e76621a27867506ccf19b424bc98a0ee778f4f0
-
SHA256
34e583d49b9e513fbd9782feb5d0ff3752f4468c77a012f776fda29cc7630425
-
SHA512
ecce4649b05e59155b40c270f116de8fb8ed677f50637be013445e0cc612453b68c4712cd8a4bf0c850a7aaa877c370909af2df3cf4b20f57064fa7f38487309
-
SSDEEP
6144:CLBbSSVN3hCEiL28ruxHrvnz0GvbGjiZWc2:C9bSSVFh7iridPY2GO2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 416 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 416 d3ea7d6746f35904fd821dbdd9883e08.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 416 d3ea7d6746f35904fd821dbdd9883e08.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ea7d6746f35904fd821dbdd9883e08.exe"C:\Users\Admin\AppData\Local\Temp\d3ea7d6746f35904fd821dbdd9883e08.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 12242⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 416 -ip 4161⤵PID:1376