Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 17:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230703-en
windows7-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
285KB
-
MD5
baef6b16d5ca4a0c90f0ba0fb3e5605e
-
SHA1
dc3af269b24639aae026b8d1a38cbc467d847f9e
-
SHA256
64d4cb3a5b533e0cfee82a3f2f4501465bfe45247d02ccfa995251bcf973b742
-
SHA512
6a70ff2752778e112da1e28265896c9c15961d1aec6f54592157f38ff366e34a3a1e9911ad3548dd8cf95b1107e842ebc472001b388198b94f4198c1773b1ef1
-
SSDEEP
6144:dT0Log7etAD1D0GJFNEV16lgspxyZKdGUnO3cg:u8g7etAD1D04Ix8xyvx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1020 4588 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4588 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 12162⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4588 -ip 45881⤵PID:1652