Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 16:29
Static task
static1
Behavioral task
behavioral1
Sample
f99da706c2b5ef8f0dfdd882b.exe
Resource
win7-20230703-en
General
-
Target
f99da706c2b5ef8f0dfdd882b.exe
-
Size
379KB
-
MD5
f99da706c2b5ef8f0dfdd882bcd31bae
-
SHA1
f13c62665f2aaec4c82bbfba164024cdaf26cb7a
-
SHA256
2dc0f50fa7eb53be17b578fbcb66a5ec8c40d250fd9be7b2b96663624fa4dba8
-
SHA512
e01e83d352483d937034890effb404f6950aa6612bc6012ab88bd653a33d908300ff566c0c06d999f7470f52f3de91e0ba0255b5eaf1d9bf2786ad7940268bd9
-
SSDEEP
6144:kL8fg4jqNKUnLsY/T3/D7nNqn9PBSIUAg5+Dzr+5jCkpLWb78LVGd:koLqNKID/TP/NopRUAg8DG52kgoRGd
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2336 860 WerFault.exe f99da706c2b5ef8f0dfdd882b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 3740 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99da706c2b5ef8f0dfdd882b.exe"C:\Users\Admin\AppData\Local\Temp\f99da706c2b5ef8f0dfdd882b.exe"1⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 35082⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 860 -ip 8601⤵PID:3852
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3740