Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2023 08:20
Static task
static1
1 signatures
General
-
Target
8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c.exe
-
Size
275KB
-
MD5
3afdb25ee2ce891bf352268d1551a701
-
SHA1
6e4c9c0a2ff4b530e14ef02b5b391c6ed9640064
-
SHA256
8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c
-
SHA512
3a5eb9a5908190051d3945f0fb70becaf28db0bf28a3b117ec7398ac3febbd4030143a12a454af077d633f3c41d62bfd35e10c3ff2369a5dd1f19fd2d5919cc2
-
SSDEEP
6144:ULNY2+r4++cOYGEo2zPtMlde/tfHgqsY3:UJY2+c++1dEzQdMZH
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4368 4572 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4572 8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4572 8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c.exe"C:\Users\Admin\AppData\Local\Temp\8da149bae6d23ac310ac7b531676ad250f3ce1960728c76bc2999f25e255ef6c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 17682⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4572 -ip 45721⤵PID:3768