Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 07:16
Static task
static1
Behavioral task
behavioral1
Sample
ab9327fce682d578e28456820e0d9baa.exe
Resource
win7-20230712-en
General
-
Target
ab9327fce682d578e28456820e0d9baa.exe
-
Size
381KB
-
MD5
ab9327fce682d578e28456820e0d9baa
-
SHA1
48696ea54a5960a3f9bbbf96819a150ad93c33c1
-
SHA256
1915d244bae2707f6531ea7ffc0fb7708f7cafcf2aa354223ea8112064b18eaf
-
SHA512
dcfd05aeb32c42dd9b25c11e214fa7b9aac96c1bdb747ee71487bdce9f58cb6c691bb3266cd3f752b2abd83f9b17d297a767751bf14123dfc14820fb2cb6eaab
-
SSDEEP
6144:uL7hfgYIwTFqa6OL93LfhvWbU7VGz7VeCuq/WQomNaTvjF:uHhoYIwTFgaLfsbe+ReCuq/3Mb
Malware Config
Extracted
lumma
gstatic-node.io
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3340 4740 WerFault.exe ab9327fce682d578e28456820e0d9baa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9327fce682d578e28456820e0d9baa.exe"C:\Users\Admin\AppData\Local\Temp\ab9327fce682d578e28456820e0d9baa.exe"1⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 34202⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4740 -ip 47401⤵PID:940