Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 10:01
Static task
static1
1 signatures
General
-
Target
b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe
-
Size
397KB
-
MD5
8b4650dd3d29c595c204e7b1cb9731e3
-
SHA1
192ab8974806b121eb9f9f94f43077dfa4bd1fbc
-
SHA256
b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a
-
SHA512
a9edc4fb970217678ac2175d47da8c40096dd722f06c4713e29b5de935808daf109a03c3a0a915baa3f99b5787fb28e3121b146fbfb3588e913ce0f43c5351ff
-
SSDEEP
6144:0HmZLur6wkulp4vXuHyjNbs7cweAic56:0GZLSD74GHcoQbXc
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 2524 1120 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe 1120 b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1120 b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe"C:\Users\Admin\AppData\Local\Temp\b902c5391761061173a0255e2306fc900d3a8719c08fa3bbacae0d5bd7bceb5a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 14282⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1120 -ip 11201⤵PID:4048