Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:03
Static task
static1
Behavioral task
behavioral1
Sample
969c423ac14ef61fa0030c232e78054b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
969c423ac14ef61fa0030c232e78054b.exe
Resource
win10v2004-20231215-en
General
-
Target
969c423ac14ef61fa0030c232e78054b.exe
-
Size
23.9MB
-
MD5
969c423ac14ef61fa0030c232e78054b
-
SHA1
6a078edf68c3db99c21d5d271e63b37eae85bbe0
-
SHA256
20f68a2ec4ec04fe42352b9d3b9ecabebf1a675f5bfbaf988326369d5afe453e
-
SHA512
9d527296f5dd8d5f12cc07c99b676078d849ea42c781c31bf5ea5dbaa7621d5a6da01d975fbdeed5688f49e13b46d12ab71d674e1d728a51056c6cfa5522e1ea
-
SSDEEP
393216:/yX0wTpT7cqPWX2kipfhVV+TcMZv29fj5tG:/yX1NnuX0p56v2ZjD
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll elysiumstealer_dll -
Loads dropped DLL 1 IoCs
Processes:
969c423ac14ef61fa0030c232e78054b.exepid process 1832 969c423ac14ef61fa0030c232e78054b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
969c423ac14ef61fa0030c232e78054b.exepid process 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe 1832 969c423ac14ef61fa0030c232e78054b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
969c423ac14ef61fa0030c232e78054b.exedescription pid process Token: SeDebugPrivilege 1832 969c423ac14ef61fa0030c232e78054b.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798