Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:38
Behavioral task
behavioral1
Sample
230fba8cae5c8e237dc057a9b3d00066.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
230fba8cae5c8e237dc057a9b3d00066.exe
-
Size
7.3MB
-
MD5
230fba8cae5c8e237dc057a9b3d00066
-
SHA1
ecf3a4e80ffe133f8446ec33cfe79f9a3691cd8a
-
SHA256
036dd835a6e6c99d62c8c087ac3cc28d9c50e974e1d23a89c1cb2f9b1f7f2897
-
SHA512
e8dcf74b110fc23fa1225fcb22cbc108c6d8c7f11ae9acf63eb80eb7224ca29f7020d95e86be03604fdcb846d191564153513eb647fd45dc3db1b6fcf9fa917c
-
SSDEEP
196608:qYbzJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2uJ2:qYbV2s2s2s2s2s2s2s2s2s2s2s2s2s2v
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4536-1-0x0000000000580000-0x0000000001396000-memory.dmp vmprotect -
Program crash 1 IoCs
pid pid_target Process procid_target 4048 4536 WerFault.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\230fba8cae5c8e237dc057a9b3d00066.exe"C:\Users\Admin\AppData\Local\Temp\230fba8cae5c8e237dc057a9b3d00066.exe"1⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 10082⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4536 -ip 45361⤵PID:452