Analysis
-
max time kernel
1381s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 19:57
Behavioral task
behavioral1
Sample
EraDebbuger.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
1800 seconds
General
-
Target
EraDebbuger.exe
-
Size
14.4MB
-
MD5
b6e1bef653b682728fc9b279f925dd24
-
SHA1
f28f7b3ef8a5ccac8116c7b9b4a3f5048685b039
-
SHA256
8781ca2d2cb19b24b8cbe5da23f8a640578f58e26259cdc68f7596446ffdbff6
-
SHA512
7952c44afd96e210118ac8e7755d487ec7580045bb3398c10c1419f2802a319b0dc816e1dc716daddfa74e74bd3d5e9e6a159bbb7b3f7028a79afcddc5454cd5
-
SSDEEP
196608:mXGX180pr0sKYu/PaQ+DuhfeidQmRJ8dA6lSuqaycBIGpE2o6hTOv+QKfwJSKfFP:RX7QMidQuslSq99oWOv+9fgSueK2+yw
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EraDebbuger.exe EraDebbuger.exe -
Loads dropped DLL 46 IoCs
pid Process 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe 1908 EraDebbuger.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org 18 api.ipify.org 46 api.ipify.org 52 api.ipify.org -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3000 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 tasklist.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1908 4732 EraDebbuger.exe 23 PID 4732 wrote to memory of 1908 4732 EraDebbuger.exe 23 PID 1908 wrote to memory of 448 1908 EraDebbuger.exe 29 PID 1908 wrote to memory of 448 1908 EraDebbuger.exe 29 PID 1908 wrote to memory of 4280 1908 EraDebbuger.exe 25 PID 1908 wrote to memory of 4280 1908 EraDebbuger.exe 25 PID 4280 wrote to memory of 3000 4280 cmd.exe 26 PID 4280 wrote to memory of 3000 4280 cmd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\EraDebbuger.exe"C:\Users\Admin\AppData\Local\Temp\EraDebbuger.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\EraDebbuger.exe"C:\Users\Admin\AppData\Local\Temp\EraDebbuger.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:448
-
-