Analysis
-
max time kernel
121s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
4703d709bc2677f1c7f2d0ba740f95d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4703d709bc2677f1c7f2d0ba740f95d4.exe
Resource
win10v2004-20231215-en
General
-
Target
4703d709bc2677f1c7f2d0ba740f95d4.exe
-
Size
23.9MB
-
MD5
4703d709bc2677f1c7f2d0ba740f95d4
-
SHA1
eb4a93badf082f3fecd90b9423c6c71667dbf0e3
-
SHA256
26566ba751b7f4a306f9367ea4ddeb33c8d1b083dc0979d74fe0d1bb85fe6e15
-
SHA512
e46fc4b6846f08c6c89dc467dc3822c682f00eeba222b0059497b2c91a04f397b273eaa359365b52d1d68fc22b93f3e582ead578e75756ae3cc8f062c248ea83
-
SSDEEP
393216:XyX0wTpT7cqPWX2kipfhVV+TcMZv29zj5tG:XyX1NnuX0p56v21jD
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000d0000000122a5-7.dat elysiumstealer_dll -
Loads dropped DLL 1 IoCs
Processes:
4703d709bc2677f1c7f2d0ba740f95d4.exepid Process 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4703d709bc2677f1c7f2d0ba740f95d4.exepid Process 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4703d709bc2677f1c7f2d0ba740f95d4.exedescription pid Process Token: SeDebugPrivilege 2444 4703d709bc2677f1c7f2d0ba740f95d4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5fd1df072c300d76a9303842d58b87bd5
SHA12d28a0f2521ddf0b2d6ceab2552a6d66bdf2793b
SHA256f4c51854ab919472fc44d1909fea77f2f7c1d36d12c4962bc98174a13c220707
SHA5129c07aef0b4562665d7a2330a0a4cee6a0ea07f1967dab8f254fac0c59a51686977cdd9acffaeba76c04f105a4404a5053df61b33b87ed8509af2aa0f3f77fba8