Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 03:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
555dea71f33152b96d5c96f8f2ef5868.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
555dea71f33152b96d5c96f8f2ef5868.exe
-
Size
810KB
-
MD5
555dea71f33152b96d5c96f8f2ef5868
-
SHA1
e4f600837be75f60e062176bbd41c307ab2710fe
-
SHA256
e5b15631a19ef6e4312e22d6b8d4cce2a5eba2a1c954b80ebe6776e6f3e0c250
-
SHA512
4dcb8b357af3be920d741296b8c26795e32b6bb71ffcaf629299c8095e85cab93a029fd355e046af05c4e761031f23949846bf8b9ba54b4f9c3d7806237ddc69
-
SSDEEP
24576:tWRT2WGMCL+K6zE//v8rxWsR8u/sgAzS6zC:tUJNO+K663y5RBdAzS6m
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4936 4784 WerFault.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\555dea71f33152b96d5c96f8f2ef5868.exe"C:\Users\Admin\AppData\Local\Temp\555dea71f33152b96d5c96f8f2ef5868.exe"1⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 4802⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4784 -ip 47841⤵PID:3532