Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2024, 21:40
Behavioral task
behavioral1
Sample
8524e36f1291cd8eab742484784d8d55.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
8524e36f1291cd8eab742484784d8d55.exe
-
Size
93KB
-
MD5
8524e36f1291cd8eab742484784d8d55
-
SHA1
45362afbaa0ceb721d0139300a45f9f0add0c044
-
SHA256
f1d4d4a12d43f6e2c8cb6165e8b11416f2fa4deda89e54f6713cf79cdf54b9fd
-
SHA512
026d84379d81be4cbc02a2e41b9ab09f2cb5d04b726b1c50f79ad61a692a4aaa174c9aa04c76d3af166347cd20ab9849043a7b33ba967f274d38f98ae9c390c6
-
SSDEEP
1536:oWTHVn5wa8TXvqHp6kzWgDaO3C54Gf3lagvHkMTafiyVDr1lVU93jy0:oWTHVn8TXvc4O3CFvlaSED1PIj/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1212 1184 WerFault.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8524e36f1291cd8eab742484784d8d55.exe"C:\Users\Admin\AppData\Local\Temp\8524e36f1291cd8eab742484784d8d55.exe"1⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 11882⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1184 -ip 11841⤵PID:1460