Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 04:38

General

  • Target

    dd406b14fb92c84e458c7d5e6c9f7b05.exe

  • Size

    4.6MB

  • MD5

    dd406b14fb92c84e458c7d5e6c9f7b05

  • SHA1

    aca27224f1781cee1ed84552cd6429141a7904b2

  • SHA256

    49ddc60e4f4ed4fddbbb61e6f59561e2b4e93db91baeccb1b3e447f181a587a2

  • SHA512

    b045e6d9582c1e740ae733c1e22af0da4b0fa2aa940a0591caa1ca839902bef25a9db7ef239fcb858ff030ca9a7322658bc905483bc3d26e867f003c68799f38

  • SSDEEP

    98304:MgoFvQ/wmDfSDWgr+XU/ScF5gbwjE8IygRbZSoQuqcvQa7etQk0O:gF8HorxSagENKdSLwJ7bk0O

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd406b14fb92c84e458c7d5e6c9f7b05.exe
    "C:\Users\Admin\AppData\Local\Temp\dd406b14fb92c84e458c7d5e6c9f7b05.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1192
      2⤵
      • Program crash
      PID:2052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2312 -ip 2312
    1⤵
      PID:3656
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4828

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

        Filesize

        40KB

        MD5

        94173de2e35aa8d621fc1c4f54b2a082

        SHA1

        fbb2266ee47f88462560f0370edb329554cd5869

        SHA256

        7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

        SHA512

        cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

      • memory/2312-8-0x0000000007010000-0x0000000007020000-memory.dmp

        Filesize

        64KB

      • memory/2312-1-0x00000000FF4D0000-0x00000000FF8A1000-memory.dmp

        Filesize

        3.8MB

      • memory/2312-3-0x00000000007A0000-0x00000000013DC000-memory.dmp

        Filesize

        12.2MB

      • memory/2312-4-0x00000000007A0000-0x00000000013DC000-memory.dmp

        Filesize

        12.2MB

      • memory/2312-5-0x0000000007010000-0x0000000007020000-memory.dmp

        Filesize

        64KB

      • memory/2312-6-0x00000000049F0000-0x00000000049FC000-memory.dmp

        Filesize

        48KB

      • memory/2312-2-0x0000000074750000-0x0000000074F00000-memory.dmp

        Filesize

        7.7MB

      • memory/2312-0-0x00000000007A0000-0x00000000013DC000-memory.dmp

        Filesize

        12.2MB

      • memory/2312-7-0x0000000075860000-0x0000000075950000-memory.dmp

        Filesize

        960KB

      • memory/2312-13-0x0000000007ED0000-0x0000000008474000-memory.dmp

        Filesize

        5.6MB

      • memory/2312-14-0x00000000007A0000-0x00000000013DC000-memory.dmp

        Filesize

        12.2MB

      • memory/2312-15-0x00000000007A0000-0x00000000013DC000-memory.dmp

        Filesize

        12.2MB

      • memory/2312-16-0x00000000FF4D0000-0x00000000FF8A1000-memory.dmp

        Filesize

        3.8MB

      • memory/2312-17-0x0000000074750000-0x0000000074F00000-memory.dmp

        Filesize

        7.7MB

      • memory/2312-18-0x0000000075860000-0x0000000075950000-memory.dmp

        Filesize

        960KB