Overview
overview
10Static
static
3AlphaFS.dll
windows7-x64
1AlphaFS.dll
windows10-2004-x64
1Extreme.Net.dll
windows7-x64
1Extreme.Net.dll
windows10-2004-x64
1Metamask S...or.exe
windows7-x64
3Metamask S...or.exe
windows10-2004-x64
10Ookii.Dialogs.Wpf.dll
windows7-x64
1Ookii.Dialogs.Wpf.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AlphaFS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Metamask Seed Generator.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Metamask Seed Generator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ookii.Dialogs.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20241007-en
General
-
Target
Metamask Seed Generator.exe
-
Size
590KB
-
MD5
e883f34b766540694ea524e1f8be3958
-
SHA1
e4bc2c5cd58e2ecf9ec30768558baf29f73690d7
-
SHA256
8fa48d81788bbd2b1ad77fbb615a5cd3084ed94badc0b9f58797c6b09bd251be
-
SHA512
c046217c5f688eec693b4e5c91d5871c8b78887aa4a9f087a7469ae83b01169ecf3c17244b19f6b2e5d3e1aa231e6c164303bbdd9bb3723addbc0b5f86c95a17
-
SSDEEP
12288:eicwvLD0hg8gGXf55nA6Lpa1dlgfTgRVbusK7D+AaIG6z9o7TSaIva9s:eicMLD0K0bA60neTgZTSaO
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process 2844 2668 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Metamask Seed Generator.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Metamask Seed Generator.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Metamask Seed Generator.exedescription pid Process procid_target PID 2668 wrote to memory of 2844 2668 Metamask Seed Generator.exe 30 PID 2668 wrote to memory of 2844 2668 Metamask Seed Generator.exe 30 PID 2668 wrote to memory of 2844 2668 Metamask Seed Generator.exe 30 PID 2668 wrote to memory of 2844 2668 Metamask Seed Generator.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 5842⤵
- Program crash
PID:2844
-