Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 14:22
Behavioral task
behavioral1
Sample
KayZer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KayZer.exe
Resource
win10v2004-20250217-en
General
-
Target
KayZer.exe
-
Size
6.0MB
-
MD5
7988a817d0491d1cd117c2557a984697
-
SHA1
d8d5581e2480ea04a7840bc787981ab52a7e81ae
-
SHA256
3689a3d591ab4d7a7861ba1445aba8707da08011e01d34828858ffecbe775f49
-
SHA512
dc429315e8138dd5fcf44b136b1f6ebd5865f563cb15a24ce41ecd37620dcf23c12cc7901ffa8ca4f21848bb052ec9c1919149383c8778cb6dbbdd3714e0a158
-
SSDEEP
98304:Bn0yk8bSv0M9j7ktyYxyLmu5LLGXdof+AHRk8A+OTLpyX92jxDwpsGVjI24:Wj9jYp3N8+AvOsAjGpsmjI2
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral2/files/0x0004000000022af8-11.dat elysiumstealer_dll -
Elysiumstealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ KayZer.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions KayZer.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools KayZer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KayZer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KayZer.exe -
Loads dropped DLL 1 IoCs
pid Process 1468 KayZer.exe -
resource yara_rule behavioral2/memory/1468-7-0x0000000000400000-0x0000000001012000-memory.dmp themida behavioral2/memory/1468-8-0x0000000000400000-0x0000000001012000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KayZer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum KayZer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 KayZer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1468 KayZer.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KayZer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS KayZer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer KayZer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion KayZer.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe 1468 KayZer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1468 KayZer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KayZer.exe"C:\Users\Admin\AppData\Local\Temp\KayZer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798