Analysis

  • max time kernel
    145s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-04-2023 23:59

General

  • Target

    90270d9fc008b965cf61def39a34bcb5fae468a52241f570ea9100e6318fe27e.exe

  • Size

    938KB

  • MD5

    d4b99f55ea8f169437d3a2fd591c48fc

  • SHA1

    b749ffc52b2b4eb279ea2072df42ae16951ab7e4

  • SHA256

    90270d9fc008b965cf61def39a34bcb5fae468a52241f570ea9100e6318fe27e

  • SHA512

    094db233c13b3a930721ace375e145bff24ccb5fc0d8c046e9139291b945967647698bcc3137abc9ac491db75510c526d5fcc9c34c1b422d77da5fb8a9d864dc

  • SSDEEP

    24576:/yetNDxuSNOpVZ3YguknCSqQIUuM0BFJLJH:Ke/DxJNu3YgoSqQIvMgrL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90270d9fc008b965cf61def39a34bcb5fae468a52241f570ea9100e6318fe27e.exe
    "C:\Users\Admin\AppData\Local\Temp\90270d9fc008b965cf61def39a34bcb5fae468a52241f570ea9100e6318fe27e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisV4756.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisV4756.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihN4642.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihN4642.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it053626.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it053626.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3500
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr642913.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr642913.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp211703.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp211703.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr175466.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr175466.exe
      2⤵
      • Executes dropped EXE
      PID:2108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 616
        3⤵
        • Program crash
        PID:3692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 696
        3⤵
        • Program crash
        PID:4068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 836
        3⤵
        • Program crash
        PID:3840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 872
        3⤵
        • Program crash
        PID:376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 924
        3⤵
        • Program crash
        PID:5000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 872
        3⤵
        • Program crash
        PID:976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1120
        3⤵
        • Program crash
        PID:3780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1148
        3⤵
        • Program crash
        PID:4568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1204
        3⤵
        • Program crash
        PID:4648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr175466.exe

    Filesize

    381KB

    MD5

    2e2e258dbbe5930519c95eca35ac9d12

    SHA1

    574ee90cb44009176fcf5f92e09a09a4979f8fd3

    SHA256

    c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

    SHA512

    b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr175466.exe

    Filesize

    381KB

    MD5

    2e2e258dbbe5930519c95eca35ac9d12

    SHA1

    574ee90cb44009176fcf5f92e09a09a4979f8fd3

    SHA256

    c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

    SHA512

    b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisV4756.exe

    Filesize

    624KB

    MD5

    edb378196cdf7a52996c742478873eba

    SHA1

    9c1683395dd590bd4f20eb076b73d47ab369b6c5

    SHA256

    e3fd7603d26e41192d803c7d9293c3525d57be41988a34d4f4a3176128cbabd0

    SHA512

    f3454fee36e1bb7b0f6bbf4a554a96e02d3c29831b8569faca664462aef79e7dd54caa71ab210c32ce2298f3c6dab9e0a7caa9b01b64e598c6cb5563070688ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisV4756.exe

    Filesize

    624KB

    MD5

    edb378196cdf7a52996c742478873eba

    SHA1

    9c1683395dd590bd4f20eb076b73d47ab369b6c5

    SHA256

    e3fd7603d26e41192d803c7d9293c3525d57be41988a34d4f4a3176128cbabd0

    SHA512

    f3454fee36e1bb7b0f6bbf4a554a96e02d3c29831b8569faca664462aef79e7dd54caa71ab210c32ce2298f3c6dab9e0a7caa9b01b64e598c6cb5563070688ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp211703.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp211703.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihN4642.exe

    Filesize

    470KB

    MD5

    d240372909e1ab2a98c581a9d8478d1d

    SHA1

    6c1644c001936aa849552a6824e4e5244d0ae51b

    SHA256

    8e1e8f307c841a1623ff73c2588648cf9248d181fa4e7b6bbe5e2a20830ee307

    SHA512

    b926529c49784f0c9ac758678c13179196464fd72d14607e7e0e6c085d68385145d7936fb7b31a4ff74d0743b1f61ba4074ee679dec654953c1ddbe363161df4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihN4642.exe

    Filesize

    470KB

    MD5

    d240372909e1ab2a98c581a9d8478d1d

    SHA1

    6c1644c001936aa849552a6824e4e5244d0ae51b

    SHA256

    8e1e8f307c841a1623ff73c2588648cf9248d181fa4e7b6bbe5e2a20830ee307

    SHA512

    b926529c49784f0c9ac758678c13179196464fd72d14607e7e0e6c085d68385145d7936fb7b31a4ff74d0743b1f61ba4074ee679dec654953c1ddbe363161df4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it053626.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it053626.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr642913.exe

    Filesize

    486KB

    MD5

    764fb5a2b19e771d91c9638c36ebaf93

    SHA1

    a15e95ce3908539ee8ef2349511f0a1baf124d08

    SHA256

    259e30eb95942a214dcc9925b3553e680da1ffbe537553d007fee6a9ea29f203

    SHA512

    5a0b21ba699af69a410a343922be6e7b61dd2c21848fa91844d76c6612c34faa3bd71f3b3d29448692d8205fe74f9a27ac5376a1343a6b900c4cea3016b9d777

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr642913.exe

    Filesize

    486KB

    MD5

    764fb5a2b19e771d91c9638c36ebaf93

    SHA1

    a15e95ce3908539ee8ef2349511f0a1baf124d08

    SHA256

    259e30eb95942a214dcc9925b3553e680da1ffbe537553d007fee6a9ea29f203

    SHA512

    5a0b21ba699af69a410a343922be6e7b61dd2c21848fa91844d76c6612c34faa3bd71f3b3d29448692d8205fe74f9a27ac5376a1343a6b900c4cea3016b9d777

  • memory/872-964-0x0000000006DD0000-0x0000000006E1B000-memory.dmp

    Filesize

    300KB

  • memory/872-963-0x0000000000010000-0x0000000000038000-memory.dmp

    Filesize

    160KB

  • memory/872-965-0x0000000006D80000-0x0000000006D90000-memory.dmp

    Filesize

    64KB

  • memory/2108-971-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB

  • memory/3500-140-0x00000000006D0000-0x00000000006DA000-memory.dmp

    Filesize

    40KB

  • memory/4056-180-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-200-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-150-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/4056-153-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-154-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-156-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-158-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-160-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-162-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-164-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-166-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-168-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-170-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-172-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-174-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-176-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-178-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-151-0x0000000002840000-0x000000000287A000-memory.dmp

    Filesize

    232KB

  • memory/4056-182-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-184-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-186-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-188-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-190-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-192-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-194-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-196-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-198-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-152-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/4056-202-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-204-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-206-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-208-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-210-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-212-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-214-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-216-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4056-945-0x0000000007F20000-0x0000000008526000-memory.dmp

    Filesize

    6.0MB

  • memory/4056-946-0x0000000002A70000-0x0000000002A82000-memory.dmp

    Filesize

    72KB

  • memory/4056-947-0x0000000007910000-0x0000000007A1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4056-948-0x0000000005000000-0x000000000503E000-memory.dmp

    Filesize

    248KB

  • memory/4056-949-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4056-950-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/4056-951-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/4056-952-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4056-953-0x0000000008B40000-0x0000000008BB6000-memory.dmp

    Filesize

    472KB

  • memory/4056-149-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/4056-148-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4056-147-0x0000000005090000-0x000000000558E000-memory.dmp

    Filesize

    5.0MB

  • memory/4056-146-0x00000000024C0000-0x00000000024FC000-memory.dmp

    Filesize

    240KB

  • memory/4056-954-0x0000000008C80000-0x0000000008E42000-memory.dmp

    Filesize

    1.8MB

  • memory/4056-955-0x0000000008E50000-0x000000000937C000-memory.dmp

    Filesize

    5.2MB

  • memory/4056-956-0x0000000009420000-0x000000000943E000-memory.dmp

    Filesize

    120KB

  • memory/4056-957-0x0000000002660000-0x00000000026B0000-memory.dmp

    Filesize

    320KB