Analysis

  • max time kernel
    145s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 23:38

General

  • Target

    67e98c2c9f6ccbcedbd45c230be1717fdee6ee2763101b85aa13a5578dd5885d.exe

  • Size

    1.1MB

  • MD5

    7c14f6dbc7979e29e0d09afa65800d9b

  • SHA1

    c91c49bebce43dfd9d6adf651056a1f51e02fa96

  • SHA256

    67e98c2c9f6ccbcedbd45c230be1717fdee6ee2763101b85aa13a5578dd5885d

  • SHA512

    01371e90dfec505d414e0e35d876630f77a1a3dc93034f8ff960dcd6b67ffb477c840b18e22d59d13f06b2dbc9b6dd0b8f71960ee91c3e15d82cf42d874b5606

  • SSDEEP

    24576:nyrdtLaKQutPaQ99NsTeo64lgKfS4f2o95Aanm3FThGv/:yr+KQuRaQ9kBTlgZq99Kam3FTEv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e98c2c9f6ccbcedbd45c230be1717fdee6ee2763101b85aa13a5578dd5885d.exe
    "C:\Users\Admin\AppData\Local\Temp\67e98c2c9f6ccbcedbd45c230be1717fdee6ee2763101b85aa13a5578dd5885d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396525.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un486371.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un486371.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr305851.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr305851.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu992147.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu992147.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk444596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk444596.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069423.exe
      2⤵
      • Executes dropped EXE
      PID:5008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 616
        3⤵
        • Program crash
        PID:2116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 696
        3⤵
        • Program crash
        PID:2100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 836
        3⤵
        • Program crash
        PID:4736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 844
        3⤵
        • Program crash
        PID:4744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 872
        3⤵
        • Program crash
        PID:4808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 860
        3⤵
        • Program crash
        PID:3608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1116
        3⤵
        • Program crash
        PID:3580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1184
        3⤵
        • Program crash
        PID:2844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1164
        3⤵
        • Program crash
        PID:4772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069423.exe

          Filesize

          381KB

          MD5

          2e2e258dbbe5930519c95eca35ac9d12

          SHA1

          574ee90cb44009176fcf5f92e09a09a4979f8fd3

          SHA256

          c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

          SHA512

          b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069423.exe

          Filesize

          381KB

          MD5

          2e2e258dbbe5930519c95eca35ac9d12

          SHA1

          574ee90cb44009176fcf5f92e09a09a4979f8fd3

          SHA256

          c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

          SHA512

          b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396525.exe

          Filesize

          763KB

          MD5

          6551ad59da411e639dc97f8a60620e70

          SHA1

          8947a0cc61dc063f315f6f14f5eb3cceec70c3a7

          SHA256

          3feb7349042e864bc59ce4b973108e5ed8f0577cdc4a6a8ee8969fa24e895e8b

          SHA512

          ce4dba48f2a2f647aeda5ad0302f24e03abc03f6e1a52b1ae5b0dfa2cf5d702a54b623a2cd5ea9674baa342cd48ecd1bc9f9c97f5917a501c1775967367f9f4d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396525.exe

          Filesize

          763KB

          MD5

          6551ad59da411e639dc97f8a60620e70

          SHA1

          8947a0cc61dc063f315f6f14f5eb3cceec70c3a7

          SHA256

          3feb7349042e864bc59ce4b973108e5ed8f0577cdc4a6a8ee8969fa24e895e8b

          SHA512

          ce4dba48f2a2f647aeda5ad0302f24e03abc03f6e1a52b1ae5b0dfa2cf5d702a54b623a2cd5ea9674baa342cd48ecd1bc9f9c97f5917a501c1775967367f9f4d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk444596.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk444596.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un486371.exe

          Filesize

          609KB

          MD5

          6bed02ed472091bf7c08e75dec670aa3

          SHA1

          1395b79ecdcb9c333e6b0b2e4dcf52473eff8538

          SHA256

          c3d0243f401d0155d88bbe8ebc20634caafb07cb1cac77539597c12b628fc175

          SHA512

          add1a8847d27716cfca38a3e15d7762aaae19a4c3bf43ea2b7bd1a0d56ce9d64b5a318b5669f37d172330aee34f8b56705ba99d619cf8845b8dff5a49a301aff

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un486371.exe

          Filesize

          609KB

          MD5

          6bed02ed472091bf7c08e75dec670aa3

          SHA1

          1395b79ecdcb9c333e6b0b2e4dcf52473eff8538

          SHA256

          c3d0243f401d0155d88bbe8ebc20634caafb07cb1cac77539597c12b628fc175

          SHA512

          add1a8847d27716cfca38a3e15d7762aaae19a4c3bf43ea2b7bd1a0d56ce9d64b5a318b5669f37d172330aee34f8b56705ba99d619cf8845b8dff5a49a301aff

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr305851.exe

          Filesize

          403KB

          MD5

          68792e36be7f9dc0cf4538050d25f727

          SHA1

          f90617dde3e982fc4267e2100f617d541e64c248

          SHA256

          6e0715c822094853313211c1d4b2b17d4ae2dc455876b16e1400315116452e75

          SHA512

          a23e8630116ed1cb9b9c4a4a356ab57fd2e4c2aa36e15639a6e2a8057a0c537451c2e032a89bf1afdcfc2794d9233553d145d160a8ac347ad6a07dac75aee445

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr305851.exe

          Filesize

          403KB

          MD5

          68792e36be7f9dc0cf4538050d25f727

          SHA1

          f90617dde3e982fc4267e2100f617d541e64c248

          SHA256

          6e0715c822094853313211c1d4b2b17d4ae2dc455876b16e1400315116452e75

          SHA512

          a23e8630116ed1cb9b9c4a4a356ab57fd2e4c2aa36e15639a6e2a8057a0c537451c2e032a89bf1afdcfc2794d9233553d145d160a8ac347ad6a07dac75aee445

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu992147.exe

          Filesize

          486KB

          MD5

          0df863cfcf2ca530af70d17fbb56266f

          SHA1

          373a19ceacef297c69ec73c3437b1a4f969c990a

          SHA256

          d08a7553d09b42eb3cb197c9cc4068d6f11e7f96e8ccc307216d12a952e0a46d

          SHA512

          983bdbbfeb7edbf686750ee2454fdb56cf968f7d60d613af7f032172531867252ff12891945c98b8e5860cd11367f90d260071bcbb46e6e55b28834206373282

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu992147.exe

          Filesize

          486KB

          MD5

          0df863cfcf2ca530af70d17fbb56266f

          SHA1

          373a19ceacef297c69ec73c3437b1a4f969c990a

          SHA256

          d08a7553d09b42eb3cb197c9cc4068d6f11e7f96e8ccc307216d12a952e0a46d

          SHA512

          983bdbbfeb7edbf686750ee2454fdb56cf968f7d60d613af7f032172531867252ff12891945c98b8e5860cd11367f90d260071bcbb46e6e55b28834206373282

        • memory/540-157-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-166-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-145-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-147-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-149-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-151-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-155-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-153-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-141-0x0000000002310000-0x000000000232A000-memory.dmp

          Filesize

          104KB

        • memory/540-159-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-161-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/540-163-0x0000000004E10000-0x0000000004E20000-memory.dmp

          Filesize

          64KB

        • memory/540-165-0x0000000004E10000-0x0000000004E20000-memory.dmp

          Filesize

          64KB

        • memory/540-144-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-162-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-169-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-167-0x0000000004E10000-0x0000000004E20000-memory.dmp

          Filesize

          64KB

        • memory/540-171-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-173-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-175-0x0000000002630000-0x0000000002642000-memory.dmp

          Filesize

          72KB

        • memory/540-176-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/540-179-0x0000000004E10000-0x0000000004E20000-memory.dmp

          Filesize

          64KB

        • memory/540-178-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/540-142-0x0000000004E20000-0x000000000531E000-memory.dmp

          Filesize

          5.0MB

        • memory/540-143-0x0000000002630000-0x0000000002648000-memory.dmp

          Filesize

          96KB

        • memory/4020-1000-0x0000000000330000-0x0000000000358000-memory.dmp

          Filesize

          160KB

        • memory/4020-1001-0x0000000007250000-0x000000000729B000-memory.dmp

          Filesize

          300KB

        • memory/4020-1002-0x00000000070F0000-0x0000000007100000-memory.dmp

          Filesize

          64KB

        • memory/4820-186-0x0000000004D80000-0x0000000004D90000-memory.dmp

          Filesize

          64KB

        • memory/4820-189-0x0000000004D80000-0x0000000004D90000-memory.dmp

          Filesize

          64KB

        • memory/4820-191-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-193-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-190-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-195-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-197-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-199-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-201-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-203-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-207-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-205-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-209-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-211-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-213-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-215-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-217-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-219-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-221-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-223-0x0000000004D10000-0x0000000004D45000-memory.dmp

          Filesize

          212KB

        • memory/4820-982-0x0000000007850000-0x0000000007E56000-memory.dmp

          Filesize

          6.0MB

        • memory/4820-983-0x0000000004D50000-0x0000000004D62000-memory.dmp

          Filesize

          72KB

        • memory/4820-984-0x0000000007EA0000-0x0000000007FAA000-memory.dmp

          Filesize

          1.0MB

        • memory/4820-985-0x0000000004D80000-0x0000000004D90000-memory.dmp

          Filesize

          64KB

        • memory/4820-986-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

          Filesize

          248KB

        • memory/4820-987-0x0000000008030000-0x000000000807B000-memory.dmp

          Filesize

          300KB

        • memory/4820-988-0x00000000082C0000-0x0000000008326000-memory.dmp

          Filesize

          408KB

        • memory/4820-989-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/4820-990-0x0000000008B40000-0x0000000008BB6000-memory.dmp

          Filesize

          472KB

        • memory/4820-991-0x0000000008C00000-0x0000000008DC2000-memory.dmp

          Filesize

          1.8MB

        • memory/4820-188-0x0000000004D80000-0x0000000004D90000-memory.dmp

          Filesize

          64KB

        • memory/4820-185-0x0000000000820000-0x0000000000866000-memory.dmp

          Filesize

          280KB

        • memory/4820-187-0x0000000004D10000-0x0000000004D4A000-memory.dmp

          Filesize

          232KB

        • memory/4820-184-0x00000000024E0000-0x000000000251C000-memory.dmp

          Filesize

          240KB

        • memory/4820-992-0x0000000008DE0000-0x000000000930C000-memory.dmp

          Filesize

          5.2MB

        • memory/4820-993-0x0000000009630000-0x000000000964E000-memory.dmp

          Filesize

          120KB

        • memory/4820-994-0x0000000004830000-0x0000000004880000-memory.dmp

          Filesize

          320KB

        • memory/5008-1008-0x00000000008E0000-0x0000000000915000-memory.dmp

          Filesize

          212KB