Analysis

  • max time kernel
    145s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 23:47

General

  • Target

    5fd7c6f8bc39139ce0355c80db1d58e78b3e894d91fd0d723c9cceae5f406175.exe

  • Size

    1.1MB

  • MD5

    e0b1f1b965b303c181dab432608003a2

  • SHA1

    8321e7e11510b714b3c327da19b3bebabdc6f4d6

  • SHA256

    5fd7c6f8bc39139ce0355c80db1d58e78b3e894d91fd0d723c9cceae5f406175

  • SHA512

    3dcf57a5f020187d69d1c6df99aac1bc58c218dbc07445dcf7eeac1620b65974ae5d238950d1a1c9038e992d87f3c6ef4be9ae5907c417b352b308b9f3abbbc4

  • SSDEEP

    24576:fyx5NsUAvu7X26HteszRFSVBT6RGgcdmIBYZsJjPl:qhnK4QGFSVxGGg2KsJj

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fd7c6f8bc39139ce0355c80db1d58e78b3e894d91fd0d723c9cceae5f406175.exe
    "C:\Users\Admin\AppData\Local\Temp\5fd7c6f8bc39139ce0355c80db1d58e78b3e894d91fd0d723c9cceae5f406175.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un902946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un902946.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un223020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un223020.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr374602.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr374602.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu238652.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu238652.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844688.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844688.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si163492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si163492.exe
      2⤵
      • Executes dropped EXE
      PID:4648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 620
        3⤵
        • Program crash
        PID:992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 696
        3⤵
        • Program crash
        PID:3772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 836
        3⤵
        • Program crash
        PID:4616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 844
        3⤵
        • Program crash
        PID:4552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 872
        3⤵
        • Program crash
        PID:2104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 884
        3⤵
        • Program crash
        PID:3100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 1116
        3⤵
        • Program crash
        PID:4884
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 1148
        3⤵
        • Program crash
        PID:1932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 1064
        3⤵
        • Program crash
        PID:2432

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si163492.exe

          Filesize

          381KB

          MD5

          2e2e258dbbe5930519c95eca35ac9d12

          SHA1

          574ee90cb44009176fcf5f92e09a09a4979f8fd3

          SHA256

          c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

          SHA512

          b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si163492.exe

          Filesize

          381KB

          MD5

          2e2e258dbbe5930519c95eca35ac9d12

          SHA1

          574ee90cb44009176fcf5f92e09a09a4979f8fd3

          SHA256

          c61cac710367a0e638943501ad78ed0e1585e8ec787585ff841d9d171860c8c4

          SHA512

          b352f6b993d63d98d6e1df24c06690b597bfb4f42ef62ae5ed6549dbb9826130b80e33959452f1609338dd9ecb76d56b6fd801bc27095ac35d03a6761b2cabf2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un902946.exe

          Filesize

          763KB

          MD5

          68eb2387258e33b39f82f26ff1cbd5af

          SHA1

          bc9df62da123b967862f7927fd8bd73254a2ce48

          SHA256

          2b04650d5708a730b091c0b2c228767d2abbfc217f00d2d2022b7bf3e23771e5

          SHA512

          cd5dd7c9d894526ebefb14cbeae26488cfac8c851e433c079d7952167e221ddfb682722a86fcb67be83f385a17b163571278f54bc003cfb0d6fca200028dfa23

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un902946.exe

          Filesize

          763KB

          MD5

          68eb2387258e33b39f82f26ff1cbd5af

          SHA1

          bc9df62da123b967862f7927fd8bd73254a2ce48

          SHA256

          2b04650d5708a730b091c0b2c228767d2abbfc217f00d2d2022b7bf3e23771e5

          SHA512

          cd5dd7c9d894526ebefb14cbeae26488cfac8c851e433c079d7952167e221ddfb682722a86fcb67be83f385a17b163571278f54bc003cfb0d6fca200028dfa23

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844688.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844688.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un223020.exe

          Filesize

          610KB

          MD5

          2f1a965646939cb896235d3cc57293bd

          SHA1

          bced8818f2e2f25f4e75fe6140b48af740d4d8f9

          SHA256

          ee1a5131accb2a973a5c6499201e1757463d8edb5a067469cc0205ed8c7f90ae

          SHA512

          960c07303f803c0fce148cce98bf8f3bbd82cec4037c9b21959cb49a7b2fd0e287f45c8708347cc967d7e0685025faaf59079808f4123714e1911e0aa0df8c2e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un223020.exe

          Filesize

          610KB

          MD5

          2f1a965646939cb896235d3cc57293bd

          SHA1

          bced8818f2e2f25f4e75fe6140b48af740d4d8f9

          SHA256

          ee1a5131accb2a973a5c6499201e1757463d8edb5a067469cc0205ed8c7f90ae

          SHA512

          960c07303f803c0fce148cce98bf8f3bbd82cec4037c9b21959cb49a7b2fd0e287f45c8708347cc967d7e0685025faaf59079808f4123714e1911e0aa0df8c2e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr374602.exe

          Filesize

          403KB

          MD5

          170017d3acee3e25fa35c9329a1a1289

          SHA1

          eb7be6245ea24705af5050023d6a44fc9141166e

          SHA256

          b5174fad9da454b5871b34e51a8b18ba0ca0a58ded3d7a9efc128be5ad30627f

          SHA512

          ea31577ff454cc06411ef3b6927732905873b4a5e3d201fe0301335b8d92509f377c66247ca139ec04b7a6b46f20c5f2b7a96315ef125eb7140ae14148e88710

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr374602.exe

          Filesize

          403KB

          MD5

          170017d3acee3e25fa35c9329a1a1289

          SHA1

          eb7be6245ea24705af5050023d6a44fc9141166e

          SHA256

          b5174fad9da454b5871b34e51a8b18ba0ca0a58ded3d7a9efc128be5ad30627f

          SHA512

          ea31577ff454cc06411ef3b6927732905873b4a5e3d201fe0301335b8d92509f377c66247ca139ec04b7a6b46f20c5f2b7a96315ef125eb7140ae14148e88710

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu238652.exe

          Filesize

          486KB

          MD5

          5be26ba79af49e679f91764d1f4c3063

          SHA1

          b29eaa9cd4f80a018aa24345be05ac5d247a83a0

          SHA256

          1d777483be0634be4095a66833092867a33a191a954052b584086c76fab5801f

          SHA512

          06940cf31c72dd9ba21d8def3998388f68ec2d7ddbd40855bfded4b6a64e6e1238278fc5806266e8894058dbe9bdf092c32118db7d4fd708c545783b9cdb1322

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu238652.exe

          Filesize

          486KB

          MD5

          5be26ba79af49e679f91764d1f4c3063

          SHA1

          b29eaa9cd4f80a018aa24345be05ac5d247a83a0

          SHA256

          1d777483be0634be4095a66833092867a33a191a954052b584086c76fab5801f

          SHA512

          06940cf31c72dd9ba21d8def3998388f68ec2d7ddbd40855bfded4b6a64e6e1238278fc5806266e8894058dbe9bdf092c32118db7d4fd708c545783b9cdb1322

        • memory/3080-982-0x0000000007E60000-0x0000000008466000-memory.dmp

          Filesize

          6.0MB

        • memory/3080-986-0x0000000007B20000-0x0000000007B6B000-memory.dmp

          Filesize

          300KB

        • memory/3080-994-0x0000000009010000-0x000000000953C000-memory.dmp

          Filesize

          5.2MB

        • memory/3080-993-0x0000000008E40000-0x0000000009002000-memory.dmp

          Filesize

          1.8MB

        • memory/3080-992-0x0000000008D70000-0x0000000008D8E000-memory.dmp

          Filesize

          120KB

        • memory/3080-991-0x0000000008A90000-0x0000000008B06000-memory.dmp

          Filesize

          472KB

        • memory/3080-990-0x0000000008A20000-0x0000000008A70000-memory.dmp

          Filesize

          320KB

        • memory/3080-989-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/3080-988-0x0000000007CB0000-0x0000000007D16000-memory.dmp

          Filesize

          408KB

        • memory/3080-987-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/3080-985-0x00000000079A0000-0x00000000079DE000-memory.dmp

          Filesize

          248KB

        • memory/3080-984-0x0000000007890000-0x000000000799A000-memory.dmp

          Filesize

          1.0MB

        • memory/3080-983-0x0000000002930000-0x0000000002942000-memory.dmp

          Filesize

          72KB

        • memory/3080-626-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/3080-222-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-220-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-218-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-216-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-214-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-212-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-210-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-186-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/3080-185-0x0000000002250000-0x0000000002296000-memory.dmp

          Filesize

          280KB

        • memory/3080-184-0x00000000028F0000-0x000000000292C000-memory.dmp

          Filesize

          240KB

        • memory/3080-188-0x0000000004E20000-0x0000000004E5A000-memory.dmp

          Filesize

          232KB

        • memory/3080-187-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/3080-189-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-190-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-192-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-194-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-196-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-198-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-200-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-204-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-206-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-208-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/3080-202-0x0000000004E20000-0x0000000004E55000-memory.dmp

          Filesize

          212KB

        • memory/4028-1000-0x0000000000740000-0x0000000000768000-memory.dmp

          Filesize

          160KB

        • memory/4028-1002-0x00000000074A0000-0x00000000074B0000-memory.dmp

          Filesize

          64KB

        • memory/4028-1001-0x00000000074F0000-0x000000000753B000-memory.dmp

          Filesize

          300KB

        • memory/4648-1008-0x00000000008E0000-0x0000000000915000-memory.dmp

          Filesize

          212KB

        • memory/5064-161-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-155-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-173-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-171-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-145-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-169-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-167-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-165-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-149-0x0000000002980000-0x0000000002990000-memory.dmp

          Filesize

          64KB

        • memory/5064-163-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-146-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-159-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-157-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-175-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-152-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB

        • memory/5064-153-0x0000000002980000-0x0000000002990000-memory.dmp

          Filesize

          64KB

        • memory/5064-150-0x0000000002980000-0x0000000002990000-memory.dmp

          Filesize

          64KB

        • memory/5064-144-0x00000000026C0000-0x00000000026D8000-memory.dmp

          Filesize

          96KB

        • memory/5064-143-0x0000000004FE0000-0x00000000054DE000-memory.dmp

          Filesize

          5.0MB

        • memory/5064-176-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/5064-179-0x0000000002980000-0x0000000002990000-memory.dmp

          Filesize

          64KB

        • memory/5064-178-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/5064-142-0x0000000000AA0000-0x0000000000ABA000-memory.dmp

          Filesize

          104KB

        • memory/5064-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/5064-148-0x00000000026C0000-0x00000000026D2000-memory.dmp

          Filesize

          72KB