Analysis

  • max time kernel
    147s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 15:40

General

  • Target

    c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe

  • Size

    938KB

  • MD5

    7b6d20daf8022865d9202f70082a6e6a

  • SHA1

    5133a4d60e51365ab5c242c4e2c77e26423b1f5e

  • SHA256

    c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812

  • SHA512

    fb07d634417251fe81f71eaf026a07a4ee1458007dc679918cb10d2561abec8638d3454b7c80c7248194a5fec2c8d1d7d24bad049a3c4650664eb44f43db245e

  • SSDEEP

    24576:Iyi9zGqT22AIiNqwNIb+w3it1eeTjZOWY:PUzGc22DiNpIbotkeXkW

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe
    "C:\Users\Admin\AppData\Local\Temp\c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exe
      2⤵
      • Executes dropped EXE
      PID:3268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 624
        3⤵
        • Program crash
        PID:4188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 708
        3⤵
        • Program crash
        PID:4952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 844
        3⤵
        • Program crash
        PID:4408
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 852
        3⤵
        • Program crash
        PID:4396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 880
        3⤵
        • Program crash
        PID:68
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 892
        3⤵
        • Program crash
        PID:4384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 1076
        3⤵
        • Program crash
        PID:4500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exe

    Filesize

    382KB

    MD5

    05f827f19259ec6cfa97bf5039451da7

    SHA1

    3623e1e80b525a335469784e311c3b6620da8269

    SHA256

    ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283

    SHA512

    31cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exe

    Filesize

    382KB

    MD5

    05f827f19259ec6cfa97bf5039451da7

    SHA1

    3623e1e80b525a335469784e311c3b6620da8269

    SHA256

    ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283

    SHA512

    31cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exe

    Filesize

    623KB

    MD5

    9fe7cf49f1bea7611b67f3b026bb8000

    SHA1

    989db8075d6e0cca7cb6f0c78ad5e1baf6caff58

    SHA256

    cb1c4e40386d183ecd8359ff41c061049632daf68f4a12c5b6b2401c92980370

    SHA512

    c4c869a8cdc3463ae645ee26442301d64cdd649aaf3edee5dbd0012cc78b4358dfbc754928fced0a5cee959916f6e4e3260152a465e3608a55f8a45fecbbbdba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exe

    Filesize

    623KB

    MD5

    9fe7cf49f1bea7611b67f3b026bb8000

    SHA1

    989db8075d6e0cca7cb6f0c78ad5e1baf6caff58

    SHA256

    cb1c4e40386d183ecd8359ff41c061049632daf68f4a12c5b6b2401c92980370

    SHA512

    c4c869a8cdc3463ae645ee26442301d64cdd649aaf3edee5dbd0012cc78b4358dfbc754928fced0a5cee959916f6e4e3260152a465e3608a55f8a45fecbbbdba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exe

    Filesize

    469KB

    MD5

    7a9df90eb50724800431a27af60ca63d

    SHA1

    9363280e0aa0f1b680c8b1504193a87c5ddfd5ab

    SHA256

    e168092014997a8ce0558f17ea2625974c5b351b9474c77ac74011c623a0a02b

    SHA512

    4afc7861892edbb3cb6fa7379bc05aa9ce2c973a58dd66695c197f18c6b18743c6ef689f5aa22d1fad32f3489b2c3dbb550564b44b02e79d87f3820535081d4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exe

    Filesize

    469KB

    MD5

    7a9df90eb50724800431a27af60ca63d

    SHA1

    9363280e0aa0f1b680c8b1504193a87c5ddfd5ab

    SHA256

    e168092014997a8ce0558f17ea2625974c5b351b9474c77ac74011c623a0a02b

    SHA512

    4afc7861892edbb3cb6fa7379bc05aa9ce2c973a58dd66695c197f18c6b18743c6ef689f5aa22d1fad32f3489b2c3dbb550564b44b02e79d87f3820535081d4f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exe

    Filesize

    485KB

    MD5

    92d10405fb365f6fa5aa9499a8661b59

    SHA1

    066f64d5d097a2baee2624b4923a21cdf7f0ad59

    SHA256

    7ef5a8299bfb47a1bc22f30bb5ac8de10c793458155592e024acf6322e424233

    SHA512

    6a5dce6200a6f18ba3f76a1a19ae33a3a42f338490a1398876f3673e4906eb98d7dd6be7b6ce932b04abab848e3dfc4dbc0ac92146a96e085cfa3c5af71e0503

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exe

    Filesize

    485KB

    MD5

    92d10405fb365f6fa5aa9499a8661b59

    SHA1

    066f64d5d097a2baee2624b4923a21cdf7f0ad59

    SHA256

    7ef5a8299bfb47a1bc22f30bb5ac8de10c793458155592e024acf6322e424233

    SHA512

    6a5dce6200a6f18ba3f76a1a19ae33a3a42f338490a1398876f3673e4906eb98d7dd6be7b6ce932b04abab848e3dfc4dbc0ac92146a96e085cfa3c5af71e0503

  • memory/1700-180-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-194-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-145-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/1700-148-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/1700-149-0x0000000004DD0000-0x0000000004E0A000-memory.dmp

    Filesize

    232KB

  • memory/1700-150-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/1700-147-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/1700-151-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-152-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-154-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-156-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-158-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-160-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-162-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-164-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-166-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-168-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-170-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-172-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-174-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-176-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-178-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-144-0x00000000027D0000-0x000000000280C000-memory.dmp

    Filesize

    240KB

  • memory/1700-182-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-184-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-186-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-188-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-190-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-192-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-146-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/1700-196-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-198-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-200-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-202-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-204-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-206-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-208-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-210-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-212-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-214-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1700-943-0x0000000007820000-0x0000000007E26000-memory.dmp

    Filesize

    6.0MB

  • memory/1700-944-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/1700-945-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/1700-946-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/1700-947-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/1700-948-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/1700-949-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/1700-950-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/1700-951-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/1700-952-0x0000000008AF0000-0x0000000008B0E000-memory.dmp

    Filesize

    120KB

  • memory/1700-953-0x0000000008BB0000-0x0000000008D72000-memory.dmp

    Filesize

    1.8MB

  • memory/1700-954-0x0000000008D80000-0x00000000092AC000-memory.dmp

    Filesize

    5.2MB

  • memory/1700-955-0x0000000002710000-0x0000000002760000-memory.dmp

    Filesize

    320KB

  • memory/3268-970-0x0000000000920000-0x0000000000955000-memory.dmp

    Filesize

    212KB

  • memory/4180-962-0x0000000000D90000-0x0000000000DB8000-memory.dmp

    Filesize

    160KB

  • memory/4180-963-0x0000000007CB0000-0x0000000007CFB000-memory.dmp

    Filesize

    300KB

  • memory/4180-964-0x0000000007B50000-0x0000000007B60000-memory.dmp

    Filesize

    64KB

  • memory/4372-138-0x00000000001E0000-0x00000000001EA000-memory.dmp

    Filesize

    40KB