Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 16:48

General

  • Target

    abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe

  • Size

    939KB

  • MD5

    b91bf8420d94dcc8a07a54a68930a48a

  • SHA1

    81b2516999b9fa2d3cfa0229709f938378e3208e

  • SHA256

    abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c

  • SHA512

    8f5bf26df1a8d74edcc7986643502d8a95f4e4d7e4c508ff98fc9291017716989ae2043eb809730315c0f1491c87c4e8679163894bb22780614bac8c08735f27

  • SSDEEP

    24576:IyMH53k74N4qrAEyyWn3XwF5pGvWNKtl0oxv:PMH+qMEueevWotl0o

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe
    "C:\Users\Admin\AppData\Local\Temp\abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exe
      2⤵
      • Executes dropped EXE
      PID:2924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 620
        3⤵
        • Program crash
        PID:3020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 700
        3⤵
        • Program crash
        PID:2412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 840
        3⤵
        • Program crash
        PID:3852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 828
        3⤵
        • Program crash
        PID:3168
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 876
        3⤵
        • Program crash
        PID:3840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 896
        3⤵
        • Program crash
        PID:1748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 1076
        3⤵
        • Program crash
        PID:1888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exe

    Filesize

    382KB

    MD5

    05f827f19259ec6cfa97bf5039451da7

    SHA1

    3623e1e80b525a335469784e311c3b6620da8269

    SHA256

    ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283

    SHA512

    31cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exe

    Filesize

    382KB

    MD5

    05f827f19259ec6cfa97bf5039451da7

    SHA1

    3623e1e80b525a335469784e311c3b6620da8269

    SHA256

    ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283

    SHA512

    31cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exe

    Filesize

    624KB

    MD5

    b2cac1e5c2904faf0577fa12f8ba7145

    SHA1

    0165d875d24cf52c83332c025d698703db5acb65

    SHA256

    eb729a397dfbcea508f06ed10c7fa8bd9a0533eefe56b7b2c475e8e930e36727

    SHA512

    c99da5ea81d6b1f4ab3482d447095f158e9f39ae40b721fd826cf6664b4abe90e3a2eca52c90171acac4af0f129d5ca287aae9e511dcbdb5725443fc7e8ea894

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exe

    Filesize

    624KB

    MD5

    b2cac1e5c2904faf0577fa12f8ba7145

    SHA1

    0165d875d24cf52c83332c025d698703db5acb65

    SHA256

    eb729a397dfbcea508f06ed10c7fa8bd9a0533eefe56b7b2c475e8e930e36727

    SHA512

    c99da5ea81d6b1f4ab3482d447095f158e9f39ae40b721fd826cf6664b4abe90e3a2eca52c90171acac4af0f129d5ca287aae9e511dcbdb5725443fc7e8ea894

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exe

    Filesize

    469KB

    MD5

    e8597cba69da512abbcdc409f8ea423b

    SHA1

    d2162bd0e9418500994d283760b473e7b7b1a07f

    SHA256

    7d60857e514174f831427d4d18084d300f97b2b9f9af278680b5cb2dfa0aff76

    SHA512

    50b071355492efa9dca2cc6fc0bf565fe31e06e9acfeceb35394809a67410d1d329e9ddc01a3740ce074cc1bcb5fc27fc53d81f515d8e71f8c03dd259bbf4a95

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exe

    Filesize

    469KB

    MD5

    e8597cba69da512abbcdc409f8ea423b

    SHA1

    d2162bd0e9418500994d283760b473e7b7b1a07f

    SHA256

    7d60857e514174f831427d4d18084d300f97b2b9f9af278680b5cb2dfa0aff76

    SHA512

    50b071355492efa9dca2cc6fc0bf565fe31e06e9acfeceb35394809a67410d1d329e9ddc01a3740ce074cc1bcb5fc27fc53d81f515d8e71f8c03dd259bbf4a95

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exe

    Filesize

    485KB

    MD5

    1786a8cfb6ef2b360c0641dcfcd639d4

    SHA1

    553aed7c6d4249bcbd5c034fcfbeb06bfa83f299

    SHA256

    3732c7d88193f70ebf881d9c07bdfc15771ef3f8f61f11250589a1b588cec84a

    SHA512

    3b587046024429dcaa29cbd3b09f9a1a5d29d14cba41a077e93f5a21ca6a992085b1cd2c1f4021587bd792b457e96ced244b3fbdc8567f8124c822bc8a508af2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exe

    Filesize

    485KB

    MD5

    1786a8cfb6ef2b360c0641dcfcd639d4

    SHA1

    553aed7c6d4249bcbd5c034fcfbeb06bfa83f299

    SHA256

    3732c7d88193f70ebf881d9c07bdfc15771ef3f8f61f11250589a1b588cec84a

    SHA512

    3b587046024429dcaa29cbd3b09f9a1a5d29d14cba41a077e93f5a21ca6a992085b1cd2c1f4021587bd792b457e96ced244b3fbdc8567f8124c822bc8a508af2

  • memory/2884-142-0x00000000006F0000-0x00000000006FA000-memory.dmp

    Filesize

    40KB

  • memory/2924-974-0x0000000000A30000-0x0000000000A65000-memory.dmp

    Filesize

    212KB

  • memory/3164-966-0x0000000000100000-0x0000000000128000-memory.dmp

    Filesize

    160KB

  • memory/3164-967-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/3164-968-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/3652-182-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-202-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-154-0x0000000004DD0000-0x0000000004E0A000-memory.dmp

    Filesize

    232KB

  • memory/3652-155-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-156-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-158-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-160-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-162-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-164-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-166-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-168-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-170-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-172-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-174-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-176-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-178-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-180-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-152-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/3652-184-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-186-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-188-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-190-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-192-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-194-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-196-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-198-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-200-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-153-0x0000000004E70000-0x000000000536E000-memory.dmp

    Filesize

    5.0MB

  • memory/3652-204-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-206-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-208-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-210-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-212-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-214-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-216-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-218-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3652-947-0x0000000007E00000-0x0000000008406000-memory.dmp

    Filesize

    6.0MB

  • memory/3652-948-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/3652-949-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/3652-950-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/3652-951-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/3652-952-0x0000000007B20000-0x0000000007B6B000-memory.dmp

    Filesize

    300KB

  • memory/3652-953-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/3652-954-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/3652-955-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/3652-151-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/3652-150-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/3652-149-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/3652-148-0x0000000004D50000-0x0000000004D8C000-memory.dmp

    Filesize

    240KB

  • memory/3652-956-0x0000000008AE0000-0x0000000008AFE000-memory.dmp

    Filesize

    120KB

  • memory/3652-957-0x0000000008BB0000-0x0000000008D72000-memory.dmp

    Filesize

    1.8MB

  • memory/3652-958-0x0000000008D80000-0x00000000092AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3652-960-0x0000000002710000-0x0000000002760000-memory.dmp

    Filesize

    320KB