Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 21:53

General

  • Target

    cdb607f486d4842be6563f91e3cc231afceb4b92d4daec793b18ac04cff3e9b7.exe

  • Size

    827KB

  • MD5

    98b77dbd42367c4abc10ae123a6f51ef

  • SHA1

    267d1f033c89d29139d4ead2799377274c88e78c

  • SHA256

    cdb607f486d4842be6563f91e3cc231afceb4b92d4daec793b18ac04cff3e9b7

  • SHA512

    51c1737218e798f61d01c8b631ed9dccdd175873aad842830651d0703d86e5539c9ec7fdcabbc734dfb7e9f559a15aeefa5785b68ed5c1151bdf33633e7c4406

  • SSDEEP

    12288:Cy90utuoVNuy++ViWwOa+wDevd4kf7PtfNncIZAl4KUSW5YhZaMsuUVdu:CyttJO+ViWstsd3zfnbAWK65oaMBU6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdb607f486d4842be6563f91e3cc231afceb4b92d4daec793b18ac04cff3e9b7.exe
    "C:\Users\Admin\AppData\Local\Temp\cdb607f486d4842be6563f91e3cc231afceb4b92d4daec793b18ac04cff3e9b7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisZ6273.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisZ6273.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAG3628.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAG3628.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it507274.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it507274.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr966687.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr966687.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp403531.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp403531.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr180375.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr180375.exe
      2⤵
      • Executes dropped EXE
      PID:2980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 616
        3⤵
        • Program crash
        PID:3652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 696
        3⤵
        • Program crash
        PID:1600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 832
        3⤵
        • Program crash
        PID:2180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 844
        3⤵
        • Program crash
        PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 872
        3⤵
        • Program crash
        PID:4072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 860
        3⤵
        • Program crash
        PID:3340
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 1080
        3⤵
        • Program crash
        PID:2808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr180375.exe

    Filesize

    256KB

    MD5

    75010e5ea57d8df01af423dfb4a41c4e

    SHA1

    e83935f1ece1fdbb0108760d872613329f5984b8

    SHA256

    5ef060442c54775b7552ee47568c45748e9c4e1f33e383c6c73122aeb5e92142

    SHA512

    8e1f8d8ab92dcaa63452db76e2bf69dc80439cfbaaecaa7ba36844c4002334999cc091ea306870dc8d3051ef7296a56fa9fb6cd6c30e23f54eaa8da0017cc35b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr180375.exe

    Filesize

    256KB

    MD5

    75010e5ea57d8df01af423dfb4a41c4e

    SHA1

    e83935f1ece1fdbb0108760d872613329f5984b8

    SHA256

    5ef060442c54775b7552ee47568c45748e9c4e1f33e383c6c73122aeb5e92142

    SHA512

    8e1f8d8ab92dcaa63452db76e2bf69dc80439cfbaaecaa7ba36844c4002334999cc091ea306870dc8d3051ef7296a56fa9fb6cd6c30e23f54eaa8da0017cc35b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisZ6273.exe

    Filesize

    569KB

    MD5

    52d4898ed1dd3e8e30dd0524e26de1ef

    SHA1

    59217800486aad2a67c54daf8848fbc23ac788b7

    SHA256

    6ac3b1f93707dc95de80f0f3ed668f05b9569b7c51024818df0f391b29b3a440

    SHA512

    a58da6d0a4e0379ed515e821819600c9f9a15dc08a3ef0d40fbf10942281cd4a069b7bd93366f6660995a479eca9200c90ac57f12890cfb36ee83e806e544f1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisZ6273.exe

    Filesize

    569KB

    MD5

    52d4898ed1dd3e8e30dd0524e26de1ef

    SHA1

    59217800486aad2a67c54daf8848fbc23ac788b7

    SHA256

    6ac3b1f93707dc95de80f0f3ed668f05b9569b7c51024818df0f391b29b3a440

    SHA512

    a58da6d0a4e0379ed515e821819600c9f9a15dc08a3ef0d40fbf10942281cd4a069b7bd93366f6660995a479eca9200c90ac57f12890cfb36ee83e806e544f1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp403531.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp403531.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAG3628.exe

    Filesize

    414KB

    MD5

    e89edb817b278b48446138338a70b7b2

    SHA1

    7b21f1aa168d6da3ac7d84619b28b6a7f99aa0ff

    SHA256

    954bd1c1fbea702c0b18c641206f2762877baacb2ae897d6b8e80a3a7055ec22

    SHA512

    755c1401e1d2d25fa4206d644209e0fc2a6358fa853aebaf8e5081deb41033253b30ebda40f500c0ba8fa3d87475b8e55e5e248f05a09a5f7ef814f22c72b64b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAG3628.exe

    Filesize

    414KB

    MD5

    e89edb817b278b48446138338a70b7b2

    SHA1

    7b21f1aa168d6da3ac7d84619b28b6a7f99aa0ff

    SHA256

    954bd1c1fbea702c0b18c641206f2762877baacb2ae897d6b8e80a3a7055ec22

    SHA512

    755c1401e1d2d25fa4206d644209e0fc2a6358fa853aebaf8e5081deb41033253b30ebda40f500c0ba8fa3d87475b8e55e5e248f05a09a5f7ef814f22c72b64b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it507274.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it507274.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr966687.exe

    Filesize

    360KB

    MD5

    fe4c0908e172fbf08d60a4c340ccd310

    SHA1

    d20cd7fa75c2040c8c0d7ab4651a9b4de669d39a

    SHA256

    1aaf348dd9ed898ab956f31a9500a67b390630839bc5639c0afd82aa26aa557f

    SHA512

    c37b9610734e5453e4e6557336b38b87309fac989403f72ec14e8157ae34c2b10c1361b6adae965e2f72a06420db3042c93f3559fde9a54301f7082023529f02

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr966687.exe

    Filesize

    360KB

    MD5

    fe4c0908e172fbf08d60a4c340ccd310

    SHA1

    d20cd7fa75c2040c8c0d7ab4651a9b4de669d39a

    SHA256

    1aaf348dd9ed898ab956f31a9500a67b390630839bc5639c0afd82aa26aa557f

    SHA512

    c37b9610734e5453e4e6557336b38b87309fac989403f72ec14e8157ae34c2b10c1361b6adae965e2f72a06420db3042c93f3559fde9a54301f7082023529f02

  • memory/2980-971-0x0000000002C70000-0x0000000002CA5000-memory.dmp

    Filesize

    212KB

  • memory/3256-964-0x00000000079E0000-0x0000000007A2B000-memory.dmp

    Filesize

    300KB

  • memory/3256-963-0x0000000000C60000-0x0000000000C88000-memory.dmp

    Filesize

    160KB

  • memory/3256-965-0x0000000007CB0000-0x0000000007CC0000-memory.dmp

    Filesize

    64KB

  • memory/4596-140-0x0000000000970000-0x000000000097A000-memory.dmp

    Filesize

    40KB

  • memory/4968-180-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-200-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-153-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-155-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-157-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-159-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-161-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-163-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4968-167-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4968-165-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-164-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4968-168-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-170-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-172-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-174-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-176-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-178-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-150-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-182-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-184-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-186-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-188-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-190-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-192-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-194-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-196-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-198-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-151-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-202-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-204-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-206-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-208-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-210-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-212-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-214-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-216-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4968-945-0x000000000A250000-0x000000000A856000-memory.dmp

    Filesize

    6.0MB

  • memory/4968-946-0x0000000007260000-0x0000000007272000-memory.dmp

    Filesize

    72KB

  • memory/4968-947-0x0000000009C40000-0x0000000009D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/4968-948-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/4968-949-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/4968-950-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4968-951-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/4968-952-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/4968-953-0x000000000ADC0000-0x000000000AE10000-memory.dmp

    Filesize

    320KB

  • memory/4968-149-0x0000000007170000-0x00000000071AA000-memory.dmp

    Filesize

    232KB

  • memory/4968-148-0x00000000072C0000-0x00000000077BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4968-147-0x00000000048E0000-0x000000000491C000-memory.dmp

    Filesize

    240KB

  • memory/4968-146-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/4968-954-0x000000000AE30000-0x000000000AEA6000-memory.dmp

    Filesize

    472KB

  • memory/4968-955-0x000000000AF10000-0x000000000B0D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4968-956-0x000000000B0E0000-0x000000000B60C000-memory.dmp

    Filesize

    5.2MB

  • memory/4968-957-0x000000000B730000-0x000000000B74E000-memory.dmp

    Filesize

    120KB