Analysis

  • max time kernel
    148s
  • max time network
    95s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 22:26

General

  • Target

    f30dc08deb85e6530f7e756fdf91ab9ca7082c2843be4bab793f869f1ffb1d7a.exe

  • Size

    827KB

  • MD5

    9272e9057d6a94d865ec627e00fd9e8e

  • SHA1

    5fc06b8539d4a082e3d5ba948a9a2a1d74e86563

  • SHA256

    f30dc08deb85e6530f7e756fdf91ab9ca7082c2843be4bab793f869f1ffb1d7a

  • SHA512

    90c0046fe581058c13bf4dae2b737c3adf2516e1e09bed006d00b29ef7cb72aedaad7c18d02dba5f7858b9164c79c002fa334fc96176645507a37f71b4dec2bb

  • SSDEEP

    24576:Zyg69gwjXWFj6bJyKFinjApPZ8yMqYuewgd:MgEvjWFOQ2injg8q

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f30dc08deb85e6530f7e756fdf91ab9ca7082c2843be4bab793f869f1ffb1d7a.exe
    "C:\Users\Admin\AppData\Local\Temp\f30dc08deb85e6530f7e756fdf91ab9ca7082c2843be4bab793f869f1ffb1d7a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFQ1906.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFQ1906.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPb9670.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPb9670.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it626318.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it626318.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373137.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373137.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp508333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp508333.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948299.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948299.exe
      2⤵
      • Executes dropped EXE
      PID:2096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 616
        3⤵
        • Program crash
        PID:3404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 696
        3⤵
        • Program crash
        PID:2556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 836
        3⤵
        • Program crash
        PID:2976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 844
        3⤵
        • Program crash
        PID:2764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 872
        3⤵
        • Program crash
        PID:3752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 848
        3⤵
        • Program crash
        PID:3764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1080
        3⤵
        • Program crash
        PID:1524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948299.exe

    Filesize

    256KB

    MD5

    849c9674ffabeb0636d25081820f34c8

    SHA1

    6b18cdfcf73b88e55e76ec9b3e6dd309688842d9

    SHA256

    e2d3db424a0b169f3b4ca40b86f787940bebf251f76843919b17f107a4db7c34

    SHA512

    7fa907641431002b341375adbb34c9f93eaf83a34f8948fea7a6273fc826d082fef2d6b24508eef8dc8ca31ed64b1005edbb4a139d442616440187f02f8a0226

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948299.exe

    Filesize

    256KB

    MD5

    849c9674ffabeb0636d25081820f34c8

    SHA1

    6b18cdfcf73b88e55e76ec9b3e6dd309688842d9

    SHA256

    e2d3db424a0b169f3b4ca40b86f787940bebf251f76843919b17f107a4db7c34

    SHA512

    7fa907641431002b341375adbb34c9f93eaf83a34f8948fea7a6273fc826d082fef2d6b24508eef8dc8ca31ed64b1005edbb4a139d442616440187f02f8a0226

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFQ1906.exe

    Filesize

    568KB

    MD5

    dc771ae7e7aec039339c76a60ba57d07

    SHA1

    39c89fecb3c21f53f67d46126f2b3873c459b8e0

    SHA256

    c8a3057e457be40dc93db7ccb8ef1ac4b08eb8418f25aaf4dcc2ac13f956ebea

    SHA512

    b434e305ad61fa304df9f799861684f8ac4c04f8263b3397edbfbccd1e38e7cfa65f4c2d2147de66620212fea7c56d254d6baf55553c410182ea365a845511c0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFQ1906.exe

    Filesize

    568KB

    MD5

    dc771ae7e7aec039339c76a60ba57d07

    SHA1

    39c89fecb3c21f53f67d46126f2b3873c459b8e0

    SHA256

    c8a3057e457be40dc93db7ccb8ef1ac4b08eb8418f25aaf4dcc2ac13f956ebea

    SHA512

    b434e305ad61fa304df9f799861684f8ac4c04f8263b3397edbfbccd1e38e7cfa65f4c2d2147de66620212fea7c56d254d6baf55553c410182ea365a845511c0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp508333.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp508333.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPb9670.exe

    Filesize

    414KB

    MD5

    b47da07fa3497bf4f9a80729e32121e6

    SHA1

    a8f0fc1a37500c89ff775f87a4a1e659793cb9ec

    SHA256

    f91d8eb43c3b48f642d0b3c5c2fcb8cc6587471c018eb7ef0e70930db65a2bf1

    SHA512

    e7f2e9dfcbccbadca2751383f140f814ba1dae86097239fb9230fbc407543713784eccdbf1fdff918fce2da8a9d32a08c559edc6c4f3b59719488dfd76a9113c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPb9670.exe

    Filesize

    414KB

    MD5

    b47da07fa3497bf4f9a80729e32121e6

    SHA1

    a8f0fc1a37500c89ff775f87a4a1e659793cb9ec

    SHA256

    f91d8eb43c3b48f642d0b3c5c2fcb8cc6587471c018eb7ef0e70930db65a2bf1

    SHA512

    e7f2e9dfcbccbadca2751383f140f814ba1dae86097239fb9230fbc407543713784eccdbf1fdff918fce2da8a9d32a08c559edc6c4f3b59719488dfd76a9113c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it626318.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it626318.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373137.exe

    Filesize

    360KB

    MD5

    a6380eaf800f0d8e08a4884fc7492416

    SHA1

    6be61d8dc33eb0d6917568664b54be3dec9b6110

    SHA256

    dd06883811bda8f61bc8e782fa748b0dc0a692c706624fb7b3aef8abe91365b4

    SHA512

    b390d4d05070893132909b8c3e71f9c42dfe224213bb24fd1c583de5022d467e4efa3b38f6ac97f97fe778de4382d3e61f710567dc396f5f1c673e07db47eac5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373137.exe

    Filesize

    360KB

    MD5

    a6380eaf800f0d8e08a4884fc7492416

    SHA1

    6be61d8dc33eb0d6917568664b54be3dec9b6110

    SHA256

    dd06883811bda8f61bc8e782fa748b0dc0a692c706624fb7b3aef8abe91365b4

    SHA512

    b390d4d05070893132909b8c3e71f9c42dfe224213bb24fd1c583de5022d467e4efa3b38f6ac97f97fe778de4382d3e61f710567dc396f5f1c673e07db47eac5

  • memory/2096-975-0x0000000002C80000-0x0000000002CB5000-memory.dmp

    Filesize

    212KB

  • memory/2492-967-0x0000000000300000-0x0000000000328000-memory.dmp

    Filesize

    160KB

  • memory/2492-969-0x00000000070F0000-0x0000000007100000-memory.dmp

    Filesize

    64KB

  • memory/2492-968-0x0000000007080000-0x00000000070CB000-memory.dmp

    Filesize

    300KB

  • memory/4152-187-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-205-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-158-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-160-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-162-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-164-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-166-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-168-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-170-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-172-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-174-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-176-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-179-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/4152-178-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-182-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-180-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/4152-183-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/4152-185-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-154-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-189-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-191-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-193-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-195-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-197-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-199-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-201-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-203-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-156-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-207-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-209-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-211-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-213-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-215-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-217-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-948-0x000000000A1B0000-0x000000000A7B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4152-949-0x0000000009BF0000-0x0000000009C02000-memory.dmp

    Filesize

    72KB

  • memory/4152-950-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/4152-951-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/4152-952-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/4152-953-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/4152-954-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/4152-955-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/4152-956-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/4152-957-0x000000000AE30000-0x000000000AEA6000-memory.dmp

    Filesize

    472KB

  • memory/4152-153-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4152-152-0x0000000004BE0000-0x0000000004C1A000-memory.dmp

    Filesize

    232KB

  • memory/4152-151-0x0000000007220000-0x000000000771E000-memory.dmp

    Filesize

    5.0MB

  • memory/4152-150-0x0000000004780000-0x00000000047BC000-memory.dmp

    Filesize

    240KB

  • memory/4152-149-0x00000000045E0000-0x0000000004626000-memory.dmp

    Filesize

    280KB

  • memory/4152-958-0x000000000AFD0000-0x000000000AFEE000-memory.dmp

    Filesize

    120KB

  • memory/4152-959-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/4152-960-0x000000000B270000-0x000000000B79C000-memory.dmp

    Filesize

    5.2MB

  • memory/4548-142-0x0000000000030000-0x000000000003A000-memory.dmp

    Filesize

    40KB

  • memory/4548-144-0x0000000000630000-0x00000000006B9000-memory.dmp

    Filesize

    548KB