Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 22:57

General

  • Target

    d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe

  • Size

    966KB

  • MD5

    634cb513c1d44c510ab88cd8db9c5595

  • SHA1

    413a72ab0c3c22bdf807fe2b230ec30ea828c5d3

  • SHA256

    d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3

  • SHA512

    af17f33d8d769336cea75f22640f7e0d7d257e98be3f632d3289880e92f5551aef9fcc1b0c6c7fad18514cea37bf56a3e73b66b859723ad3817c9fb6fa2a13a9

  • SSDEEP

    24576:jyzaVFShrd3nZhSg5Z3ThQrbAygDfAWbGjfnP:2zc8l7ThQrbkbGjv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe
    "C:\Users\Admin\AppData\Local\Temp\d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exe
      2⤵
      • Executes dropped EXE
      PID:4120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 616
        3⤵
        • Program crash
        PID:2116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 696
        3⤵
        • Program crash
        PID:4228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 836
        3⤵
        • Program crash
        PID:1448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 844
        3⤵
        • Program crash
        PID:5116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 872
        3⤵
        • Program crash
        PID:420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 880
        3⤵
        • Program crash
        PID:2584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 1080
        3⤵
        • Program crash
        PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exe

    Filesize

    256KB

    MD5

    ad50cc02fb3a0932062380925ed9343c

    SHA1

    5ef1ef4c68b51ec8a2bfed8783459e71514a352a

    SHA256

    d0523344b3626a44049e6519b21685cdf255d414ea9fc6b3b4590617019462f8

    SHA512

    9ec5d3c97dcd83b5938ea8c57a2e35a8f2479b8b13f3661f3dd22fc1d29f5df9166a5315bbb1ad7f35c8b29b19d59e27bee4ec78a6a96ae0afae2484689d69b0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exe

    Filesize

    256KB

    MD5

    ad50cc02fb3a0932062380925ed9343c

    SHA1

    5ef1ef4c68b51ec8a2bfed8783459e71514a352a

    SHA256

    d0523344b3626a44049e6519b21685cdf255d414ea9fc6b3b4590617019462f8

    SHA512

    9ec5d3c97dcd83b5938ea8c57a2e35a8f2479b8b13f3661f3dd22fc1d29f5df9166a5315bbb1ad7f35c8b29b19d59e27bee4ec78a6a96ae0afae2484689d69b0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exe

    Filesize

    707KB

    MD5

    4a0821bcbaf123f4107a7f505e1f25ff

    SHA1

    07866d37d20519ee1dc5b31291e980ee2cb85e09

    SHA256

    762d0673edc6c0598c225da8dfc233204894c55a4434b49ba6e77dfef3da087a

    SHA512

    4c1f6b3a38516bc9e2d43b16eb354a24f0daac8bcc17def0168ed9e2f79e2bf853f4dd1fde2858b9b4983c7c566b5658ff52e6544a042bb10d28430c9e088828

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exe

    Filesize

    707KB

    MD5

    4a0821bcbaf123f4107a7f505e1f25ff

    SHA1

    07866d37d20519ee1dc5b31291e980ee2cb85e09

    SHA256

    762d0673edc6c0598c225da8dfc233204894c55a4434b49ba6e77dfef3da087a

    SHA512

    4c1f6b3a38516bc9e2d43b16eb354a24f0daac8bcc17def0168ed9e2f79e2bf853f4dd1fde2858b9b4983c7c566b5658ff52e6544a042bb10d28430c9e088828

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exe

    Filesize

    553KB

    MD5

    773f345869b5518247365c2f125e939a

    SHA1

    7f26f97c7edb7cc2b41edeaac03e76796e9a2406

    SHA256

    d1907107fe8258f456203d75a1b328a337f07f0993bbf36e382e824b7eee5b35

    SHA512

    b864b6d0eb5bf1ee900a853edef5f4a6e2d734ddebe3186545502479c880c21f3da2a44ab91bd4ab49ff65f6f21cf75018342effe2e61c5fb2fa88e44cf34f50

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exe

    Filesize

    553KB

    MD5

    773f345869b5518247365c2f125e939a

    SHA1

    7f26f97c7edb7cc2b41edeaac03e76796e9a2406

    SHA256

    d1907107fe8258f456203d75a1b328a337f07f0993bbf36e382e824b7eee5b35

    SHA512

    b864b6d0eb5bf1ee900a853edef5f4a6e2d734ddebe3186545502479c880c21f3da2a44ab91bd4ab49ff65f6f21cf75018342effe2e61c5fb2fa88e44cf34f50

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exe

    Filesize

    278KB

    MD5

    57cf9306fe86e434aef3cbc7fcb00f30

    SHA1

    21f8f99747ff062543933b9e7cf8fa1b1b48c3b5

    SHA256

    0a986735fa5c8e531026be8e47bfce9658a4ac8b215ca44034cecd6d0584a271

    SHA512

    abfa8591618763508533615ee15ceb3d609e7fc7e11068459a5a47a93ad1fb1c9f654ee123a12285658a9a57200052b522670e36fddd1fc38f7e905dacd2dff2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exe

    Filesize

    278KB

    MD5

    57cf9306fe86e434aef3cbc7fcb00f30

    SHA1

    21f8f99747ff062543933b9e7cf8fa1b1b48c3b5

    SHA256

    0a986735fa5c8e531026be8e47bfce9658a4ac8b215ca44034cecd6d0584a271

    SHA512

    abfa8591618763508533615ee15ceb3d609e7fc7e11068459a5a47a93ad1fb1c9f654ee123a12285658a9a57200052b522670e36fddd1fc38f7e905dacd2dff2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exe

    Filesize

    360KB

    MD5

    839f2209725bd532889cefe4d58eab1b

    SHA1

    4a745e5d180bb262f1dbe5622772954e17cedf1a

    SHA256

    b43e4032e5fef4d33fdc3bfa53cf80459afbf472c971d0f2e8ab599e126b7531

    SHA512

    653c25c5747b579abb53d8ae3f42c95e89587761fa11d699a8be751082ddda45cb98c6abaa96a8580af3f9c60ab53b87d5f3104c4adab8777b7e104b3813d06b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exe

    Filesize

    360KB

    MD5

    839f2209725bd532889cefe4d58eab1b

    SHA1

    4a745e5d180bb262f1dbe5622772954e17cedf1a

    SHA256

    b43e4032e5fef4d33fdc3bfa53cf80459afbf472c971d0f2e8ab599e126b7531

    SHA512

    653c25c5747b579abb53d8ae3f42c95e89587761fa11d699a8be751082ddda45cb98c6abaa96a8580af3f9c60ab53b87d5f3104c4adab8777b7e104b3813d06b

  • memory/3556-1003-0x0000000007560000-0x00000000075AB000-memory.dmp

    Filesize

    300KB

  • memory/3556-1002-0x00000000074D0000-0x00000000074E0000-memory.dmp

    Filesize

    64KB

  • memory/3556-1001-0x00000000007C0000-0x00000000007E8000-memory.dmp

    Filesize

    160KB

  • memory/3816-224-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-986-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/3816-995-0x000000000B270000-0x000000000B79C000-memory.dmp

    Filesize

    5.2MB

  • memory/3816-994-0x000000000B090000-0x000000000B252000-memory.dmp

    Filesize

    1.8MB

  • memory/3816-993-0x000000000B020000-0x000000000B070000-memory.dmp

    Filesize

    320KB

  • memory/3816-992-0x000000000AF80000-0x000000000AF9E000-memory.dmp

    Filesize

    120KB

  • memory/3816-991-0x000000000AEC0000-0x000000000AF36000-memory.dmp

    Filesize

    472KB

  • memory/3816-990-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/3816-989-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/3816-988-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3816-987-0x0000000009DC0000-0x0000000009E0B000-memory.dmp

    Filesize

    300KB

  • memory/3816-985-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/3816-984-0x0000000009BF0000-0x0000000009C02000-memory.dmp

    Filesize

    72KB

  • memory/3816-983-0x000000000A190000-0x000000000A796000-memory.dmp

    Filesize

    6.0MB

  • memory/3816-222-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-220-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-218-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-216-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-214-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-185-0x0000000006F80000-0x0000000006FBC000-memory.dmp

    Filesize

    240KB

  • memory/3816-186-0x0000000007680000-0x00000000076BA000-memory.dmp

    Filesize

    232KB

  • memory/3816-187-0x0000000002D00000-0x0000000002D46000-memory.dmp

    Filesize

    280KB

  • memory/3816-188-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-190-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-189-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3816-192-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3816-196-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-194-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3816-193-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-198-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-200-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-202-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-204-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-206-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-208-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-210-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/3816-212-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/4120-1009-0x0000000002BA0000-0x0000000002BD5000-memory.dmp

    Filesize

    212KB

  • memory/4420-167-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-143-0x00000000046B0000-0x00000000046CA000-memory.dmp

    Filesize

    104KB

  • memory/4420-180-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4420-177-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4420-149-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-176-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/4420-175-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-173-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-155-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-171-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-169-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-151-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-179-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/4420-164-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4420-147-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-162-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4420-159-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-157-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-161-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-146-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-145-0x00000000049B0000-0x00000000049C8000-memory.dmp

    Filesize

    96KB

  • memory/4420-144-0x0000000007350000-0x000000000784E000-memory.dmp

    Filesize

    5.0MB

  • memory/4420-165-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/4420-142-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4420-141-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/4420-153-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB