Analysis

  • max time kernel
    144s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 01:20

General

  • Target

    9894895b1ee298220399487cec260aab2a53f80b0f09bfaf697246fbb81085ef.exe

  • Size

    939KB

  • MD5

    bc79cf4b8f30c6a2c6ca4693e77858eb

  • SHA1

    1953722d0a7658661a4f5af42db840c66847744f

  • SHA256

    9894895b1ee298220399487cec260aab2a53f80b0f09bfaf697246fbb81085ef

  • SHA512

    d2228aad8690546be4a107363bcd1c6c466bb9dfe47f501c04ac9a9ca998bba7dac5a59f716b4a5bb96f550e917e2c1c6c88734d8509ee3365fcea577afa573a

  • SSDEEP

    12288:Ky90tP46Cq4l/+rnF7h/qA5pI3fgAMfkUg7UsEy8TcBNJUbj1poU2phDNq1qg:KySYWF5yfgfdgnGTcBNJa6Oqg

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9894895b1ee298220399487cec260aab2a53f80b0f09bfaf697246fbb81085ef.exe
    "C:\Users\Admin\AppData\Local\Temp\9894895b1ee298220399487cec260aab2a53f80b0f09bfaf697246fbb81085ef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn3309.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn3309.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilB0243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilB0243.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235627.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235627.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr660451.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr660451.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp091290.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp091290.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562631.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562631.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 620
        3⤵
        • Program crash
        PID:4100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 700
        3⤵
        • Program crash
        PID:4492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 844
        3⤵
        • Program crash
        PID:4916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 856
        3⤵
        • Program crash
        PID:2096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 880
        3⤵
        • Program crash
        PID:3008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 740
        3⤵
        • Program crash
        PID:1020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1120
        3⤵
        • Program crash
        PID:3836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1168
        3⤵
        • Program crash
        PID:4476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1144
        3⤵
        • Program crash
        PID:4652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562631.exe

    Filesize

    382KB

    MD5

    0ff55d24796530d7e23cb2ad183cbf4c

    SHA1

    da24850c036fda19d90d1820557197cba485196b

    SHA256

    3eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3

    SHA512

    982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562631.exe

    Filesize

    382KB

    MD5

    0ff55d24796530d7e23cb2ad183cbf4c

    SHA1

    da24850c036fda19d90d1820557197cba485196b

    SHA256

    3eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3

    SHA512

    982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn3309.exe

    Filesize

    624KB

    MD5

    484787f1a4144d933db9fd60525f3f35

    SHA1

    22f3ee036c9f60b421f465c0c6dac55cf145fb65

    SHA256

    54f1724166c417d35f633618ff87a42343173db2879865ab5d434146dac4ad28

    SHA512

    9215143ea0eadfe118ce4551cecf14d67e7a78b3e95d57ec80719774621ef87081956683be2258313c4dccf6ac684220ca6ec36f67622647e883ffb01079178f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn3309.exe

    Filesize

    624KB

    MD5

    484787f1a4144d933db9fd60525f3f35

    SHA1

    22f3ee036c9f60b421f465c0c6dac55cf145fb65

    SHA256

    54f1724166c417d35f633618ff87a42343173db2879865ab5d434146dac4ad28

    SHA512

    9215143ea0eadfe118ce4551cecf14d67e7a78b3e95d57ec80719774621ef87081956683be2258313c4dccf6ac684220ca6ec36f67622647e883ffb01079178f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp091290.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp091290.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilB0243.exe

    Filesize

    470KB

    MD5

    467c5006a3f58336b7be40b6161875a4

    SHA1

    bfb48c782ba39a085fa2ba85fa2ba20f91e6bf06

    SHA256

    9f63e33ce931081de7f877c1f44cfae272f6ad27b95c6f1f34d450cd21cb2eb8

    SHA512

    a41b828e6881b03e8ca6ad8b4ddd7384d0bc8aa48e842542990253b3f347e7f562a351bd3ceb9807de0da948d030455a8e860a95e000f0b984f5091f130bf99c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilB0243.exe

    Filesize

    470KB

    MD5

    467c5006a3f58336b7be40b6161875a4

    SHA1

    bfb48c782ba39a085fa2ba85fa2ba20f91e6bf06

    SHA256

    9f63e33ce931081de7f877c1f44cfae272f6ad27b95c6f1f34d450cd21cb2eb8

    SHA512

    a41b828e6881b03e8ca6ad8b4ddd7384d0bc8aa48e842542990253b3f347e7f562a351bd3ceb9807de0da948d030455a8e860a95e000f0b984f5091f130bf99c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235627.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235627.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr660451.exe

    Filesize

    486KB

    MD5

    70a3ad85c77c369cab7f4dc1cb1de90b

    SHA1

    0c1515f585b89313097019d02beca86a9818a4b6

    SHA256

    384ac142e16362c897991fcd2a204ab23a5d7043015516edb2caa99d8e7d65ce

    SHA512

    0afbdfe7c7a841483b3f7133c80fbcfe0d460d789dae2fb72258c7d46f9a741d06b1cd74d9e47f3697e14894d8d970694f7af04b77f4aa4165623eae9761c536

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr660451.exe

    Filesize

    486KB

    MD5

    70a3ad85c77c369cab7f4dc1cb1de90b

    SHA1

    0c1515f585b89313097019d02beca86a9818a4b6

    SHA256

    384ac142e16362c897991fcd2a204ab23a5d7043015516edb2caa99d8e7d65ce

    SHA512

    0afbdfe7c7a841483b3f7133c80fbcfe0d460d789dae2fb72258c7d46f9a741d06b1cd74d9e47f3697e14894d8d970694f7af04b77f4aa4165623eae9761c536

  • memory/2972-965-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/2972-964-0x00000000000E0000-0x0000000000108000-memory.dmp

    Filesize

    160KB

  • memory/2972-966-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/3964-972-0x0000000000810000-0x0000000000845000-memory.dmp

    Filesize

    212KB

  • memory/4324-141-0x0000000000090000-0x000000000009A000-memory.dmp

    Filesize

    40KB

  • memory/4892-183-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-201-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-153-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-155-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-157-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-159-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-161-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-163-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-165-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-167-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-169-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-171-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-173-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-175-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-177-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-179-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-181-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-151-0x0000000002840000-0x000000000287A000-memory.dmp

    Filesize

    232KB

  • memory/4892-185-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-187-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-192-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4892-190-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4892-193-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-189-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-195-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-197-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-199-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-152-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-203-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-205-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-207-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-209-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-211-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-213-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-215-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-217-0x0000000002840000-0x0000000002875000-memory.dmp

    Filesize

    212KB

  • memory/4892-946-0x0000000007EE0000-0x00000000084E6000-memory.dmp

    Filesize

    6.0MB

  • memory/4892-947-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

    Filesize

    72KB

  • memory/4892-948-0x00000000078D0000-0x00000000079DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4892-949-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4892-950-0x0000000004F00000-0x0000000004F3E000-memory.dmp

    Filesize

    248KB

  • memory/4892-951-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4892-952-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/4892-953-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4892-954-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/4892-150-0x0000000004F50000-0x000000000544E000-memory.dmp

    Filesize

    5.0MB

  • memory/4892-149-0x0000000000B20000-0x0000000000B5C000-memory.dmp

    Filesize

    240KB

  • memory/4892-148-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4892-147-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4892-955-0x0000000008AE0000-0x0000000008AFE000-memory.dmp

    Filesize

    120KB

  • memory/4892-956-0x0000000008BB0000-0x0000000008C00000-memory.dmp

    Filesize

    320KB

  • memory/4892-957-0x0000000008D00000-0x0000000008EC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4892-958-0x0000000008ED0000-0x00000000093FC000-memory.dmp

    Filesize

    5.2MB