Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 02:18

General

  • Target

    76cdb7038baae5a7853f1e3930b54b29a839ed3e58135cae318286e3e79b9cf4.exe

  • Size

    1.1MB

  • MD5

    49ebcf53ca33bc4d6d7d6305341f4c94

  • SHA1

    1ebb77f6dd6e460191be749379a44b6006a96c34

  • SHA256

    76cdb7038baae5a7853f1e3930b54b29a839ed3e58135cae318286e3e79b9cf4

  • SHA512

    5a4eb40857b7a2f8974800999e43c81fc122ab5efe4cb0c072f4b78bd006aa7754980b082cc14862b3df3ddb45d06dc7a0207e2bd92b7b900aea5d278a7d04ce

  • SSDEEP

    24576:jyhMsyKV5qwoO2rGrt+zh7KWwwN6bmgiLP6MByhOxSrJoGwtPf:2Tb5qw567K/+mmgVMByXJhwtP

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76cdb7038baae5a7853f1e3930b54b29a839ed3e58135cae318286e3e79b9cf4.exe
    "C:\Users\Admin\AppData\Local\Temp\76cdb7038baae5a7853f1e3930b54b29a839ed3e58135cae318286e3e79b9cf4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828871.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828871.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un161718.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un161718.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr902568.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr902568.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu916246.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu916246.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk976229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk976229.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023315.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023315.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 620
        3⤵
        • Program crash
        PID:1736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 700
        3⤵
        • Program crash
        PID:2712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 840
        3⤵
        • Program crash
        PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 848
        3⤵
        • Program crash
        PID:1204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 876
        3⤵
        • Program crash
        PID:4492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 888
        3⤵
        • Program crash
        PID:4468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 1120
        3⤵
        • Program crash
        PID:4496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 1184
        3⤵
        • Program crash
        PID:4460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 1144
        3⤵
        • Program crash
        PID:4524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023315.exe

    Filesize

    382KB

    MD5

    0ff55d24796530d7e23cb2ad183cbf4c

    SHA1

    da24850c036fda19d90d1820557197cba485196b

    SHA256

    3eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3

    SHA512

    982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si023315.exe

    Filesize

    382KB

    MD5

    0ff55d24796530d7e23cb2ad183cbf4c

    SHA1

    da24850c036fda19d90d1820557197cba485196b

    SHA256

    3eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3

    SHA512

    982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828871.exe

    Filesize

    763KB

    MD5

    f5882e5f97cf7fc428bc94e542b9a623

    SHA1

    fd5a28bc530fffad630190b8b9c2d892b76c1c8b

    SHA256

    e994571b66277293ba6ce4aab7b72f8eb3efc1dfb988e55ed6f30b6a1e08dade

    SHA512

    924bc50f6e0244b8f9779406362f0598e798afb41287a5e33d2438bcf54bf9b33b7ae01daae8fffde03c77c72fd7e7d8a49c5c81d5a5c6b41c8ef4153849dcd6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828871.exe

    Filesize

    763KB

    MD5

    f5882e5f97cf7fc428bc94e542b9a623

    SHA1

    fd5a28bc530fffad630190b8b9c2d892b76c1c8b

    SHA256

    e994571b66277293ba6ce4aab7b72f8eb3efc1dfb988e55ed6f30b6a1e08dade

    SHA512

    924bc50f6e0244b8f9779406362f0598e798afb41287a5e33d2438bcf54bf9b33b7ae01daae8fffde03c77c72fd7e7d8a49c5c81d5a5c6b41c8ef4153849dcd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk976229.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk976229.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un161718.exe

    Filesize

    609KB

    MD5

    e0f4477f067d5022357e0a1cafd8073d

    SHA1

    fd75deb3a28cba6b90d3c56185c3a74db6d6339e

    SHA256

    599e911ba98d6943b68dadfea726dcc07daaabf344404ecd15745b0eb50e1038

    SHA512

    ab8490f42fe6db6a63222bc61038df46b9de2b987f46514627d4a19ac6c00b0ccf880ff8bd12aaacb0bdc608682ba02c60c7587430968aa629ec93531cb1000a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un161718.exe

    Filesize

    609KB

    MD5

    e0f4477f067d5022357e0a1cafd8073d

    SHA1

    fd75deb3a28cba6b90d3c56185c3a74db6d6339e

    SHA256

    599e911ba98d6943b68dadfea726dcc07daaabf344404ecd15745b0eb50e1038

    SHA512

    ab8490f42fe6db6a63222bc61038df46b9de2b987f46514627d4a19ac6c00b0ccf880ff8bd12aaacb0bdc608682ba02c60c7587430968aa629ec93531cb1000a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr902568.exe

    Filesize

    403KB

    MD5

    a8a376ca69169bf1c0b0140b42763f85

    SHA1

    0d7a00f484c23a4c0488816936d23d952986e2b0

    SHA256

    802a1d12d610adf1288da37e6073b506f25df0abeaa5080b92272c93b7d93402

    SHA512

    37912282f8e214941ed1e800420b0dfe79af399632d2061f8489590a3264443ddd2e08e4aa0a65de6a6346b140a6b6eb21d4b37543170e1c0902841eeb672aaf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr902568.exe

    Filesize

    403KB

    MD5

    a8a376ca69169bf1c0b0140b42763f85

    SHA1

    0d7a00f484c23a4c0488816936d23d952986e2b0

    SHA256

    802a1d12d610adf1288da37e6073b506f25df0abeaa5080b92272c93b7d93402

    SHA512

    37912282f8e214941ed1e800420b0dfe79af399632d2061f8489590a3264443ddd2e08e4aa0a65de6a6346b140a6b6eb21d4b37543170e1c0902841eeb672aaf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu916246.exe

    Filesize

    486KB

    MD5

    85876e9071221aa12f8a281a35bcaf55

    SHA1

    8772c758da70551a4f79c745d8097eddae66b66a

    SHA256

    05e6c2769c113457ba9c2c3b12e7a083cc528f06509f5f11306c526afdc1e420

    SHA512

    bff2b0faa87761585c8fb92a8c6a83ec3f4cbbbe526c5aa84a744ad412291d67950c51ca084ae26048e9b959e0d779a6adfddee2d5ac87d016eb39d3258c7376

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu916246.exe

    Filesize

    486KB

    MD5

    85876e9071221aa12f8a281a35bcaf55

    SHA1

    8772c758da70551a4f79c745d8097eddae66b66a

    SHA256

    05e6c2769c113457ba9c2c3b12e7a083cc528f06509f5f11306c526afdc1e420

    SHA512

    bff2b0faa87761585c8fb92a8c6a83ec3f4cbbbe526c5aa84a744ad412291d67950c51ca084ae26048e9b959e0d779a6adfddee2d5ac87d016eb39d3258c7376

  • memory/1420-986-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/1420-988-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/1420-997-0x0000000004700000-0x0000000004750000-memory.dmp

    Filesize

    320KB

  • memory/1420-996-0x0000000009320000-0x000000000933E000-memory.dmp

    Filesize

    120KB

  • memory/1420-995-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/1420-994-0x0000000008B10000-0x0000000008CD2000-memory.dmp

    Filesize

    1.8MB

  • memory/1420-993-0x0000000008A40000-0x0000000008AB6000-memory.dmp

    Filesize

    472KB

  • memory/1420-992-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/1420-991-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/1420-990-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/1420-989-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-987-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/1420-985-0x0000000007E10000-0x0000000008416000-memory.dmp

    Filesize

    6.0MB

  • memory/1420-233-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-231-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-229-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-228-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/1420-222-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-220-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-218-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-216-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-214-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-212-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-187-0x0000000004C60000-0x0000000004C9C000-memory.dmp

    Filesize

    240KB

  • memory/1420-188-0x0000000005300000-0x000000000533A000-memory.dmp

    Filesize

    232KB

  • memory/1420-190-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-189-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-192-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-194-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-196-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-198-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-200-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-202-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-204-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-206-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-208-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/1420-210-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/2492-1003-0x0000000000D60000-0x0000000000D88000-memory.dmp

    Filesize

    160KB

  • memory/2492-1005-0x0000000007AE0000-0x0000000007B2B000-memory.dmp

    Filesize

    300KB

  • memory/2492-1004-0x0000000007E10000-0x0000000007E20000-memory.dmp

    Filesize

    64KB

  • memory/3616-1011-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB

  • memory/3924-166-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-160-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-177-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3924-176-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-174-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-172-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-170-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-147-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB

  • memory/3924-168-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-149-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-145-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3924-164-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-162-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-178-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB

  • memory/3924-158-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-156-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-152-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-154-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-150-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/3924-148-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB

  • memory/3924-144-0x0000000005250000-0x0000000005268000-memory.dmp

    Filesize

    96KB

  • memory/3924-179-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB

  • memory/3924-180-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB

  • memory/3924-182-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3924-143-0x0000000004D50000-0x000000000524E000-memory.dmp

    Filesize

    5.0MB

  • memory/3924-142-0x00000000023F0000-0x000000000240A000-memory.dmp

    Filesize

    104KB

  • memory/3924-146-0x0000000000B00000-0x0000000000B10000-memory.dmp

    Filesize

    64KB