Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 04:01

General

  • Target

    c294f13daa81f5e5a276b98fbbf561f38c60d919d25e247898ffee97efae9ca5.exe

  • Size

    939KB

  • MD5

    5830d5f1bc0ace30c300a187500b2ad3

  • SHA1

    d4bd60d517de4b5cfeb9069a75a8fce504084f36

  • SHA256

    c294f13daa81f5e5a276b98fbbf561f38c60d919d25e247898ffee97efae9ca5

  • SHA512

    891787820d6a727386fbcdfa88db973a31086d24cd80358fe73a7c9b52ebcbc34ff187f643a75a655ccb0d380bc752ee267461bbcfb1d7a08c8f182c7a3d97fa

  • SSDEEP

    24576:uyXthD1rvf5qMxGWSgZGn6KdsdOBvCm00N9qllSG8:9XyWSgGsdOBqcS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c294f13daa81f5e5a276b98fbbf561f38c60d919d25e247898ffee97efae9ca5.exe
    "C:\Users\Admin\AppData\Local\Temp\c294f13daa81f5e5a276b98fbbf561f38c60d919d25e247898ffee97efae9ca5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCv4126.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCv4126.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO9578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO9578.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it894986.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it894986.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr232599.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr232599.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570093.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570093.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672115.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672115.exe
      2⤵
      • Executes dropped EXE
      PID:4688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 616
        3⤵
        • Program crash
        PID:4480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 696
        3⤵
        • Program crash
        PID:4904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 768
        3⤵
        • Program crash
        PID:2116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 844
        3⤵
        • Program crash
        PID:3516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 872
        3⤵
        • Program crash
        PID:3492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 740
        3⤵
        • Program crash
        PID:3116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 1120
        3⤵
        • Program crash
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 1160
        3⤵
        • Program crash
        PID:4696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 1052
        3⤵
        • Program crash
        PID:4072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672115.exe

    Filesize

    382KB

    MD5

    586c2c3c387038a375a60ed9253a87fc

    SHA1

    1c00f420f326a095a41ed7321cc7ddff83b18d07

    SHA256

    ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c

    SHA512

    4652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672115.exe

    Filesize

    382KB

    MD5

    586c2c3c387038a375a60ed9253a87fc

    SHA1

    1c00f420f326a095a41ed7321cc7ddff83b18d07

    SHA256

    ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c

    SHA512

    4652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCv4126.exe

    Filesize

    624KB

    MD5

    be62f91bf844b233a7417a1ae1ca1272

    SHA1

    f4da79cda6c29eab4c6e587da49c8815fd1efb61

    SHA256

    e8d1df592df7b77d6e770ff0383b373b86d8a235ffa90c6e0fbba5d447f31555

    SHA512

    37b714c9f2834815664005e3881ca1bc3fe698bb576708c716a1bfc964a21283bc96ae0c2e31310a1d37cabb5f5947a3c78ec42cfda92ae7ddf69777044bd441

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCv4126.exe

    Filesize

    624KB

    MD5

    be62f91bf844b233a7417a1ae1ca1272

    SHA1

    f4da79cda6c29eab4c6e587da49c8815fd1efb61

    SHA256

    e8d1df592df7b77d6e770ff0383b373b86d8a235ffa90c6e0fbba5d447f31555

    SHA512

    37b714c9f2834815664005e3881ca1bc3fe698bb576708c716a1bfc964a21283bc96ae0c2e31310a1d37cabb5f5947a3c78ec42cfda92ae7ddf69777044bd441

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570093.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570093.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO9578.exe

    Filesize

    470KB

    MD5

    606b84e1ba58e6040d74e15b4ceb77b5

    SHA1

    ebac3e42051e8c6a680840197bfcef85d97d8ce8

    SHA256

    d2830ccbd414cf0980e79a94ec64d21a79d8837927fc045e4d91c66192b193e0

    SHA512

    229d4ee7f4f54d9919c69240bffb2026b16e6933d91d47f9c8260d20811dffcb4072c6f152da560ac1191994cead49af19706eef19db30747dad29411f4947fb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO9578.exe

    Filesize

    470KB

    MD5

    606b84e1ba58e6040d74e15b4ceb77b5

    SHA1

    ebac3e42051e8c6a680840197bfcef85d97d8ce8

    SHA256

    d2830ccbd414cf0980e79a94ec64d21a79d8837927fc045e4d91c66192b193e0

    SHA512

    229d4ee7f4f54d9919c69240bffb2026b16e6933d91d47f9c8260d20811dffcb4072c6f152da560ac1191994cead49af19706eef19db30747dad29411f4947fb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it894986.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it894986.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr232599.exe

    Filesize

    486KB

    MD5

    04872ec608ba6a2fcac65f869d1fd1f2

    SHA1

    7addffdcc90cffbe13577cb8d3f62e8c7bf2dd9c

    SHA256

    5d0fd5630203d0c174e1fb630d3dae9b09ac07e408efd450ce13508f314c40d2

    SHA512

    36817118dbfeaf0b6651e27a8478be3be4b82bc930ebc80abb6754ac83e13cc5f2be2b5c620eb68c2ed71c0ea83d50e86908c58f0f118948929c6e7d007166b7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr232599.exe

    Filesize

    486KB

    MD5

    04872ec608ba6a2fcac65f869d1fd1f2

    SHA1

    7addffdcc90cffbe13577cb8d3f62e8c7bf2dd9c

    SHA256

    5d0fd5630203d0c174e1fb630d3dae9b09ac07e408efd450ce13508f314c40d2

    SHA512

    36817118dbfeaf0b6651e27a8478be3be4b82bc930ebc80abb6754ac83e13cc5f2be2b5c620eb68c2ed71c0ea83d50e86908c58f0f118948929c6e7d007166b7

  • memory/3976-967-0x00000000073B0000-0x00000000073FB000-memory.dmp

    Filesize

    300KB

  • memory/3976-966-0x00000000005F0000-0x0000000000618000-memory.dmp

    Filesize

    160KB

  • memory/3976-968-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4332-142-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/4688-974-0x0000000000810000-0x0000000000845000-memory.dmp

    Filesize

    212KB

  • memory/4788-182-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-202-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-157-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-155-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-159-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-161-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-165-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-168-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4788-167-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-163-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-170-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4788-172-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-171-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4788-176-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-174-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-180-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-178-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-152-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-184-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-188-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-186-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-190-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-192-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-194-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-198-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-200-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-196-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-153-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-212-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-210-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-208-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-206-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-204-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-216-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-214-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-218-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/4788-947-0x0000000007ED0000-0x00000000084D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4788-948-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

    Filesize

    72KB

  • memory/4788-949-0x00000000078C0000-0x00000000079CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4788-950-0x00000000079D0000-0x0000000007A0E000-memory.dmp

    Filesize

    248KB

  • memory/4788-951-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4788-952-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4788-953-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/4788-954-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4788-955-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/4788-151-0x0000000004DC0000-0x0000000004DFA000-memory.dmp

    Filesize

    232KB

  • memory/4788-150-0x0000000004F40000-0x000000000543E000-memory.dmp

    Filesize

    5.0MB

  • memory/4788-149-0x00000000024A0000-0x00000000024DC000-memory.dmp

    Filesize

    240KB

  • memory/4788-148-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/4788-956-0x0000000008A90000-0x0000000008B06000-memory.dmp

    Filesize

    472KB

  • memory/4788-957-0x0000000008B40000-0x0000000008B5E000-memory.dmp

    Filesize

    120KB

  • memory/4788-959-0x0000000008EC0000-0x0000000009082000-memory.dmp

    Filesize

    1.8MB

  • memory/4788-960-0x0000000009090000-0x00000000095BC000-memory.dmp

    Filesize

    5.2MB