Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 09:30

General

  • Target

    2255876c88109366d7633d97b39098141d449087ba3ba249c69703a9bf8b327d.exe

  • Size

    828KB

  • MD5

    ac156971e3ec1350d3153ac64b23dad9

  • SHA1

    667d27281f97e3d893aa1fae58538cba1d8902c9

  • SHA256

    2255876c88109366d7633d97b39098141d449087ba3ba249c69703a9bf8b327d

  • SHA512

    7708626d607fb11361c284bc363688b23deedfc40a344f5e5d0d15c80c8c0aa8f61341858ed3e70eac9ab2ab416840151883965ca4e6428d99981fa5eda76a2d

  • SSDEEP

    12288:hy90MUZvsMxoOLIeOsvllRabsmpwdYaMjzo7GZfdcXcFdo+zzyqX5YMOLe:hyfivsM3Hd6smaMOGZfK2dR+g6Le

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2255876c88109366d7633d97b39098141d449087ba3ba249c69703a9bf8b327d.exe
    "C:\Users\Admin\AppData\Local\Temp\2255876c88109366d7633d97b39098141d449087ba3ba249c69703a9bf8b327d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLs9229.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLs9229.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFb8785.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFb8785.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it222854.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it222854.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr800658.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr800658.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959970.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959970.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944508.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944508.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 644
        3⤵
        • Program crash
        PID:5096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 720
        3⤵
        • Program crash
        PID:4216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 780
        3⤵
        • Program crash
        PID:4240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 856
        3⤵
        • Program crash
        PID:3988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 884
        3⤵
        • Program crash
        PID:3636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 748
        3⤵
        • Program crash
        PID:3860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1128
        3⤵
        • Program crash
        PID:3520
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1204
        3⤵
        • Program crash
        PID:1976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1164
        3⤵
        • Program crash
        PID:2604

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944508.exe

          Filesize

          256KB

          MD5

          1955f98a1e7601bbfafc8ee827ab44af

          SHA1

          f9e6760c82b08be2189116532132849918cd8235

          SHA256

          3b6f9e16abd21eb5ecf0aaab0ef08bc2233458a29560b8ea45da1868a5ef3204

          SHA512

          5b8a97e18d5135948a113dada6205ceb744161e15bc803ce19c7bb68e7af4fb651c5e01febf88c0e0b842f35bd68d0c2281d4151c0ef8fb1c6b82f2ad6b8a75d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944508.exe

          Filesize

          256KB

          MD5

          1955f98a1e7601bbfafc8ee827ab44af

          SHA1

          f9e6760c82b08be2189116532132849918cd8235

          SHA256

          3b6f9e16abd21eb5ecf0aaab0ef08bc2233458a29560b8ea45da1868a5ef3204

          SHA512

          5b8a97e18d5135948a113dada6205ceb744161e15bc803ce19c7bb68e7af4fb651c5e01febf88c0e0b842f35bd68d0c2281d4151c0ef8fb1c6b82f2ad6b8a75d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLs9229.exe

          Filesize

          568KB

          MD5

          54e5bb180fb0332a7ba4b5f8b95f0b0b

          SHA1

          18e2b1ea68eda36bb9f1e21cdbac0f0ec8ed2002

          SHA256

          c0f853791724c9b8ed9c702e3527aff5f215a1923c1802c254f37e59a477a2b9

          SHA512

          ecf4a292ba6fecc9e0a5c9974dc0ffae69b400fb470540e260c26268e504569a34737452e932721ecf8be84cafb81fb17dc526cba71a69ebb26e4f42efa5ba12

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLs9229.exe

          Filesize

          568KB

          MD5

          54e5bb180fb0332a7ba4b5f8b95f0b0b

          SHA1

          18e2b1ea68eda36bb9f1e21cdbac0f0ec8ed2002

          SHA256

          c0f853791724c9b8ed9c702e3527aff5f215a1923c1802c254f37e59a477a2b9

          SHA512

          ecf4a292ba6fecc9e0a5c9974dc0ffae69b400fb470540e260c26268e504569a34737452e932721ecf8be84cafb81fb17dc526cba71a69ebb26e4f42efa5ba12

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959970.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959970.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFb8785.exe

          Filesize

          414KB

          MD5

          aeb5f5efe381fb0dee8a9fd07713f5c6

          SHA1

          095bb89d3dad572711da57c9760a4c8630bf1fa0

          SHA256

          15aadcb95b852ca2f659835a00f473910af0fe7688b82a53d5cce032a6a936f6

          SHA512

          f2ef401fa2d978d186fd523c8c3d51845b96c49bdab43671c2b4f7f952baa0afa88738dbef5a724676e9da976a8365970d0f75aed9f6b2d0c6c06d8fc98e995b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFb8785.exe

          Filesize

          414KB

          MD5

          aeb5f5efe381fb0dee8a9fd07713f5c6

          SHA1

          095bb89d3dad572711da57c9760a4c8630bf1fa0

          SHA256

          15aadcb95b852ca2f659835a00f473910af0fe7688b82a53d5cce032a6a936f6

          SHA512

          f2ef401fa2d978d186fd523c8c3d51845b96c49bdab43671c2b4f7f952baa0afa88738dbef5a724676e9da976a8365970d0f75aed9f6b2d0c6c06d8fc98e995b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it222854.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it222854.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr800658.exe

          Filesize

          359KB

          MD5

          a26c602bb221ce9ae2829133b74dab51

          SHA1

          d5db95bdbc3a9559d297c77f02209b1567d698d1

          SHA256

          5af1dab1ef97a04faa7a8bb02ac73b84af47cea3a2c894a99c01792ac3716d0d

          SHA512

          04025ffdb40bd6d1927557ab21e3f36ccad0ecebf972b0452938627230f51bddd936f1f571fdb347ad6edb7db078006c0bb8fce5e267503eef5bdff332af42e4

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr800658.exe

          Filesize

          359KB

          MD5

          a26c602bb221ce9ae2829133b74dab51

          SHA1

          d5db95bdbc3a9559d297c77f02209b1567d698d1

          SHA256

          5af1dab1ef97a04faa7a8bb02ac73b84af47cea3a2c894a99c01792ac3716d0d

          SHA512

          04025ffdb40bd6d1927557ab21e3f36ccad0ecebf972b0452938627230f51bddd936f1f571fdb347ad6edb7db078006c0bb8fce5e267503eef5bdff332af42e4

        • memory/1836-965-0x0000000007DB0000-0x0000000007DFB000-memory.dmp

          Filesize

          300KB

        • memory/1836-964-0x0000000000FF0000-0x0000000001018000-memory.dmp

          Filesize

          160KB

        • memory/1836-966-0x0000000007D20000-0x0000000007D30000-memory.dmp

          Filesize

          64KB

        • memory/2140-139-0x0000000000880000-0x000000000088A000-memory.dmp

          Filesize

          40KB

        • memory/2828-180-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-198-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-150-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2828-151-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-152-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-154-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-156-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-158-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-160-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-162-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-164-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-166-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-168-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-170-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-172-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-174-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-176-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-178-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-148-0x0000000007270000-0x00000000072AA000-memory.dmp

          Filesize

          232KB

        • memory/2828-182-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-184-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-186-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-188-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-190-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-192-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-194-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-196-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-149-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2828-200-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-202-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-204-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-206-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-208-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-210-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-212-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-214-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/2828-943-0x0000000009CC0000-0x000000000A2C6000-memory.dmp

          Filesize

          6.0MB

        • memory/2828-944-0x000000000A340000-0x000000000A352000-memory.dmp

          Filesize

          72KB

        • memory/2828-945-0x000000000A370000-0x000000000A47A000-memory.dmp

          Filesize

          1.0MB

        • memory/2828-946-0x000000000A490000-0x000000000A4CE000-memory.dmp

          Filesize

          248KB

        • memory/2828-947-0x000000000A610000-0x000000000A65B000-memory.dmp

          Filesize

          300KB

        • memory/2828-948-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2828-949-0x000000000A7A0000-0x000000000A806000-memory.dmp

          Filesize

          408KB

        • memory/2828-950-0x000000000AE50000-0x000000000AEE2000-memory.dmp

          Filesize

          584KB

        • memory/2828-952-0x000000000B160000-0x000000000B1D6000-memory.dmp

          Filesize

          472KB

        • memory/2828-953-0x000000000B220000-0x000000000B3E2000-memory.dmp

          Filesize

          1.8MB

        • memory/2828-954-0x000000000B400000-0x000000000B92C000-memory.dmp

          Filesize

          5.2MB

        • memory/2828-147-0x0000000007300000-0x00000000077FE000-memory.dmp

          Filesize

          5.0MB

        • memory/2828-146-0x00000000071F0000-0x000000000722C000-memory.dmp

          Filesize

          240KB

        • memory/2828-145-0x0000000002D30000-0x0000000002D76000-memory.dmp

          Filesize

          280KB

        • memory/2828-955-0x000000000BA50000-0x000000000BA6E000-memory.dmp

          Filesize

          120KB

        • memory/2828-956-0x0000000004BE0000-0x0000000004C30000-memory.dmp

          Filesize

          320KB

        • memory/2828-957-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2828-958-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/3184-972-0x0000000002D10000-0x0000000002D45000-memory.dmp

          Filesize

          212KB