Analysis

  • max time kernel
    146s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 15:06

General

  • Target

    6264fd743cd3cd2eb646292eaf37e093ebabb215f59e6212f80800cd4e8fe236.exe

  • Size

    827KB

  • MD5

    2dbdb469e27bf704d7aa2510a868671a

  • SHA1

    347c364543e776a1367167dcaeda6295a02c070a

  • SHA256

    6264fd743cd3cd2eb646292eaf37e093ebabb215f59e6212f80800cd4e8fe236

  • SHA512

    06c7cd9340e8bde6a4ab54915456a3a048eacd824aa5a93c1270a962f96777467f6edf1eaec042ef4fc01d19f1698d452932f0e8f1b78d95a0c2965caa9c2ffe

  • SSDEEP

    24576:Ey1/+Lsw+qNj3w+eS7TEWmr/QegYTsXj:T12LsxqNU9S7Tu/hHTs

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6264fd743cd3cd2eb646292eaf37e093ebabb215f59e6212f80800cd4e8fe236.exe
    "C:\Users\Admin\AppData\Local\Temp\6264fd743cd3cd2eb646292eaf37e093ebabb215f59e6212f80800cd4e8fe236.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMD7001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMD7001.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifA1438.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifA1438.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it455980.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it455980.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr532168.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr532168.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858212.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858212.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973483.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973483.exe
      2⤵
      • Executes dropped EXE
      PID:3996
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 648
        3⤵
        • Program crash
        PID:3804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 712
        3⤵
        • Program crash
        PID:3952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 840
        3⤵
        • Program crash
        PID:4024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 828
        3⤵
        • Program crash
        PID:4664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 876
        3⤵
        • Program crash
        PID:3660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 840
        3⤵
        • Program crash
        PID:1084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1084
        3⤵
        • Program crash
        PID:2180

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973483.exe

          Filesize

          256KB

          MD5

          2a3a26bcc3bbf7851e7b3a693a0d9cbb

          SHA1

          2e4570b32163feca47b460a51dc63707b6829cc4

          SHA256

          a67e9503e556d62e63b44aef0a1b6fbd910062465dfa18715e2bbe977b59a1cb

          SHA512

          853a6802197e66de18d9780f8a0ce6d148243dfec7f6008b56bcf5013c44e8165903dd57461dfe8fbe1a863f09355d98ffe68d5db285c6edb25351f2557966df

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973483.exe

          Filesize

          256KB

          MD5

          2a3a26bcc3bbf7851e7b3a693a0d9cbb

          SHA1

          2e4570b32163feca47b460a51dc63707b6829cc4

          SHA256

          a67e9503e556d62e63b44aef0a1b6fbd910062465dfa18715e2bbe977b59a1cb

          SHA512

          853a6802197e66de18d9780f8a0ce6d148243dfec7f6008b56bcf5013c44e8165903dd57461dfe8fbe1a863f09355d98ffe68d5db285c6edb25351f2557966df

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMD7001.exe

          Filesize

          569KB

          MD5

          54d9518246917a7ed2f0ca94c99132f7

          SHA1

          a0bd6cc45176379d417b9216cc1f18d5acf90779

          SHA256

          1c44bbb1e776ed7bafbfc5e51ba96f647e358a449f00da27a09d05cdf88ea7e7

          SHA512

          45670da9dc2d2c554c1200726a5d537aff6ef3cb20736f0ea36148bee6c613444e2644f097906784d950b562e83a82326c1e560556e62c04be179c088bf7a5ac

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMD7001.exe

          Filesize

          569KB

          MD5

          54d9518246917a7ed2f0ca94c99132f7

          SHA1

          a0bd6cc45176379d417b9216cc1f18d5acf90779

          SHA256

          1c44bbb1e776ed7bafbfc5e51ba96f647e358a449f00da27a09d05cdf88ea7e7

          SHA512

          45670da9dc2d2c554c1200726a5d537aff6ef3cb20736f0ea36148bee6c613444e2644f097906784d950b562e83a82326c1e560556e62c04be179c088bf7a5ac

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858212.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858212.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifA1438.exe

          Filesize

          415KB

          MD5

          6a50d5b4fa87f73f208252ab2793d71b

          SHA1

          aac75f85ade6803c864e8f40152e1f0e8f34927e

          SHA256

          ec330abe022a641b3b9aa5da49a2b233be980ee8217350c3b03d76e35e5f6e86

          SHA512

          ff5dc87489555386dfae0973971bfb5ada2447c55a378dfd345cc064451b6392f5ea8dcb03ca52854ec6bd13b92119586fd3d07d4043afb14ce54e8442160784

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifA1438.exe

          Filesize

          415KB

          MD5

          6a50d5b4fa87f73f208252ab2793d71b

          SHA1

          aac75f85ade6803c864e8f40152e1f0e8f34927e

          SHA256

          ec330abe022a641b3b9aa5da49a2b233be980ee8217350c3b03d76e35e5f6e86

          SHA512

          ff5dc87489555386dfae0973971bfb5ada2447c55a378dfd345cc064451b6392f5ea8dcb03ca52854ec6bd13b92119586fd3d07d4043afb14ce54e8442160784

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it455980.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it455980.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr532168.exe

          Filesize

          360KB

          MD5

          e5636689291ef06b1dda68e7e000a0b4

          SHA1

          f6535d2c2bea8862e5c247d18c0cdb74a4d52d29

          SHA256

          1e11d3f93eff7611210179ca3b996627f51c8a70ff4d8d6d3d41a482cadb25c6

          SHA512

          878805ba6c2c467d596af86a113a501c9a7ca7d04f0c19a8c3287a7b4c010abf94f34804bbfc5b34044dd62f775c421d7bbcb4a57388e6adfd9315f9c3167e60

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr532168.exe

          Filesize

          360KB

          MD5

          e5636689291ef06b1dda68e7e000a0b4

          SHA1

          f6535d2c2bea8862e5c247d18c0cdb74a4d52d29

          SHA256

          1e11d3f93eff7611210179ca3b996627f51c8a70ff4d8d6d3d41a482cadb25c6

          SHA512

          878805ba6c2c467d596af86a113a501c9a7ca7d04f0c19a8c3287a7b4c010abf94f34804bbfc5b34044dd62f775c421d7bbcb4a57388e6adfd9315f9c3167e60

        • memory/2332-966-0x0000000007BF0000-0x0000000007C3B000-memory.dmp

          Filesize

          300KB

        • memory/2332-965-0x0000000000E70000-0x0000000000E98000-memory.dmp

          Filesize

          160KB

        • memory/2332-967-0x0000000007C50000-0x0000000007C60000-memory.dmp

          Filesize

          64KB

        • memory/3996-973-0x0000000002CE0000-0x0000000002D15000-memory.dmp

          Filesize

          212KB

        • memory/4324-184-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-202-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-154-0x00000000073F0000-0x0000000007400000-memory.dmp

          Filesize

          64KB

        • memory/4324-155-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-156-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-158-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-160-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-162-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-166-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-164-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-168-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-170-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-172-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-174-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-176-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-178-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-180-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-182-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-153-0x00000000073F0000-0x0000000007400000-memory.dmp

          Filesize

          64KB

        • memory/4324-186-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-188-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-190-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-192-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-194-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-196-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-198-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-200-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-152-0x00000000073F0000-0x0000000007400000-memory.dmp

          Filesize

          64KB

        • memory/4324-204-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-206-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-208-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-210-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-212-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-214-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-216-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-218-0x0000000007270000-0x00000000072A5000-memory.dmp

          Filesize

          212KB

        • memory/4324-947-0x000000000A390000-0x000000000A996000-memory.dmp

          Filesize

          6.0MB

        • memory/4324-948-0x00000000073B0000-0x00000000073C2000-memory.dmp

          Filesize

          72KB

        • memory/4324-949-0x0000000009D80000-0x0000000009E8A000-memory.dmp

          Filesize

          1.0MB

        • memory/4324-950-0x0000000009E90000-0x0000000009ECE000-memory.dmp

          Filesize

          248KB

        • memory/4324-951-0x000000000A010000-0x000000000A05B000-memory.dmp

          Filesize

          300KB

        • memory/4324-952-0x00000000073F0000-0x0000000007400000-memory.dmp

          Filesize

          64KB

        • memory/4324-953-0x000000000A1A0000-0x000000000A206000-memory.dmp

          Filesize

          408KB

        • memory/4324-954-0x000000000AE60000-0x000000000AEF2000-memory.dmp

          Filesize

          584KB

        • memory/4324-955-0x000000000AF10000-0x000000000AF86000-memory.dmp

          Filesize

          472KB

        • memory/4324-151-0x0000000002CE0000-0x0000000002D26000-memory.dmp

          Filesize

          280KB

        • memory/4324-150-0x0000000007270000-0x00000000072AA000-memory.dmp

          Filesize

          232KB

        • memory/4324-149-0x0000000007400000-0x00000000078FE000-memory.dmp

          Filesize

          5.0MB

        • memory/4324-148-0x0000000004CD0000-0x0000000004D0C000-memory.dmp

          Filesize

          240KB

        • memory/4324-956-0x000000000AFD0000-0x000000000AFEE000-memory.dmp

          Filesize

          120KB

        • memory/4324-957-0x000000000B1A0000-0x000000000B362000-memory.dmp

          Filesize

          1.8MB

        • memory/4324-958-0x000000000B370000-0x000000000B89C000-memory.dmp

          Filesize

          5.2MB

        • memory/4324-959-0x0000000006D20000-0x0000000006D70000-memory.dmp

          Filesize

          320KB

        • memory/5020-142-0x0000000000BF0000-0x0000000000BFA000-memory.dmp

          Filesize

          40KB