Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 19:42

General

  • Target

    336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe

  • Size

    827KB

  • MD5

    107837646e29c57d42ad08401c27a9f8

  • SHA1

    fb487821c3b61b106b6c0400f1fe2c7dcf2e3cc7

  • SHA256

    336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e

  • SHA512

    ceb9af7fb686569deaf878ddb975d9c1fabe862d335784baf8fb74911b008f44db4758e8a8cbf1d241ce2c5d952ccd53d48d7922dea60f5cc9d30f435104dbef

  • SSDEEP

    24576:/ykT01c8GI6J2+C4ily6rxFanYKCdkC0vP:K8YON2+Ilh1Y1CdkC0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe
    "C:\Users\Admin\AppData\Local\Temp\336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exe
      2⤵
      • Executes dropped EXE
      PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 620
        3⤵
        • Program crash
        PID:1548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 700
        3⤵
        • Program crash
        PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 840
        3⤵
        • Program crash
        PID:2344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 828
        3⤵
        • Program crash
        PID:2688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 876
        3⤵
        • Program crash
        PID:1008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 924
        3⤵
        • Program crash
        PID:4960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 1084
        3⤵
        • Program crash
        PID:448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exe

    Filesize

    256KB

    MD5

    239b363b76feae91bec4c1e21e9bbf26

    SHA1

    8f046cc07a11d45423e00cf7ac68c8925c0b1f45

    SHA256

    8ca23ab8b93690d7ebec564585c8550f828bec2ca9b162f36c8c66733c33984c

    SHA512

    67d3586ae4bcaf74fe8367321255ba63b29a16172458ee0c69022c879519ca27e698cf46f495de8104e47422b6a3f87e43ca9f206baba7876a288a831aeab15f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exe

    Filesize

    256KB

    MD5

    239b363b76feae91bec4c1e21e9bbf26

    SHA1

    8f046cc07a11d45423e00cf7ac68c8925c0b1f45

    SHA256

    8ca23ab8b93690d7ebec564585c8550f828bec2ca9b162f36c8c66733c33984c

    SHA512

    67d3586ae4bcaf74fe8367321255ba63b29a16172458ee0c69022c879519ca27e698cf46f495de8104e47422b6a3f87e43ca9f206baba7876a288a831aeab15f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exe

    Filesize

    569KB

    MD5

    b75bf00bad8660c367459cb100fe63c5

    SHA1

    31a0a73e659d5aafde62940cf12ade97b9b80f4d

    SHA256

    454c954a569e50f8f9c5fba73864589ace400faaf76847a33af8f8d23caa17f8

    SHA512

    21ba703bd734fe4dd27be2cc09822455fc92f5c83047b6cdbd5d045875cfd3a19d18f8630f0cc7e071bcb3547332fd13c3656aebe38bfc63c0e2ff16f8ec8005

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exe

    Filesize

    569KB

    MD5

    b75bf00bad8660c367459cb100fe63c5

    SHA1

    31a0a73e659d5aafde62940cf12ade97b9b80f4d

    SHA256

    454c954a569e50f8f9c5fba73864589ace400faaf76847a33af8f8d23caa17f8

    SHA512

    21ba703bd734fe4dd27be2cc09822455fc92f5c83047b6cdbd5d045875cfd3a19d18f8630f0cc7e071bcb3547332fd13c3656aebe38bfc63c0e2ff16f8ec8005

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exe

    Filesize

    415KB

    MD5

    5556aaee77680e1a97702074dc6feb08

    SHA1

    3d823fc065e5d3b1199682bef58b7e1305d38558

    SHA256

    c9c7298630db257e763099089821369972712cba1c03ebab656a54e5e0f8b325

    SHA512

    c36408c237740563a28a3d6d6c627977334020bc06bf8f756985c23b403608bfcc729c1fcb33d057972efe65a634e78499151472603ceaab78415799cdf250e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exe

    Filesize

    415KB

    MD5

    5556aaee77680e1a97702074dc6feb08

    SHA1

    3d823fc065e5d3b1199682bef58b7e1305d38558

    SHA256

    c9c7298630db257e763099089821369972712cba1c03ebab656a54e5e0f8b325

    SHA512

    c36408c237740563a28a3d6d6c627977334020bc06bf8f756985c23b403608bfcc729c1fcb33d057972efe65a634e78499151472603ceaab78415799cdf250e2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exe

    Filesize

    360KB

    MD5

    cccc4f5b898d768340bb1bd81d80df6a

    SHA1

    3130a913c4784ee2c244ab1c90e8630a753a7b8a

    SHA256

    3308d97cb7292c34daa3cf62345c4af02da264fe43925efe4e4be9cea565bab5

    SHA512

    458c262b2c4b2f32d5b763073639aaaf354a2492431ccc98cda0d9f764ed5d452f71e03361fa53b172734b55a9543f99b3d8f0ee309f4e878aae0a05aa41e299

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exe

    Filesize

    360KB

    MD5

    cccc4f5b898d768340bb1bd81d80df6a

    SHA1

    3130a913c4784ee2c244ab1c90e8630a753a7b8a

    SHA256

    3308d97cb7292c34daa3cf62345c4af02da264fe43925efe4e4be9cea565bab5

    SHA512

    458c262b2c4b2f32d5b763073639aaaf354a2492431ccc98cda0d9f764ed5d452f71e03361fa53b172734b55a9543f99b3d8f0ee309f4e878aae0a05aa41e299

  • memory/1460-966-0x0000000007B50000-0x0000000007B9B000-memory.dmp

    Filesize

    300KB

  • memory/1460-965-0x0000000000DC0000-0x0000000000DE8000-memory.dmp

    Filesize

    160KB

  • memory/1460-967-0x0000000007B40000-0x0000000007B50000-memory.dmp

    Filesize

    64KB

  • memory/2344-142-0x00000000009A0000-0x00000000009AA000-memory.dmp

    Filesize

    40KB

  • memory/2596-182-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-202-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-153-0x0000000007120000-0x000000000715A000-memory.dmp

    Filesize

    232KB

  • memory/2596-154-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/2596-155-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-156-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-158-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-160-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-162-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-164-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-166-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-168-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-172-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-170-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-174-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-176-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-178-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-180-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-151-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/2596-184-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-186-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-188-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-190-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-192-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-194-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-196-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-198-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-152-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/2596-200-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-204-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-206-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-208-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-210-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-212-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-214-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-216-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-218-0x0000000007120000-0x0000000007155000-memory.dmp

    Filesize

    212KB

  • memory/2596-947-0x0000000009B70000-0x000000000A176000-memory.dmp

    Filesize

    6.0MB

  • memory/2596-948-0x000000000A200000-0x000000000A212000-memory.dmp

    Filesize

    72KB

  • memory/2596-949-0x000000000A230000-0x000000000A33A000-memory.dmp

    Filesize

    1.0MB

  • memory/2596-950-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/2596-951-0x000000000A3D0000-0x000000000A41B000-memory.dmp

    Filesize

    300KB

  • memory/2596-952-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/2596-953-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/2596-954-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/2596-955-0x000000000ADC0000-0x000000000AE36000-memory.dmp

    Filesize

    472KB

  • memory/2596-150-0x0000000002DC0000-0x0000000002E06000-memory.dmp

    Filesize

    280KB

  • memory/2596-149-0x00000000072F0000-0x00000000077EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2596-148-0x0000000004960000-0x000000000499C000-memory.dmp

    Filesize

    240KB

  • memory/2596-956-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/2596-957-0x000000000AF50000-0x000000000B112000-memory.dmp

    Filesize

    1.8MB

  • memory/2596-958-0x000000000B120000-0x000000000B64C000-memory.dmp

    Filesize

    5.2MB

  • memory/2596-959-0x0000000004AD0000-0x0000000004B20000-memory.dmp

    Filesize

    320KB

  • memory/4064-973-0x0000000002BA0000-0x0000000002BD5000-memory.dmp

    Filesize

    212KB