Analysis

  • max time kernel
    145s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 21:34

General

  • Target

    1dda685060ba5e4490dfdb3affec037de51d403be832ae32ba9094d083dd09db.exe

  • Size

    1.0MB

  • MD5

    6694306182cf78396294127faf6a0c4c

  • SHA1

    f3d4c49a43c59fa77fd798375609f9c1fccc1851

  • SHA256

    1dda685060ba5e4490dfdb3affec037de51d403be832ae32ba9094d083dd09db

  • SHA512

    3238be5498c2324fbb424ac64b182190fceb938a6edf769c01e33510c0e8117732b12766f340c3822ffd150bd437741bc4d49ae543d5db5937b88289b6359183

  • SSDEEP

    24576:eyZI9o0vzwM8t8y7nXTwH1eN4sqSdDtFK1xr2x7jERI02UYJc+fGPP:t+fvF8asnXcQ93Ir2x7jERI02UYJTG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dda685060ba5e4490dfdb3affec037de51d403be832ae32ba9094d083dd09db.exe
    "C:\Users\Admin\AppData\Local\Temp\1dda685060ba5e4490dfdb3affec037de51d403be832ae32ba9094d083dd09db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165502.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165502.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239648.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239648.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr573106.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr573106.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:68
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137138.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137138.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk992166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk992166.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820619.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820619.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:4416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 620
        3⤵
        • Program crash
        PID:948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 700
        3⤵
        • Program crash
        PID:1956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 840
        3⤵
        • Program crash
        PID:2192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 848
        3⤵
        • Program crash
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 876
        3⤵
        • Program crash
        PID:1336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 852
        3⤵
        • Program crash
        PID:1312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1120
        3⤵
        • Program crash
        PID:4468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1152
        3⤵
        • Program crash
        PID:3756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1136
        3⤵
        • Program crash
        PID:3704

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820619.exe

          Filesize

          367KB

          MD5

          90402ba064ea93cf96301c6db20cc947

          SHA1

          ed445eaa377c389f81ad6796a7217c5fd9537fa4

          SHA256

          1cda672c638ab443f7ed744b8579e3b88826e81d3963c3190908a27a1c685df9

          SHA512

          f270547b177be8a478b04f7c46ccb95026605c415f50cae11c5c4d9c70271cb10936ae269d15c18904fb511aa177f1c0f961dcb1fa14c98efac5719b3a446603

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820619.exe

          Filesize

          367KB

          MD5

          90402ba064ea93cf96301c6db20cc947

          SHA1

          ed445eaa377c389f81ad6796a7217c5fd9537fa4

          SHA256

          1cda672c638ab443f7ed744b8579e3b88826e81d3963c3190908a27a1c685df9

          SHA512

          f270547b177be8a478b04f7c46ccb95026605c415f50cae11c5c4d9c70271cb10936ae269d15c18904fb511aa177f1c0f961dcb1fa14c98efac5719b3a446603

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165502.exe

          Filesize

          749KB

          MD5

          1f995072ddd40f35bdee6f37be800fec

          SHA1

          4e9b4687d7aae07a82700269f9d5e77138f6cfc0

          SHA256

          49e48aaa959a980ef9abc5be8e6de626dace480006e7965d14eed36e18d31047

          SHA512

          6e2732177e301d1d91402e347a2e0b15f25d3834ad27af6314fb3c6a25062dedf518e12ba0477813d5b52e7f07092632b801758f640e0704e3579f965604335e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165502.exe

          Filesize

          749KB

          MD5

          1f995072ddd40f35bdee6f37be800fec

          SHA1

          4e9b4687d7aae07a82700269f9d5e77138f6cfc0

          SHA256

          49e48aaa959a980ef9abc5be8e6de626dace480006e7965d14eed36e18d31047

          SHA512

          6e2732177e301d1d91402e347a2e0b15f25d3834ad27af6314fb3c6a25062dedf518e12ba0477813d5b52e7f07092632b801758f640e0704e3579f965604335e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk992166.exe

          Filesize

          136KB

          MD5

          ac0ffc4fceebe7be421ae8fc8517d1bf

          SHA1

          fa6a6f1878e561b5401ae36422add3d34cfdf6dd

          SHA256

          fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

          SHA512

          23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk992166.exe

          Filesize

          136KB

          MD5

          ac0ffc4fceebe7be421ae8fc8517d1bf

          SHA1

          fa6a6f1878e561b5401ae36422add3d34cfdf6dd

          SHA256

          fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

          SHA512

          23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239648.exe

          Filesize

          595KB

          MD5

          1cc3de5bf3da58ed461beaee2ee3290f

          SHA1

          fdbf17e8fb164fe9758f9e802d7ae1decb26aab3

          SHA256

          d6284e838d9bf78853a8d551244bea1ce86366ec7dd1022846b194d6b8f1d64d

          SHA512

          cd2a1128e85f6afe5db5fe9dcb0d3325ab58b8a45f62f56200425d65d0a57ddf653206d8ffa7e69000a62e9c9a19e2957871ee65454692fcca7576371aae4604

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239648.exe

          Filesize

          595KB

          MD5

          1cc3de5bf3da58ed461beaee2ee3290f

          SHA1

          fdbf17e8fb164fe9758f9e802d7ae1decb26aab3

          SHA256

          d6284e838d9bf78853a8d551244bea1ce86366ec7dd1022846b194d6b8f1d64d

          SHA512

          cd2a1128e85f6afe5db5fe9dcb0d3325ab58b8a45f62f56200425d65d0a57ddf653206d8ffa7e69000a62e9c9a19e2957871ee65454692fcca7576371aae4604

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr573106.exe

          Filesize

          389KB

          MD5

          b32ff044fad42525306abe3067377b4c

          SHA1

          e13e4c0b8f80b47b8ed3ef419b75849e91661f00

          SHA256

          be69b3fa0455228ecc2a50335c31f61f772d428e1c451c9a7bb2b2dc8cd348d2

          SHA512

          3d1b9fc15459fe28dca94a57309826e759c94341dbdf50027eab89781c2458c2d0d43a21668de98c9b327e541787620a46ab3aaf5847d8208424a25099a0b54a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr573106.exe

          Filesize

          389KB

          MD5

          b32ff044fad42525306abe3067377b4c

          SHA1

          e13e4c0b8f80b47b8ed3ef419b75849e91661f00

          SHA256

          be69b3fa0455228ecc2a50335c31f61f772d428e1c451c9a7bb2b2dc8cd348d2

          SHA512

          3d1b9fc15459fe28dca94a57309826e759c94341dbdf50027eab89781c2458c2d0d43a21668de98c9b327e541787620a46ab3aaf5847d8208424a25099a0b54a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137138.exe

          Filesize

          472KB

          MD5

          c366f5a2359fe8ad87ef098fdb8feaa5

          SHA1

          71c7fefae6547f768a6fb9d028231c7b46852cb0

          SHA256

          56fbbae06e33b76d55248eabc55abee91380e7e929d0b251a50488d0853ca616

          SHA512

          3de715abeec1cdd5ba6a6975317d3e7aa9db9473b6eb4a7463b6590416b0c61c470d14025a9d4000e0ee3ea2ef1264e4a9ff43567cb3dd2148a0f11314052301

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137138.exe

          Filesize

          472KB

          MD5

          c366f5a2359fe8ad87ef098fdb8feaa5

          SHA1

          71c7fefae6547f768a6fb9d028231c7b46852cb0

          SHA256

          56fbbae06e33b76d55248eabc55abee91380e7e929d0b251a50488d0853ca616

          SHA512

          3de715abeec1cdd5ba6a6975317d3e7aa9db9473b6eb4a7463b6590416b0c61c470d14025a9d4000e0ee3ea2ef1264e4a9ff43567cb3dd2148a0f11314052301

        • memory/68-152-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-176-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-143-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-144-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-146-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-150-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-148-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-153-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/68-155-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-157-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-156-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-159-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-161-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-163-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-165-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-167-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-169-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-171-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-173-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/68-174-0x0000000000400000-0x0000000000806000-memory.dmp

          Filesize

          4.0MB

        • memory/68-175-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-142-0x0000000004D30000-0x0000000004D48000-memory.dmp

          Filesize

          96KB

        • memory/68-177-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/68-179-0x0000000000400000-0x0000000000806000-memory.dmp

          Filesize

          4.0MB

        • memory/68-140-0x0000000002640000-0x000000000265A000-memory.dmp

          Filesize

          104KB

        • memory/68-141-0x0000000004D70000-0x000000000526E000-memory.dmp

          Filesize

          5.0MB

        • memory/1480-999-0x0000000000480000-0x00000000004A8000-memory.dmp

          Filesize

          160KB

        • memory/1480-1000-0x0000000007200000-0x000000000724B000-memory.dmp

          Filesize

          300KB

        • memory/1480-1001-0x0000000007550000-0x0000000007560000-memory.dmp

          Filesize

          64KB

        • memory/3000-184-0x0000000002600000-0x000000000263C000-memory.dmp

          Filesize

          240KB

        • memory/3000-191-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-193-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-195-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-197-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-199-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-201-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-203-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-205-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-207-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-209-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-211-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-213-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-215-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-217-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-219-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-568-0x0000000000820000-0x0000000000866000-memory.dmp

          Filesize

          280KB

        • memory/3000-572-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

          Filesize

          64KB

        • memory/3000-569-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

          Filesize

          64KB

        • memory/3000-981-0x0000000007E40000-0x0000000008446000-memory.dmp

          Filesize

          6.0MB

        • memory/3000-982-0x0000000007850000-0x0000000007862000-memory.dmp

          Filesize

          72KB

        • memory/3000-983-0x0000000007880000-0x000000000798A000-memory.dmp

          Filesize

          1.0MB

        • memory/3000-984-0x00000000079A0000-0x00000000079DE000-memory.dmp

          Filesize

          248KB

        • memory/3000-985-0x0000000007A20000-0x0000000007A6B000-memory.dmp

          Filesize

          300KB

        • memory/3000-986-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

          Filesize

          64KB

        • memory/3000-987-0x0000000007CB0000-0x0000000007D16000-memory.dmp

          Filesize

          408KB

        • memory/3000-988-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/3000-989-0x0000000008B20000-0x0000000008B96000-memory.dmp

          Filesize

          472KB

        • memory/3000-990-0x0000000008BE0000-0x0000000008BFE000-memory.dmp

          Filesize

          120KB

        • memory/3000-189-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-187-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-186-0x0000000004D90000-0x0000000004DC5000-memory.dmp

          Filesize

          212KB

        • memory/3000-185-0x0000000004D90000-0x0000000004DCA000-memory.dmp

          Filesize

          232KB

        • memory/3000-991-0x0000000008CC0000-0x0000000008E82000-memory.dmp

          Filesize

          1.8MB

        • memory/3000-992-0x0000000008E90000-0x00000000093BC000-memory.dmp

          Filesize

          5.2MB

        • memory/3000-993-0x0000000002750000-0x00000000027A0000-memory.dmp

          Filesize

          320KB

        • memory/4416-1007-0x0000000000800000-0x0000000000835000-memory.dmp

          Filesize

          212KB