Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 04:17

General

  • Target

    3901f2f410e517d6a06875a9a99f5eee28f57c93c9fde455cc8824f44257ee64.exe

  • Size

    828KB

  • MD5

    eb234fb02acda7271a11bc1da7e4b0fd

  • SHA1

    87c8ed9295be465fd007c114c4f30ce17747e848

  • SHA256

    3901f2f410e517d6a06875a9a99f5eee28f57c93c9fde455cc8824f44257ee64

  • SHA512

    f8a154a465305ca575201545f6d71b79cc0df031497acc136098cd932365a7522bb970737a3edf13c595320ffcc387612d07cc011fda70d583c0255772d4db9b

  • SSDEEP

    12288:7y90RNonn+DncG12mgFC7ENTxJpN65hdhGAteax7lh8NZP0qC28UjnBoSZzC+k9Q:7yN+hcmmC2TbeMyeax7lIhbUU76SB8Q

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3901f2f410e517d6a06875a9a99f5eee28f57c93c9fde455cc8824f44257ee64.exe
    "C:\Users\Admin\AppData\Local\Temp\3901f2f410e517d6a06875a9a99f5eee28f57c93c9fde455cc8824f44257ee64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizo0694.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizo0694.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQR9754.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQR9754.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417803.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417803.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr476617.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr476617.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp140235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp140235.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr964167.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr964167.exe
      2⤵
      • Executes dropped EXE
      PID:3328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 620
        3⤵
        • Program crash
        PID:3020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 700
        3⤵
        • Program crash
        PID:2432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 840
        3⤵
        • Program crash
        PID:3968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 848
        3⤵
        • Program crash
        PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 884
        3⤵
        • Program crash
        PID:3820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 856
        3⤵
        • Program crash
        PID:2164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1124
        3⤵
        • Program crash
        PID:2052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1172
        3⤵
        • Program crash
        PID:3308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1088
        3⤵
        • Program crash
        PID:1880

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr964167.exe

          Filesize

          256KB

          MD5

          5da5e3978e79a56a69f46b17cdfcdec9

          SHA1

          9064c05c74ee99054a5a679aad7fdd26b217b4af

          SHA256

          6f4f9018ccfc1049d513be402dfe0cac4708eac717978bf2a23fef7f5846dba7

          SHA512

          ae97c58c7e2aaad2be45fb7a4fcd1e0d45f101357d9ce6de279529892841d7ef24ae1b83755dd848ee28938fc1f4b7e370e4875d9b574905eaab89bcffa4f271

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr964167.exe

          Filesize

          256KB

          MD5

          5da5e3978e79a56a69f46b17cdfcdec9

          SHA1

          9064c05c74ee99054a5a679aad7fdd26b217b4af

          SHA256

          6f4f9018ccfc1049d513be402dfe0cac4708eac717978bf2a23fef7f5846dba7

          SHA512

          ae97c58c7e2aaad2be45fb7a4fcd1e0d45f101357d9ce6de279529892841d7ef24ae1b83755dd848ee28938fc1f4b7e370e4875d9b574905eaab89bcffa4f271

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizo0694.exe

          Filesize

          569KB

          MD5

          dd0d8f64ff1abd8885939fa0c3169d0b

          SHA1

          936dc170c1d608ec69bb5e6c72fcf025826c32ef

          SHA256

          5c443e5f1cffce36c30143db498e765bd3eb2a06b1b719adcdd2e217fb09f3e3

          SHA512

          734c7456975df25fd113215a54f37d59cdda42d90066c2cc10a5514a8042db5bc4c5f684a89a25213e2524a9ffd4d850b0699c08c2c693abe9070090fce7032c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizo0694.exe

          Filesize

          569KB

          MD5

          dd0d8f64ff1abd8885939fa0c3169d0b

          SHA1

          936dc170c1d608ec69bb5e6c72fcf025826c32ef

          SHA256

          5c443e5f1cffce36c30143db498e765bd3eb2a06b1b719adcdd2e217fb09f3e3

          SHA512

          734c7456975df25fd113215a54f37d59cdda42d90066c2cc10a5514a8042db5bc4c5f684a89a25213e2524a9ffd4d850b0699c08c2c693abe9070090fce7032c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp140235.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp140235.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQR9754.exe

          Filesize

          415KB

          MD5

          4f3115bbb71126b8748203e2b97cabb7

          SHA1

          ab91b70e77af0469e592895bc3f86f1dfbe6a367

          SHA256

          300cf0ebc6d645e397c6fb0f00cdc49edf6039b3b2bbbeea58252e0837d32063

          SHA512

          9f566b41086c62b2052e5cd6aa8c50b7a23a551cd99df6287173d826171572ca4413f0258b1211a98d1660bffef28b522661ed7b6ce02057a7026396595cb443

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQR9754.exe

          Filesize

          415KB

          MD5

          4f3115bbb71126b8748203e2b97cabb7

          SHA1

          ab91b70e77af0469e592895bc3f86f1dfbe6a367

          SHA256

          300cf0ebc6d645e397c6fb0f00cdc49edf6039b3b2bbbeea58252e0837d32063

          SHA512

          9f566b41086c62b2052e5cd6aa8c50b7a23a551cd99df6287173d826171572ca4413f0258b1211a98d1660bffef28b522661ed7b6ce02057a7026396595cb443

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417803.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417803.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr476617.exe

          Filesize

          360KB

          MD5

          fef24c4630978918d47c5786c8501e3d

          SHA1

          817b358fa5482103a7e6935023797d0d4fa2ed41

          SHA256

          2efa06d4e15cc5d446e112343eab154b95a4ab665944766ce67a68633fb9fdf5

          SHA512

          85f96bc852c934ec4815cf284203101b16ce1275295716200568693ecdd8012a2d77d2e5c68163a275a31bc190b570b4428ced103dc4711de8e9a2124c67aeef

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr476617.exe

          Filesize

          360KB

          MD5

          fef24c4630978918d47c5786c8501e3d

          SHA1

          817b358fa5482103a7e6935023797d0d4fa2ed41

          SHA256

          2efa06d4e15cc5d446e112343eab154b95a4ab665944766ce67a68633fb9fdf5

          SHA512

          85f96bc852c934ec4815cf284203101b16ce1275295716200568693ecdd8012a2d77d2e5c68163a275a31bc190b570b4428ced103dc4711de8e9a2124c67aeef

        • memory/2884-142-0x0000000000D50000-0x0000000000D5A000-memory.dmp

          Filesize

          40KB

        • memory/3164-966-0x0000000000AB0000-0x0000000000AD8000-memory.dmp

          Filesize

          160KB

        • memory/3164-967-0x0000000007840000-0x000000000788B000-memory.dmp

          Filesize

          300KB

        • memory/3164-968-0x00000000077F0000-0x0000000007800000-memory.dmp

          Filesize

          64KB

        • memory/3328-974-0x0000000002BA0000-0x0000000002BD5000-memory.dmp

          Filesize

          212KB

        • memory/3652-182-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-202-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-153-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/3652-155-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-156-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-158-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-160-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-162-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-166-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-164-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-168-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-170-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-172-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-174-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-176-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-178-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-180-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-151-0x0000000004CE0000-0x0000000004D1A000-memory.dmp

          Filesize

          232KB

        • memory/3652-184-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-186-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-188-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-190-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-192-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-194-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-196-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-198-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-200-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-154-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/3652-204-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-206-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-208-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-210-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-212-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-214-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-216-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-218-0x0000000004CE0000-0x0000000004D15000-memory.dmp

          Filesize

          212KB

        • memory/3652-947-0x000000000A210000-0x000000000A816000-memory.dmp

          Filesize

          6.0MB

        • memory/3652-948-0x0000000009C00000-0x0000000009C12000-memory.dmp

          Filesize

          72KB

        • memory/3652-949-0x0000000009C20000-0x0000000009D2A000-memory.dmp

          Filesize

          1.0MB

        • memory/3652-950-0x0000000009D40000-0x0000000009D7E000-memory.dmp

          Filesize

          248KB

        • memory/3652-951-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

          Filesize

          300KB

        • memory/3652-952-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/3652-953-0x000000000A050000-0x000000000A0B6000-memory.dmp

          Filesize

          408KB

        • memory/3652-954-0x000000000AD10000-0x000000000ADA2000-memory.dmp

          Filesize

          584KB

        • memory/3652-955-0x000000000AEE0000-0x000000000AF56000-memory.dmp

          Filesize

          472KB

        • memory/3652-152-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/3652-150-0x0000000002DA0000-0x0000000002DE6000-memory.dmp

          Filesize

          280KB

        • memory/3652-149-0x0000000007380000-0x000000000787E000-memory.dmp

          Filesize

          5.0MB

        • memory/3652-148-0x0000000004A70000-0x0000000004AAC000-memory.dmp

          Filesize

          240KB

        • memory/3652-956-0x000000000AFA0000-0x000000000B162000-memory.dmp

          Filesize

          1.8MB

        • memory/3652-957-0x000000000B180000-0x000000000B6AC000-memory.dmp

          Filesize

          5.2MB

        • memory/3652-958-0x000000000B7D0000-0x000000000B7EE000-memory.dmp

          Filesize

          120KB

        • memory/3652-960-0x000000000B980000-0x000000000B9D0000-memory.dmp

          Filesize

          320KB