Analysis

  • max time kernel
    145s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 07:23

General

  • Target

    4b3c8004a89e95a89a90065f0449a53ba8eb79237f0a6df49c97afc17dd4215e.exe

  • Size

    936KB

  • MD5

    59a4f00ebc412b7b85ebb183144d4f64

  • SHA1

    73059533d45297c930c0f4af3573bbfb13ffc1de

  • SHA256

    4b3c8004a89e95a89a90065f0449a53ba8eb79237f0a6df49c97afc17dd4215e

  • SHA512

    0f688c5457821a100a4365fea2120e9bcc5a93c85215c6a751b86c78f48855b423005f1386c2c295629b3c0e681560bf9e66a2428331d6eec3201d03d3e4bff0

  • SSDEEP

    12288:Zy90vMDzSpPeBEJQVJsEFTDcileo2AcbrIq8MD+jF/nIt0+BxgSLISpnl4AShmoz:ZyNUeBRZDc1o2Alq8B+BuSLDBl4hnmK

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b3c8004a89e95a89a90065f0449a53ba8eb79237f0a6df49c97afc17dd4215e.exe
    "C:\Users\Admin\AppData\Local\Temp\4b3c8004a89e95a89a90065f0449a53ba8eb79237f0a6df49c97afc17dd4215e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyp4937.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyp4937.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJD9435.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJD9435.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it864192.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it864192.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188759.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188759.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp349298.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp349298.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr927000.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr927000.exe
      2⤵
      • Executes dropped EXE
      PID:2312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 616
        3⤵
        • Program crash
        PID:4108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 696
        3⤵
        • Program crash
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 800
        3⤵
        • Program crash
        PID:4256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 844
        3⤵
        • Program crash
        PID:4300
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 872
        3⤵
        • Program crash
        PID:4156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 884
        3⤵
        • Program crash
        PID:4148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1076
        3⤵
        • Program crash
        PID:4140

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr927000.exe

          Filesize

          381KB

          MD5

          fc9d94d19968ccdcfa2a1fb85613e089

          SHA1

          93ca0778e28d6cbdf3a696a02e2c74c9be9553f7

          SHA256

          b3516d3b4b17535d5d5a2b8fb3619557d8ce1058145da7803ca2f72ae01cc7bd

          SHA512

          f256b152a83ce15d6d2bdb5da7be6034be494a9275f75c4acb2ba6229fbe7156c98d6dfa928f672b4c34abb94ce98f4354ce4db15a4e4a623945aa1f1512b606

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr927000.exe

          Filesize

          381KB

          MD5

          fc9d94d19968ccdcfa2a1fb85613e089

          SHA1

          93ca0778e28d6cbdf3a696a02e2c74c9be9553f7

          SHA256

          b3516d3b4b17535d5d5a2b8fb3619557d8ce1058145da7803ca2f72ae01cc7bd

          SHA512

          f256b152a83ce15d6d2bdb5da7be6034be494a9275f75c4acb2ba6229fbe7156c98d6dfa928f672b4c34abb94ce98f4354ce4db15a4e4a623945aa1f1512b606

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyp4937.exe

          Filesize

          623KB

          MD5

          39fc63d7056ee438acb1224be10ca61f

          SHA1

          07a0911cf81069d23d11b3d149b858976ba32d9f

          SHA256

          b276bba432f5c8c91b285a5daa9c3c9728df1b9eaa1e007fe1031ff3f6838ec3

          SHA512

          26c30b0733c199095268ae198f3aaa3a1180064a7d4c5b56711ec6faa8a1c78d90db1c2ceaf84859c9ac67ed0f05301718a7dce19c5fb5e56c36b3d197a4c63d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyp4937.exe

          Filesize

          623KB

          MD5

          39fc63d7056ee438acb1224be10ca61f

          SHA1

          07a0911cf81069d23d11b3d149b858976ba32d9f

          SHA256

          b276bba432f5c8c91b285a5daa9c3c9728df1b9eaa1e007fe1031ff3f6838ec3

          SHA512

          26c30b0733c199095268ae198f3aaa3a1180064a7d4c5b56711ec6faa8a1c78d90db1c2ceaf84859c9ac67ed0f05301718a7dce19c5fb5e56c36b3d197a4c63d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp349298.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp349298.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJD9435.exe

          Filesize

          468KB

          MD5

          8ffe5a57bae691cb5478b857761190c3

          SHA1

          943bf64bc5d3be3f34b5f670b35c082391124124

          SHA256

          2c1e8b40fe1dee6d9022607a20c9d6f0ff1bbb2609e4dfeea84b9ae134956fde

          SHA512

          832a3aab47f2ab82639281b12382ff1b65468971d7104162a12bf082505d3fbc7d2b48a2d2cdde1994b3ead8218a19984119fd285458fa9502c3a31abf6e41ae

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJD9435.exe

          Filesize

          468KB

          MD5

          8ffe5a57bae691cb5478b857761190c3

          SHA1

          943bf64bc5d3be3f34b5f670b35c082391124124

          SHA256

          2c1e8b40fe1dee6d9022607a20c9d6f0ff1bbb2609e4dfeea84b9ae134956fde

          SHA512

          832a3aab47f2ab82639281b12382ff1b65468971d7104162a12bf082505d3fbc7d2b48a2d2cdde1994b3ead8218a19984119fd285458fa9502c3a31abf6e41ae

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it864192.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it864192.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188759.exe

          Filesize

          485KB

          MD5

          ae7f3f1f8a7face65169b54be470c681

          SHA1

          2a83374fcbc8cdd914d5c85497c02d05be083013

          SHA256

          e6131050a6a6a39d371987ce243e4515a24f514f3e1cd1c50f12ac56688d77dd

          SHA512

          fd0ade49387553574b48f87e25bc78f6403a61038c2cf983ac056a5b065da604e3454c10f479ec17ea2d34ee1ff5dbdfae43b4c191ed6ab5c4d56ce052fa058d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188759.exe

          Filesize

          485KB

          MD5

          ae7f3f1f8a7face65169b54be470c681

          SHA1

          2a83374fcbc8cdd914d5c85497c02d05be083013

          SHA256

          e6131050a6a6a39d371987ce243e4515a24f514f3e1cd1c50f12ac56688d77dd

          SHA512

          fd0ade49387553574b48f87e25bc78f6403a61038c2cf983ac056a5b065da604e3454c10f479ec17ea2d34ee1ff5dbdfae43b4c191ed6ab5c4d56ce052fa058d

        • memory/1924-964-0x0000000007020000-0x000000000706B000-memory.dmp

          Filesize

          300KB

        • memory/1924-963-0x00000000002A0000-0x00000000002C8000-memory.dmp

          Filesize

          160KB

        • memory/1924-965-0x0000000007390000-0x00000000073A0000-memory.dmp

          Filesize

          64KB

        • memory/2312-971-0x00000000008E0000-0x0000000000915000-memory.dmp

          Filesize

          212KB

        • memory/4772-182-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-200-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-149-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/4772-153-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-154-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-156-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-158-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-160-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-162-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-164-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-166-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-168-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-170-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-172-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-174-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-176-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-178-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-180-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-151-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/4772-184-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-186-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-188-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-190-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-192-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-194-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-198-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-196-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-152-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/4772-202-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-204-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-206-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-208-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-210-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-212-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-214-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-216-0x0000000004DA0000-0x0000000004DD5000-memory.dmp

          Filesize

          212KB

        • memory/4772-945-0x0000000007810000-0x0000000007E16000-memory.dmp

          Filesize

          6.0MB

        • memory/4772-946-0x0000000007E60000-0x0000000007E72000-memory.dmp

          Filesize

          72KB

        • memory/4772-947-0x0000000007E90000-0x0000000007F9A000-memory.dmp

          Filesize

          1.0MB

        • memory/4772-948-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

          Filesize

          248KB

        • memory/4772-949-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/4772-950-0x0000000008030000-0x000000000807B000-memory.dmp

          Filesize

          300KB

        • memory/4772-951-0x00000000082C0000-0x0000000008326000-memory.dmp

          Filesize

          408KB

        • memory/4772-952-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/4772-953-0x0000000008B70000-0x0000000008BE6000-memory.dmp

          Filesize

          472KB

        • memory/4772-150-0x0000000004DA0000-0x0000000004DDA000-memory.dmp

          Filesize

          232KB

        • memory/4772-147-0x00000000008F0000-0x0000000000936000-memory.dmp

          Filesize

          280KB

        • memory/4772-148-0x0000000004E90000-0x000000000538E000-memory.dmp

          Filesize

          5.0MB

        • memory/4772-146-0x0000000004D20000-0x0000000004D5C000-memory.dmp

          Filesize

          240KB

        • memory/4772-954-0x0000000008C10000-0x0000000008DD2000-memory.dmp

          Filesize

          1.8MB

        • memory/4772-955-0x0000000008DE0000-0x000000000930C000-memory.dmp

          Filesize

          5.2MB

        • memory/4772-956-0x0000000009420000-0x000000000943E000-memory.dmp

          Filesize

          120KB

        • memory/4772-957-0x0000000002800000-0x0000000002850000-memory.dmp

          Filesize

          320KB

        • memory/4824-140-0x00000000005B0000-0x00000000005BA000-memory.dmp

          Filesize

          40KB