Analysis

  • max time kernel
    144s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 10:10

General

  • Target

    128c3e936515cf590f4f0abe0b198e0b01ef14a0fbfa08bc39d10a3f67782caf.exe

  • Size

    1.1MB

  • MD5

    d98d74173c49ea7198cd649cd53a8e8e

  • SHA1

    65902a09eef21cb48732e7e712f23f9d7b53a3e2

  • SHA256

    128c3e936515cf590f4f0abe0b198e0b01ef14a0fbfa08bc39d10a3f67782caf

  • SHA512

    afd21090b516121b8ce329b11722ba56b2761a20f2d9c0b34d8a0291a6ceafe76e5cebaf6e1110af805d20b7daf7402680cee1916d17c8e4e5de92edd09eaea4

  • SSDEEP

    24576:gyYdoPpEvH7znYMP3OT+q8Pgt5YKj1ml2T9AzMv3:n307zYu+iq8PgrjR

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\128c3e936515cf590f4f0abe0b198e0b01ef14a0fbfa08bc39d10a3f67782caf.exe
    "C:\Users\Admin\AppData\Local\Temp\128c3e936515cf590f4f0abe0b198e0b01ef14a0fbfa08bc39d10a3f67782caf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517335.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517335.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un023317.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un023317.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr110054.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr110054.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2160
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu990105.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu990105.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk340503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk340503.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860395.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860395.exe
      2⤵
      • Executes dropped EXE
      PID:3992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 620
        3⤵
        • Program crash
        PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 700
        3⤵
        • Program crash
        PID:1376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 840
        3⤵
        • Program crash
        PID:1968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 820
        3⤵
        • Program crash
        PID:4328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 876
        3⤵
        • Program crash
        PID:1224
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 824
        3⤵
        • Program crash
        PID:4940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1036
        3⤵
        • Program crash
        PID:2068

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860395.exe

          Filesize

          383KB

          MD5

          b6946ffd57c7b04934c38f50ad6a71e6

          SHA1

          e62f85d5de86c8e796ea99d7b6ca2c795a0b7881

          SHA256

          558c2b08b468b0511e18672588ad064f53405d9a3c4afdb6f27b6eb4baee56de

          SHA512

          cf0afd256d3d9563e36afc4251b07e3e6ad0a8015f27631c3983eccb093261349417ddbe4e3e1f36259b645b360f9a199e5ba041fd694fef89004db7b1a7f50d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860395.exe

          Filesize

          383KB

          MD5

          b6946ffd57c7b04934c38f50ad6a71e6

          SHA1

          e62f85d5de86c8e796ea99d7b6ca2c795a0b7881

          SHA256

          558c2b08b468b0511e18672588ad064f53405d9a3c4afdb6f27b6eb4baee56de

          SHA512

          cf0afd256d3d9563e36afc4251b07e3e6ad0a8015f27631c3983eccb093261349417ddbe4e3e1f36259b645b360f9a199e5ba041fd694fef89004db7b1a7f50d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517335.exe

          Filesize

          763KB

          MD5

          4ceb7a5eb9370dd0b94488b9664b9540

          SHA1

          2fdb7dd7915b1bcb4ebf3fb052288883635ab3fd

          SHA256

          6b379168abf44815fe357273a70032c7e8a52268831c9a6504e213bf898a6fe3

          SHA512

          0858a93e5e0c3d421c1e11beb56b10771f469f5743f31829038573a0f912869e23298f8c6a8edcbdade499f7625021d427b1f67349057586495aea052d7b1f75

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517335.exe

          Filesize

          763KB

          MD5

          4ceb7a5eb9370dd0b94488b9664b9540

          SHA1

          2fdb7dd7915b1bcb4ebf3fb052288883635ab3fd

          SHA256

          6b379168abf44815fe357273a70032c7e8a52268831c9a6504e213bf898a6fe3

          SHA512

          0858a93e5e0c3d421c1e11beb56b10771f469f5743f31829038573a0f912869e23298f8c6a8edcbdade499f7625021d427b1f67349057586495aea052d7b1f75

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk340503.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk340503.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un023317.exe

          Filesize

          610KB

          MD5

          6480a1f2786efacffa98b39f62d5570d

          SHA1

          f6cb29cecf73fdb11affc034ac2e34c07c18d405

          SHA256

          7b2bd4d4470d25ad88b03f8ff36602eaec0c9f1874e6e1c2c7a81da5cd2cf5af

          SHA512

          2b88be740f295b54c3a62a3e17af0bfe9c4e9c12cfea7935a63a66021cd187503408d8835dd3cb64e62c2ad82349818c2635ed0dafedcb040d2857b73ddf980c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un023317.exe

          Filesize

          610KB

          MD5

          6480a1f2786efacffa98b39f62d5570d

          SHA1

          f6cb29cecf73fdb11affc034ac2e34c07c18d405

          SHA256

          7b2bd4d4470d25ad88b03f8ff36602eaec0c9f1874e6e1c2c7a81da5cd2cf5af

          SHA512

          2b88be740f295b54c3a62a3e17af0bfe9c4e9c12cfea7935a63a66021cd187503408d8835dd3cb64e62c2ad82349818c2635ed0dafedcb040d2857b73ddf980c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr110054.exe

          Filesize

          405KB

          MD5

          dfce948fbedd62c857add708033d3501

          SHA1

          ee35206e49eddc5e2c3529f5bb51a155ce082b72

          SHA256

          c0c1dc02054d1daeaeac7003d52cf6e8440bf26674e91e4af8a5708267ccb3f9

          SHA512

          8c64b18de79d58e5604e1d6195be842f7b597e56a806972c65cdbeb6ba9e81921842275e3b69c74891cf84812c72ca4f744dcad9f0a3427b0a69b6fa6ff32e4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr110054.exe

          Filesize

          405KB

          MD5

          dfce948fbedd62c857add708033d3501

          SHA1

          ee35206e49eddc5e2c3529f5bb51a155ce082b72

          SHA256

          c0c1dc02054d1daeaeac7003d52cf6e8440bf26674e91e4af8a5708267ccb3f9

          SHA512

          8c64b18de79d58e5604e1d6195be842f7b597e56a806972c65cdbeb6ba9e81921842275e3b69c74891cf84812c72ca4f744dcad9f0a3427b0a69b6fa6ff32e4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu990105.exe

          Filesize

          488KB

          MD5

          110567553606b3edb8783abbec18a31b

          SHA1

          4a6aed8992ce2edde87a62255989c352c2a26e0f

          SHA256

          3d1f6cbd9ac94ce691686a025fba7c16ba35cb93686612074bb3699d11e1cd93

          SHA512

          c40f8c8043d5e989b0770457a99827c546d337ac4a3dd2856aec062cac976ddd9c2f206f7d861a7c02a3229f49930ca249233ed096675c846635886e0942a7c2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu990105.exe

          Filesize

          488KB

          MD5

          110567553606b3edb8783abbec18a31b

          SHA1

          4a6aed8992ce2edde87a62255989c352c2a26e0f

          SHA256

          3d1f6cbd9ac94ce691686a025fba7c16ba35cb93686612074bb3699d11e1cd93

          SHA512

          c40f8c8043d5e989b0770457a99827c546d337ac4a3dd2856aec062cac976ddd9c2f206f7d861a7c02a3229f49930ca249233ed096675c846635886e0942a7c2

        • memory/2160-149-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-162-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-145-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-146-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-147-0x0000000004E90000-0x000000000538E000-memory.dmp

          Filesize

          5.0MB

        • memory/2160-148-0x0000000002750000-0x0000000002768000-memory.dmp

          Filesize

          96KB

        • memory/2160-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2160-150-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-152-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-154-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-156-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-158-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-160-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-144-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-164-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-166-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-168-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-170-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-172-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-174-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-176-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2160-177-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/2160-178-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-179-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-180-0x0000000004E80000-0x0000000004E90000-memory.dmp

          Filesize

          64KB

        • memory/2160-182-0x0000000000400000-0x000000000080A000-memory.dmp

          Filesize

          4.0MB

        • memory/2160-142-0x0000000002570000-0x000000000258A000-memory.dmp

          Filesize

          104KB

        • memory/2648-189-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-278-0x0000000004E50000-0x0000000004E60000-memory.dmp

          Filesize

          64KB

        • memory/2648-190-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-192-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-194-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-196-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-198-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-200-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-202-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-204-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-206-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-208-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-210-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-212-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-214-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-216-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-218-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-220-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-222-0x0000000004DB0000-0x0000000004DE5000-memory.dmp

          Filesize

          212KB

        • memory/2648-275-0x0000000000950000-0x0000000000996000-memory.dmp

          Filesize

          280KB

        • memory/2648-276-0x0000000004E50000-0x0000000004E60000-memory.dmp

          Filesize

          64KB

        • memory/2648-188-0x0000000004DB0000-0x0000000004DEA000-memory.dmp

          Filesize

          232KB

        • memory/2648-280-0x0000000004E50000-0x0000000004E60000-memory.dmp

          Filesize

          64KB

        • memory/2648-985-0x00000000077E0000-0x0000000007DE6000-memory.dmp

          Filesize

          6.0MB

        • memory/2648-986-0x0000000007E60000-0x0000000007E72000-memory.dmp

          Filesize

          72KB

        • memory/2648-987-0x0000000007E90000-0x0000000007F9A000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-988-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

          Filesize

          248KB

        • memory/2648-989-0x0000000004E50000-0x0000000004E60000-memory.dmp

          Filesize

          64KB

        • memory/2648-990-0x0000000008030000-0x000000000807B000-memory.dmp

          Filesize

          300KB

        • memory/2648-991-0x00000000082C0000-0x0000000008326000-memory.dmp

          Filesize

          408KB

        • memory/2648-992-0x0000000008980000-0x0000000008A12000-memory.dmp

          Filesize

          584KB

        • memory/2648-993-0x0000000008A20000-0x0000000008A96000-memory.dmp

          Filesize

          472KB

        • memory/2648-994-0x0000000008AF0000-0x0000000008B0E000-memory.dmp

          Filesize

          120KB

        • memory/2648-995-0x0000000008B90000-0x0000000008BE0000-memory.dmp

          Filesize

          320KB

        • memory/2648-996-0x0000000008D00000-0x0000000008EC2000-memory.dmp

          Filesize

          1.8MB

        • memory/2648-997-0x0000000008ED0000-0x00000000093FC000-memory.dmp

          Filesize

          5.2MB

        • memory/2648-187-0x0000000002760000-0x000000000279C000-memory.dmp

          Filesize

          240KB

        • memory/3640-1004-0x0000000007B20000-0x0000000007B6B000-memory.dmp

          Filesize

          300KB

        • memory/3640-1003-0x0000000000D60000-0x0000000000D88000-memory.dmp

          Filesize

          160KB

        • memory/3640-1005-0x0000000007A90000-0x0000000007AA0000-memory.dmp

          Filesize

          64KB

        • memory/3992-1011-0x00000000008E0000-0x0000000000915000-memory.dmp

          Filesize

          212KB