Analysis

  • max time kernel
    142s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-04-2023 14:53

General

  • Target

    1e3a90cc31d6d11e407bbee7a76c5e61fab6a6519cda424b1fef3b23fa0366ad.exe

  • Size

    1.1MB

  • MD5

    12e10c26de4ad8590667a11ab369c0db

  • SHA1

    79253ec24e19fcc67436c5b9639c2c5d1dbd7eb0

  • SHA256

    1e3a90cc31d6d11e407bbee7a76c5e61fab6a6519cda424b1fef3b23fa0366ad

  • SHA512

    df49cb03e9300341339a5df87cc0c8fa6dc170dab955e40305b3c0c88ec95bdbd04892d81b4d5de6ad75158529c38ab2171a7afadb726f31e91e27359a31a159

  • SSDEEP

    24576:DyF6dmAMlCEZNmk5HAw/IcCf/AReE3k7eqkl4HJv/3iAC4/4Y:WQkNdd5gwbwtv7FklQniAHg

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e3a90cc31d6d11e407bbee7a76c5e61fab6a6519cda424b1fef3b23fa0366ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1e3a90cc31d6d11e407bbee7a76c5e61fab6a6519cda424b1fef3b23fa0366ad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un269775.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un269775.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475104.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475104.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr213558.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr213558.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375690.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375690.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332863.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332863.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913337.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913337.exe
      2⤵
      • Executes dropped EXE
      PID:4712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 620
        3⤵
        • Program crash
        PID:5076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 700
        3⤵
        • Program crash
        PID:3652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 772
        3⤵
        • Program crash
        PID:1556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 848
        3⤵
        • Program crash
        PID:1312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 880
        3⤵
        • Program crash
        PID:3720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 924
        3⤵
        • Program crash
        PID:3928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 1124
        3⤵
        • Program crash
        PID:3788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 1156
        3⤵
        • Program crash
        PID:3020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 1224
        3⤵
        • Program crash
        PID:1000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913337.exe

    Filesize

    384KB

    MD5

    12506a1c733e93ed3447799635520831

    SHA1

    38019a0062e9f1d37824f071ffa0afa76a08253e

    SHA256

    b8462acacbd7e8eed83f20c340aac23d5cce9fd2e7f1d98e6fd135aa671cbf19

    SHA512

    2ed2ea344162e75afb47eadae7a096a1ba37b2f11aebc699d4dba45eeec39f5aa0b340089a400df0a818443234cd6cbc5784e6054a6b082a220e8985f85ffa45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913337.exe

    Filesize

    384KB

    MD5

    12506a1c733e93ed3447799635520831

    SHA1

    38019a0062e9f1d37824f071ffa0afa76a08253e

    SHA256

    b8462acacbd7e8eed83f20c340aac23d5cce9fd2e7f1d98e6fd135aa671cbf19

    SHA512

    2ed2ea344162e75afb47eadae7a096a1ba37b2f11aebc699d4dba45eeec39f5aa0b340089a400df0a818443234cd6cbc5784e6054a6b082a220e8985f85ffa45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un269775.exe

    Filesize

    763KB

    MD5

    5b2e3f3a994fbf1554e542f4dd265f9b

    SHA1

    a894eed7fbfaa73d926b0fb61034c89d55819183

    SHA256

    0e2deb35e789c20acaf13435cd01a5862c2daf059b81c533a486dfaeb545a81d

    SHA512

    9cd5898b65dff5b29e23d7d31eb2bb4002e4c610df5696bcdf4d4e1941129992cb6052996311cdf02abc48f98b85414758dbd5faaf86c0f34d886aa09bd2a2ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un269775.exe

    Filesize

    763KB

    MD5

    5b2e3f3a994fbf1554e542f4dd265f9b

    SHA1

    a894eed7fbfaa73d926b0fb61034c89d55819183

    SHA256

    0e2deb35e789c20acaf13435cd01a5862c2daf059b81c533a486dfaeb545a81d

    SHA512

    9cd5898b65dff5b29e23d7d31eb2bb4002e4c610df5696bcdf4d4e1941129992cb6052996311cdf02abc48f98b85414758dbd5faaf86c0f34d886aa09bd2a2ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332863.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332863.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475104.exe

    Filesize

    609KB

    MD5

    34c9b723ded947340f45c47d0b3fd1ac

    SHA1

    36b475803e37b96a0c0e88960602c61bf087e9c2

    SHA256

    bb6fff3d897c6de9be50f70cb4cd3014fbc3e256471d34a65313a7a15afdd45b

    SHA512

    8da725c9a48fe67ae55425ba5fba8357a27b5fac39c507fc3efe8c06e1cf8567ea50a82fc1716f380314995d81c89c5db234a57c639396a5412b076e8b1a50d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475104.exe

    Filesize

    609KB

    MD5

    34c9b723ded947340f45c47d0b3fd1ac

    SHA1

    36b475803e37b96a0c0e88960602c61bf087e9c2

    SHA256

    bb6fff3d897c6de9be50f70cb4cd3014fbc3e256471d34a65313a7a15afdd45b

    SHA512

    8da725c9a48fe67ae55425ba5fba8357a27b5fac39c507fc3efe8c06e1cf8567ea50a82fc1716f380314995d81c89c5db234a57c639396a5412b076e8b1a50d1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr213558.exe

    Filesize

    406KB

    MD5

    8e8e1e29dc30da86d94dd91ae4cc3e76

    SHA1

    298926da6257d308023ae3988f1cdd6c4f03fd71

    SHA256

    b391e20a6a54501b76623fef3abc53a465b8dec280613dec6310a32efe4423fa

    SHA512

    705a91d654a87adac87d31f448f11369714f0747d3d11e68d75725219ff5f0fc4b9004dfa2be8b03af9ec3d755f3e52634aa1de579c06a92e0341d3239674ebd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr213558.exe

    Filesize

    406KB

    MD5

    8e8e1e29dc30da86d94dd91ae4cc3e76

    SHA1

    298926da6257d308023ae3988f1cdd6c4f03fd71

    SHA256

    b391e20a6a54501b76623fef3abc53a465b8dec280613dec6310a32efe4423fa

    SHA512

    705a91d654a87adac87d31f448f11369714f0747d3d11e68d75725219ff5f0fc4b9004dfa2be8b03af9ec3d755f3e52634aa1de579c06a92e0341d3239674ebd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375690.exe

    Filesize

    487KB

    MD5

    d636e989c207b02b352b397ad070469d

    SHA1

    96e96bbfa0b160c770f0ca905d79fdcac50a5cdd

    SHA256

    9442728a219ff7ef6578b337632b842eb7f71a784faacb911c6894b5831c2338

    SHA512

    91b810721136c2a5432ef5fe36a3d4b7c7b942f8da4f92be9741a9ebff99691612c35afe2121884a8a399bc70e1cb0141cfb2cffce4a21436ba46ad032c091e8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375690.exe

    Filesize

    487KB

    MD5

    d636e989c207b02b352b397ad070469d

    SHA1

    96e96bbfa0b160c770f0ca905d79fdcac50a5cdd

    SHA256

    9442728a219ff7ef6578b337632b842eb7f71a784faacb911c6894b5831c2338

    SHA512

    91b810721136c2a5432ef5fe36a3d4b7c7b942f8da4f92be9741a9ebff99691612c35afe2121884a8a399bc70e1cb0141cfb2cffce4a21436ba46ad032c091e8

  • memory/1392-1010-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/1392-1009-0x0000000007250000-0x000000000729B000-memory.dmp

    Filesize

    300KB

  • memory/1392-1008-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2712-987-0x0000000002A80000-0x0000000002A92000-memory.dmp

    Filesize

    72KB

  • memory/2712-991-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/2712-1002-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-1000-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-1001-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-998-0x0000000008ED0000-0x00000000093FC000-memory.dmp

    Filesize

    5.2MB

  • memory/2712-997-0x0000000008CF0000-0x0000000008EB2000-memory.dmp

    Filesize

    1.8MB

  • memory/2712-996-0x0000000008C30000-0x0000000008C4E000-memory.dmp

    Filesize

    120KB

  • memory/2712-995-0x0000000008A90000-0x0000000008B06000-memory.dmp

    Filesize

    472KB

  • memory/2712-994-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/2712-993-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/2712-992-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/2712-990-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-989-0x0000000002AC0000-0x0000000002AFE000-memory.dmp

    Filesize

    248KB

  • memory/2712-988-0x00000000078E0000-0x00000000079EA000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-986-0x0000000007EF0000-0x00000000084F6000-memory.dmp

    Filesize

    6.0MB

  • memory/2712-227-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-224-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-225-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-220-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-188-0x0000000000D00000-0x0000000000D3C000-memory.dmp

    Filesize

    240KB

  • memory/2712-189-0x0000000002670000-0x00000000026AA000-memory.dmp

    Filesize

    232KB

  • memory/2712-190-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-191-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-193-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-195-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-197-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-199-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-201-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-203-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-205-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-207-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-209-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-211-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-213-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-215-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-217-0x0000000002670000-0x00000000026A5000-memory.dmp

    Filesize

    212KB

  • memory/2712-219-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/2712-223-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/2712-221-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/4176-167-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-144-0x0000000000C60000-0x0000000000C7A000-memory.dmp

    Filesize

    104KB

  • memory/4176-183-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4176-181-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-180-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-150-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-179-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4176-177-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-155-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-175-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-173-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-171-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-153-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-159-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-165-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-163-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-161-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-151-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-157-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-149-0x00000000028E0000-0x00000000028F8000-memory.dmp

    Filesize

    96KB

  • memory/4176-148-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-147-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-146-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4176-145-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/4176-169-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4712-1016-0x0000000000A20000-0x0000000000A55000-memory.dmp

    Filesize

    212KB