Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 15:30

General

  • Target

    02e0330522b7846a30de95f1e12741a3aac52c9caf0490e0ab2406701a058ce7.exe

  • Size

    936KB

  • MD5

    93c0fe359053f11d34366734bd37290b

  • SHA1

    8db6bacd6728bce445da2b1972928802b0213c4b

  • SHA256

    02e0330522b7846a30de95f1e12741a3aac52c9caf0490e0ab2406701a058ce7

  • SHA512

    a99c0ca4c36d5e0db9314d2ca06600b9bc6e365f984dd3fe0275a4e78f074b6428b5d8a531be6220867f2eaed60c9dd07aad909d18fdc2941c56589b9151aabc

  • SSDEEP

    24576:9ytRIUzxVKwnagqDNf3+u1am7JfS7IyPSoLKM:YYUzxVafDNf3t1niw

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02e0330522b7846a30de95f1e12741a3aac52c9caf0490e0ab2406701a058ce7.exe
    "C:\Users\Admin\AppData\Local\Temp\02e0330522b7846a30de95f1e12741a3aac52c9caf0490e0ab2406701a058ce7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf6025.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf6025.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWm2313.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWm2313.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it794414.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it794414.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr612555.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr612555.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp296738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp296738.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869135.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869135.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 620
        3⤵
        • Program crash
        PID:3508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 700
        3⤵
        • Program crash
        PID:5016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 840
        3⤵
        • Program crash
        PID:2012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 848
        3⤵
        • Program crash
        PID:2084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 896
        3⤵
        • Program crash
        PID:3984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 948
        3⤵
        • Program crash
        PID:2096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1128
        3⤵
        • Program crash
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1152
        3⤵
        • Program crash
        PID:4696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1088
        3⤵
        • Program crash
        PID:2488

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869135.exe

          Filesize

          384KB

          MD5

          0b4bb063dedb1d60a770c796c72691db

          SHA1

          49f3981fc0925ea8cab72eb8d761f2748771898b

          SHA256

          3ff997ebb2213ac65d865328b3ca4b626eb4b546ccad28346b30d86c87ba8e8f

          SHA512

          03562880c2c0b5a8470eae6f614cdd7d8b29003077d868c49d95bd40a0fb462b5fca3a292adc0577fa5f3a544410135121d2ec2a4d7a6d2e2d7ddc88a31e55a3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869135.exe

          Filesize

          384KB

          MD5

          0b4bb063dedb1d60a770c796c72691db

          SHA1

          49f3981fc0925ea8cab72eb8d761f2748771898b

          SHA256

          3ff997ebb2213ac65d865328b3ca4b626eb4b546ccad28346b30d86c87ba8e8f

          SHA512

          03562880c2c0b5a8470eae6f614cdd7d8b29003077d868c49d95bd40a0fb462b5fca3a292adc0577fa5f3a544410135121d2ec2a4d7a6d2e2d7ddc88a31e55a3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf6025.exe

          Filesize

          623KB

          MD5

          26e46cec04dc124e55652d1f9d0912d2

          SHA1

          2af173384921309e6a26ffd0ba66fbca8e253ea3

          SHA256

          190fd82d37c68f819848fe48627f73bced205c0787217274142e67d4ce79b53a

          SHA512

          3e98fefff40369efd1b59a5b17a1901f6499494154ec695b03dafbc4d66ab7641d578815e0dfe28298b5b9c495d6ecb18db0d27690b427d0727b236d553cc4f8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf6025.exe

          Filesize

          623KB

          MD5

          26e46cec04dc124e55652d1f9d0912d2

          SHA1

          2af173384921309e6a26ffd0ba66fbca8e253ea3

          SHA256

          190fd82d37c68f819848fe48627f73bced205c0787217274142e67d4ce79b53a

          SHA512

          3e98fefff40369efd1b59a5b17a1901f6499494154ec695b03dafbc4d66ab7641d578815e0dfe28298b5b9c495d6ecb18db0d27690b427d0727b236d553cc4f8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp296738.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp296738.exe

          Filesize

          136KB

          MD5

          86810f340795831f3c2bd147981be929

          SHA1

          573345e2c322720fa43f74d761ff1d48028f36c9

          SHA256

          d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

          SHA512

          c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWm2313.exe

          Filesize

          469KB

          MD5

          b37074eb5e5c702fe3b8465e9ced9e8f

          SHA1

          c88c57f53bf2215bd09f626c0893ee4355822645

          SHA256

          3432c265b27b00d42bd08f4eb129dfb41b19c328df608c8aee2cfb9516a27ec8

          SHA512

          a4d2ee5577b385310d57eeb8752a1ebd4cfce79d0881b1c0ec3b6271a80ac082f0979d6854870f6bfcd1f511b7ab1b71292cf831160ab323ed74e048e332c212

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWm2313.exe

          Filesize

          469KB

          MD5

          b37074eb5e5c702fe3b8465e9ced9e8f

          SHA1

          c88c57f53bf2215bd09f626c0893ee4355822645

          SHA256

          3432c265b27b00d42bd08f4eb129dfb41b19c328df608c8aee2cfb9516a27ec8

          SHA512

          a4d2ee5577b385310d57eeb8752a1ebd4cfce79d0881b1c0ec3b6271a80ac082f0979d6854870f6bfcd1f511b7ab1b71292cf831160ab323ed74e048e332c212

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it794414.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it794414.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr612555.exe

          Filesize

          488KB

          MD5

          0e71d3599b4768758665fbb5fce31aa7

          SHA1

          e40e3e8e3bcfe2f1d150c43ad8ce2ac71c6302de

          SHA256

          a2b86bbd4e6fd957641ea299e419dbc101884e7122888f90405dfcc2701e99cc

          SHA512

          7bd92447b063729e4331901b5a69dae718707fca76658dc1fb2124ecec84c12fa9f83293fdf0d0e57b9e44d9a910d8ff2c07563641a15bb007b90435c27ce124

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr612555.exe

          Filesize

          488KB

          MD5

          0e71d3599b4768758665fbb5fce31aa7

          SHA1

          e40e3e8e3bcfe2f1d150c43ad8ce2ac71c6302de

          SHA256

          a2b86bbd4e6fd957641ea299e419dbc101884e7122888f90405dfcc2701e99cc

          SHA512

          7bd92447b063729e4331901b5a69dae718707fca76658dc1fb2124ecec84c12fa9f83293fdf0d0e57b9e44d9a910d8ff2c07563641a15bb007b90435c27ce124

        • memory/2324-965-0x00000000071A0000-0x00000000071EB000-memory.dmp

          Filesize

          300KB

        • memory/2324-964-0x0000000000420000-0x0000000000448000-memory.dmp

          Filesize

          160KB

        • memory/2324-966-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/3928-141-0x0000000000100000-0x000000000010A000-memory.dmp

          Filesize

          40KB

        • memory/3992-972-0x0000000000810000-0x0000000000845000-memory.dmp

          Filesize

          212KB

        • memory/4920-181-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-201-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-153-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-158-0x0000000000820000-0x0000000000866000-memory.dmp

          Filesize

          280KB

        • memory/4920-159-0x00000000029C0000-0x00000000029D0000-memory.dmp

          Filesize

          64KB

        • memory/4920-157-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-162-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-165-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-167-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-164-0x00000000029C0000-0x00000000029D0000-memory.dmp

          Filesize

          64KB

        • memory/4920-161-0x00000000029C0000-0x00000000029D0000-memory.dmp

          Filesize

          64KB

        • memory/4920-169-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-171-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-173-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-175-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-177-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-179-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-151-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-183-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-185-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-187-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-189-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-191-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-193-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-195-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-197-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-199-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-155-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-203-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-205-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-207-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-209-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-211-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-213-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-215-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-217-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-946-0x0000000007810000-0x0000000007E16000-memory.dmp

          Filesize

          6.0MB

        • memory/4920-947-0x0000000007E60000-0x0000000007E72000-memory.dmp

          Filesize

          72KB

        • memory/4920-948-0x0000000007E90000-0x0000000007F9A000-memory.dmp

          Filesize

          1.0MB

        • memory/4920-949-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

          Filesize

          248KB

        • memory/4920-950-0x0000000008130000-0x000000000817B000-memory.dmp

          Filesize

          300KB

        • memory/4920-951-0x00000000029C0000-0x00000000029D0000-memory.dmp

          Filesize

          64KB

        • memory/4920-952-0x00000000082C0000-0x0000000008326000-memory.dmp

          Filesize

          408KB

        • memory/4920-953-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/4920-954-0x0000000008B30000-0x0000000008BA6000-memory.dmp

          Filesize

          472KB

        • memory/4920-150-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/4920-149-0x0000000002970000-0x00000000029AA000-memory.dmp

          Filesize

          232KB

        • memory/4920-148-0x0000000004E90000-0x000000000538E000-memory.dmp

          Filesize

          5.0MB

        • memory/4920-147-0x0000000002520000-0x000000000255C000-memory.dmp

          Filesize

          240KB

        • memory/4920-955-0x0000000008BE0000-0x0000000008BFE000-memory.dmp

          Filesize

          120KB

        • memory/4920-956-0x0000000008CA0000-0x0000000008E62000-memory.dmp

          Filesize

          1.8MB

        • memory/4920-957-0x0000000008E80000-0x00000000093AC000-memory.dmp

          Filesize

          5.2MB

        • memory/4920-958-0x00000000028D0000-0x0000000002920000-memory.dmp

          Filesize

          320KB