Analysis

  • max time kernel
    144s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 17:51

General

  • Target

    9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe

  • Size

    936KB

  • MD5

    9dd8e7817e162376d42f372ec9e832e2

  • SHA1

    436919a8b482977c6afc3a9a9b8ebebe4e5e3393

  • SHA256

    9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34

  • SHA512

    24e83d732e492defa2ce51beb1646a5040553ca31a379873fc3d7f6149d11541e49c3ceb607899efc05ccdf974313ad72a083c6cc2bc8c0aafe223ae58a28bc4

  • SSDEEP

    24576:dyYsMnQkYTn8H0AZBQdk1x/kKfzSKd7mCEmCFq3Yz:4YsMnQkSnE0AvQW1C4wJq3Y

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe
    "C:\Users\Admin\AppData\Local\Temp\9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:1420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 620
        3⤵
        • Program crash
        PID:2940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 700
        3⤵
        • Program crash
        PID:3488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 840
        3⤵
        • Program crash
        PID:5000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 848
        3⤵
        • Program crash
        PID:2700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 888
        3⤵
        • Program crash
        PID:3096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 908
        3⤵
        • Program crash
        PID:68
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1120
        3⤵
        • Program crash
        PID:4624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1148
        3⤵
        • Program crash
        PID:4724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1152
        3⤵
        • Program crash
        PID:4804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exe

    Filesize

    384KB

    MD5

    3a49ee3205029625fd2acad94128932b

    SHA1

    4a7532e0a80e87b77586c86ff8e8a8a4c660a432

    SHA256

    365066ff3d8e9a2296fcaf88a952d92337ca32b39d4701881572b64e805888f2

    SHA512

    c6188c8c0645ea63e39e99d232e2de69dc5de497f5077e43a03992c4840b8397f0ff4f054723e384ca7443af0af1b909c1efb31642d2e6305b48a7efd50b67c0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exe

    Filesize

    384KB

    MD5

    3a49ee3205029625fd2acad94128932b

    SHA1

    4a7532e0a80e87b77586c86ff8e8a8a4c660a432

    SHA256

    365066ff3d8e9a2296fcaf88a952d92337ca32b39d4701881572b64e805888f2

    SHA512

    c6188c8c0645ea63e39e99d232e2de69dc5de497f5077e43a03992c4840b8397f0ff4f054723e384ca7443af0af1b909c1efb31642d2e6305b48a7efd50b67c0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exe

    Filesize

    623KB

    MD5

    a08fd8c96d5140170609f3db3673bfb6

    SHA1

    ac3eda9330e24231fa13e64a6f1d269523d1a905

    SHA256

    ed43c331de9a891395d1834a8ec7a0cee76e1a2ae694d71ff9a153bc9bae30cd

    SHA512

    57aecdf9b24ff0b1578d8a8b18be02fde62b40a4140dc800161db751371f7af40825d667e5cbd4e60fb46a24c2117f50ae3cbf86c0320043ce70c26d6d5b9198

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exe

    Filesize

    623KB

    MD5

    a08fd8c96d5140170609f3db3673bfb6

    SHA1

    ac3eda9330e24231fa13e64a6f1d269523d1a905

    SHA256

    ed43c331de9a891395d1834a8ec7a0cee76e1a2ae694d71ff9a153bc9bae30cd

    SHA512

    57aecdf9b24ff0b1578d8a8b18be02fde62b40a4140dc800161db751371f7af40825d667e5cbd4e60fb46a24c2117f50ae3cbf86c0320043ce70c26d6d5b9198

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exe

    Filesize

    468KB

    MD5

    86c6aeb10463b9d5f09a86043162ea5f

    SHA1

    5580736fc0626d011706e4665394b2cb245d0231

    SHA256

    c6e1391a38766667955470a788b71ad72938f5c809cfead45c1b8e64d541966d

    SHA512

    1ab94ddfc706cf131bd7991aa0e4296a61a22b5d7680abe92ac567f099a06e121db9f4f623e7d0ae533b7bfb144be897ae695ba57ad51688af9413d5443ba773

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exe

    Filesize

    468KB

    MD5

    86c6aeb10463b9d5f09a86043162ea5f

    SHA1

    5580736fc0626d011706e4665394b2cb245d0231

    SHA256

    c6e1391a38766667955470a788b71ad72938f5c809cfead45c1b8e64d541966d

    SHA512

    1ab94ddfc706cf131bd7991aa0e4296a61a22b5d7680abe92ac567f099a06e121db9f4f623e7d0ae533b7bfb144be897ae695ba57ad51688af9413d5443ba773

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exe

    Filesize

    488KB

    MD5

    127d7e0259c8b1cec9b5558957912bd9

    SHA1

    af003885611f7dc31e9f6dfc81c46d89c5922cb7

    SHA256

    497b739ec48fc0e02c5523add3defd6df6d7a31b76d2509d04bd2ac7383eef79

    SHA512

    8ef27d8a74974d8fa9ea137265479e677e2542f31a3e3c532653f0315102dfe9e1fa6db9db36b83644b487ff944d978ffb532cd53eb8ba6a230ec14879e620d4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exe

    Filesize

    488KB

    MD5

    127d7e0259c8b1cec9b5558957912bd9

    SHA1

    af003885611f7dc31e9f6dfc81c46d89c5922cb7

    SHA256

    497b739ec48fc0e02c5523add3defd6df6d7a31b76d2509d04bd2ac7383eef79

    SHA512

    8ef27d8a74974d8fa9ea137265479e677e2542f31a3e3c532653f0315102dfe9e1fa6db9db36b83644b487ff944d978ffb532cd53eb8ba6a230ec14879e620d4

  • memory/1420-971-0x0000000000BB0000-0x0000000000BE5000-memory.dmp

    Filesize

    212KB

  • memory/2116-140-0x0000000000780000-0x000000000078A000-memory.dmp

    Filesize

    40KB

  • memory/2580-963-0x00000000006D0000-0x00000000006F8000-memory.dmp

    Filesize

    160KB

  • memory/2580-964-0x0000000007450000-0x000000000749B000-memory.dmp

    Filesize

    300KB

  • memory/2580-965-0x00000000074C0000-0x00000000074D0000-memory.dmp

    Filesize

    64KB

  • memory/4288-180-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-200-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-153-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-151-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4288-158-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4288-157-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-155-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4288-160-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-162-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-164-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-166-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-168-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-170-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-172-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-174-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-176-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-178-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-150-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-182-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-184-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-186-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-188-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-190-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-192-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-194-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-196-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-198-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-154-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4288-202-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-204-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-206-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-208-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-210-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-212-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-214-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-216-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-945-0x0000000007E20000-0x0000000008426000-memory.dmp

    Filesize

    6.0MB

  • memory/4288-946-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/4288-947-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/4288-948-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/4288-949-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4288-950-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4288-951-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/4288-952-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/4288-953-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/4288-149-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4288-148-0x0000000004D80000-0x0000000004DBA000-memory.dmp

    Filesize

    232KB

  • memory/4288-147-0x0000000004E90000-0x000000000538E000-memory.dmp

    Filesize

    5.0MB

  • memory/4288-146-0x0000000002880000-0x00000000028BC000-memory.dmp

    Filesize

    240KB

  • memory/4288-954-0x0000000008AF0000-0x0000000008B0E000-memory.dmp

    Filesize

    120KB

  • memory/4288-955-0x0000000008CB0000-0x0000000008E72000-memory.dmp

    Filesize

    1.8MB

  • memory/4288-956-0x0000000008E80000-0x00000000093AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4288-957-0x0000000002360000-0x00000000023B0000-memory.dmp

    Filesize

    320KB