Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2023 22:12

General

  • Target

    71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe

  • Size

    694KB

  • MD5

    db0a3ab1ecc9016cd406d8ee8d500739

  • SHA1

    aca142d0ee07098cea6f1a525a9ce3e683861a8b

  • SHA256

    71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb

  • SHA512

    3f3ad90a85d52977728f0600158af2da3994af422fbb9c76e2eff5e33455544fc26af09fe6a9c93fb64eb3d4c0b68c22e9f1d2c606d3ff75f77ae573e2e080fe

  • SSDEEP

    12288:ay90cmp1cgFePaUeWbEJWa83oMRmNmQT7DllaMxUB5zhZi9SY:ayocSWaUeWbvzoMkNJJXWRY

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe
    "C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 1084
          4⤵
          • Program crash
          PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 1332
          4⤵
          • Program crash
          PID:4752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1196 -ip 1196
    1⤵
      PID:1280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2708 -ip 2708
      1⤵
        PID:4408

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe

        Filesize

        541KB

        MD5

        bcdef6c5da03c91b6c4ee75e21188a2f

        SHA1

        61f02c00cd4e163856a7dae3fa482af834af23e1

        SHA256

        e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69

        SHA512

        ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe

        Filesize

        541KB

        MD5

        bcdef6c5da03c91b6c4ee75e21188a2f

        SHA1

        61f02c00cd4e163856a7dae3fa482af834af23e1

        SHA256

        e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69

        SHA512

        ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe

        Filesize

        278KB

        MD5

        55035719f1967b40a21bd260f4e40da8

        SHA1

        3db0f8d1d38a37c525391720b30de411534138c5

        SHA256

        b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7

        SHA512

        7e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe

        Filesize

        278KB

        MD5

        55035719f1967b40a21bd260f4e40da8

        SHA1

        3db0f8d1d38a37c525391720b30de411534138c5

        SHA256

        b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7

        SHA512

        7e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe

        Filesize

        361KB

        MD5

        88d1ca5e656cd3223240e232767762ea

        SHA1

        0e52da74d0a30764cd88a2db1b2857f7f6cf971d

        SHA256

        ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a

        SHA512

        24a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe

        Filesize

        361KB

        MD5

        88d1ca5e656cd3223240e232767762ea

        SHA1

        0e52da74d0a30764cd88a2db1b2857f7f6cf971d

        SHA256

        ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a

        SHA512

        24a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c

      • memory/1196-148-0x0000000007350000-0x00000000078F4000-memory.dmp

        Filesize

        5.6MB

      • memory/1196-149-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/1196-150-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-152-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-151-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-153-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-154-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-156-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-158-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-160-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-162-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-164-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-166-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-168-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-170-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-172-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-174-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-176-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-178-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-180-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/1196-181-0x0000000000400000-0x0000000002BA6000-memory.dmp

        Filesize

        39.6MB

      • memory/1196-182-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-183-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-184-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/1196-186-0x0000000000400000-0x0000000002BA6000-memory.dmp

        Filesize

        39.6MB

      • memory/2708-191-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-192-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-194-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-196-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-198-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-200-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-202-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-204-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-206-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-208-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-210-0x0000000002CD0000-0x0000000002D16000-memory.dmp

        Filesize

        280KB

      • memory/2708-212-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/2708-211-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-215-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/2708-216-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-214-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/2708-218-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-220-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-222-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-224-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-226-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-228-0x0000000004A90000-0x0000000004AC5000-memory.dmp

        Filesize

        212KB

      • memory/2708-987-0x0000000009CF0000-0x000000000A308000-memory.dmp

        Filesize

        6.1MB

      • memory/2708-988-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/2708-989-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/2708-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/2708-991-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/2708-992-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/2708-993-0x000000000AE00000-0x000000000AE92000-memory.dmp

        Filesize

        584KB

      • memory/2708-994-0x000000000AFE0000-0x000000000B056000-memory.dmp

        Filesize

        472KB

      • memory/2708-995-0x000000000B0C0000-0x000000000B282000-memory.dmp

        Filesize

        1.8MB

      • memory/2708-996-0x000000000B290000-0x000000000B7BC000-memory.dmp

        Filesize

        5.2MB

      • memory/2708-997-0x000000000B8E0000-0x000000000B8FE000-memory.dmp

        Filesize

        120KB

      • memory/2708-998-0x0000000006C30000-0x0000000006C80000-memory.dmp

        Filesize

        320KB

      • memory/4440-1005-0x0000000000CD0000-0x0000000000CF8000-memory.dmp

        Filesize

        160KB

      • memory/4440-1006-0x0000000007AF0000-0x0000000007B00000-memory.dmp

        Filesize

        64KB