Analysis

  • max time kernel
    90s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2023 23:07

General

  • Target

    122d2525627cafee22c2b30fbb83fe2b723dad8561ca044afeb69bdebf0faafa.exe

  • Size

    695KB

  • MD5

    5b2ad5cca6fb9acea47d7272a17d120a

  • SHA1

    da3adee3b18280190f2f219e9c3ba105ff0c5a78

  • SHA256

    122d2525627cafee22c2b30fbb83fe2b723dad8561ca044afeb69bdebf0faafa

  • SHA512

    6a682e3896de547247c13b0693df9711392b2fb194f9dc455f01a710be90598db9746492a20089acd8e07407055622805c25ca19e7b8f9884729d443ce1f4fe8

  • SSDEEP

    12288:My90CevM+/JL9PlN0pl2IDbUZrFNY+2yy+gDLXcNxfBcFY5pcpBL7/d7qZ:My35KPlal2IHUlFp2yWDLXkxp6Y5pKBE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\122d2525627cafee22c2b30fbb83fe2b723dad8561ca044afeb69bdebf0faafa.exe
    "C:\Users\Admin\AppData\Local\Temp\122d2525627cafee22c2b30fbb83fe2b723dad8561ca044afeb69bdebf0faafa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790436.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790436.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr228724.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr228724.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1004
          4⤵
          • Program crash
          PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu012724.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu012724.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1320
          4⤵
          • Program crash
          PID:2576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255972.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255972.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2536 -ip 2536
    1⤵
      PID:3620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4552 -ip 4552
      1⤵
        PID:3444

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255972.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255972.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790436.exe

        Filesize

        541KB

        MD5

        bf101280e5335e05e904ec3868e5d99f

        SHA1

        1e16a5da766141ef13b6b6675e9ee5ee078351f5

        SHA256

        017bd36e55c725c9ca9b9de843d3278d8b59a177998c6819fa243e86bccd9533

        SHA512

        8fda96639fe7f047991484671ab7b4d07108dd03ab3846648440514a64c47ce3c2415847eb5b1a8b529a2db65486cd776df6c5ef949096dc52ad0ddb35938989

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790436.exe

        Filesize

        541KB

        MD5

        bf101280e5335e05e904ec3868e5d99f

        SHA1

        1e16a5da766141ef13b6b6675e9ee5ee078351f5

        SHA256

        017bd36e55c725c9ca9b9de843d3278d8b59a177998c6819fa243e86bccd9533

        SHA512

        8fda96639fe7f047991484671ab7b4d07108dd03ab3846648440514a64c47ce3c2415847eb5b1a8b529a2db65486cd776df6c5ef949096dc52ad0ddb35938989

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr228724.exe

        Filesize

        277KB

        MD5

        7200722278b7b912ba2bf05a2f76104e

        SHA1

        1c70b05c37cddcdb55393d833e7b696158c7d608

        SHA256

        9f9327c25fbdc495eba18bad74336aee5c7c58fd0625640c56fe0685713c60da

        SHA512

        2186e3e0e5958e6e828663ba96ed7cb8a769ed8047381dfbe2f01c991977f88b3d84e9df6d9ea5e42dc7bfe8fc4827610be84b38a00e0915ed404cd7dd226136

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr228724.exe

        Filesize

        277KB

        MD5

        7200722278b7b912ba2bf05a2f76104e

        SHA1

        1c70b05c37cddcdb55393d833e7b696158c7d608

        SHA256

        9f9327c25fbdc495eba18bad74336aee5c7c58fd0625640c56fe0685713c60da

        SHA512

        2186e3e0e5958e6e828663ba96ed7cb8a769ed8047381dfbe2f01c991977f88b3d84e9df6d9ea5e42dc7bfe8fc4827610be84b38a00e0915ed404cd7dd226136

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu012724.exe

        Filesize

        360KB

        MD5

        52a4adc4dcc81e387ca7d193b1c62418

        SHA1

        60e6bdfd0eb7bdbf4befb9b7521a4214633d10f7

        SHA256

        88db0eca5f2a754756786728254cf3c64c810be4bc32ae9dce4696cf6529f5a5

        SHA512

        f3d4478d68cec2bf14a241ec88e88b0dffde87e009d2faf770b67c9855802537d87b5237b381347e8dadad6f7e3f7f6908bb1e2a3910d802e4268748535f9e20

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu012724.exe

        Filesize

        360KB

        MD5

        52a4adc4dcc81e387ca7d193b1c62418

        SHA1

        60e6bdfd0eb7bdbf4befb9b7521a4214633d10f7

        SHA256

        88db0eca5f2a754756786728254cf3c64c810be4bc32ae9dce4696cf6529f5a5

        SHA512

        f3d4478d68cec2bf14a241ec88e88b0dffde87e009d2faf770b67c9855802537d87b5237b381347e8dadad6f7e3f7f6908bb1e2a3910d802e4268748535f9e20

      • memory/2536-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

        Filesize

        180KB

      • memory/2536-149-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2536-150-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2536-151-0x0000000007420000-0x00000000079C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2536-152-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-153-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-155-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-157-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-159-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-161-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-163-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-165-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-167-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-169-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-171-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-173-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-175-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-177-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-179-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/2536-180-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/2536-182-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/2676-1001-0x00000000000D0000-0x00000000000F8000-memory.dmp

        Filesize

        160KB

      • memory/2676-1002-0x0000000006EF0000-0x0000000006F00000-memory.dmp

        Filesize

        64KB

      • memory/4552-188-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/4552-218-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-190-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/4552-191-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-192-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-194-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-196-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-198-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-200-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-204-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-202-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-206-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-208-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-210-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-212-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-214-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-216-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-189-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/4552-220-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-222-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-224-0x00000000071E0000-0x0000000007215000-memory.dmp

        Filesize

        212KB

      • memory/4552-983-0x0000000009D00000-0x000000000A318000-memory.dmp

        Filesize

        6.1MB

      • memory/4552-984-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/4552-985-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/4552-986-0x000000000A470000-0x000000000A4AC000-memory.dmp

        Filesize

        240KB

      • memory/4552-987-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/4552-988-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/4552-989-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/4552-991-0x000000000B010000-0x000000000B086000-memory.dmp

        Filesize

        472KB

      • memory/4552-992-0x000000000B0D0000-0x000000000B0EE000-memory.dmp

        Filesize

        120KB

      • memory/4552-187-0x0000000002CE0000-0x0000000002D26000-memory.dmp

        Filesize

        280KB

      • memory/4552-993-0x000000000B2F0000-0x000000000B4B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4552-994-0x000000000B4C0000-0x000000000B9EC000-memory.dmp

        Filesize

        5.2MB

      • memory/4552-995-0x0000000004C20000-0x0000000004C70000-memory.dmp

        Filesize

        320KB