Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-04-2023 22:40

General

  • Target

    1150d293e218270617975a6473294c1f2c6beef850e2e070532388f0ca794e67.exe

  • Size

    694KB

  • MD5

    d8abb0660d393fdfeacc466d46828822

  • SHA1

    f355639c3f5bcd9c824e7e1c70ddea0281f0f502

  • SHA256

    1150d293e218270617975a6473294c1f2c6beef850e2e070532388f0ca794e67

  • SHA512

    d2f920c1b45d7a53d79313fbd13f2d031ff75824840f56d6b26a4384492a6b59577339d189240d8e7356edafd4cc5a9fada2bf9eef07ea07a4b8131ff13b1a74

  • SSDEEP

    12288:Ty90fzbM8oGvSUWvzdEORMduSBGC2fB8F+JpceBLQABIRCSb:TyGLoGvSUW0RBB2pa+JpBBLHBSCSb

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1150d293e218270617975a6473294c1f2c6beef850e2e070532388f0ca794e67.exe
    "C:\Users\Admin\AppData\Local\Temp\1150d293e218270617975a6473294c1f2c6beef850e2e070532388f0ca794e67.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un516547.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un516547.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr888398.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr888398.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu884840.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu884840.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645084.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645084.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645084.exe

    Filesize

    136KB

    MD5

    9c75a048f066d01b19ed80dc6e7a7101

    SHA1

    7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

    SHA256

    c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

    SHA512

    b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si645084.exe

    Filesize

    136KB

    MD5

    9c75a048f066d01b19ed80dc6e7a7101

    SHA1

    7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

    SHA256

    c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

    SHA512

    b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un516547.exe

    Filesize

    541KB

    MD5

    962143872eddc595d354c37ac7e4bc63

    SHA1

    d3466b3c3c83543ead435cf06e424b7e7b3dfc38

    SHA256

    56b2742373a6af686c3186fbd46421ee41504d1ba0fb35376490f6cccb4ac9f0

    SHA512

    b4f89fa0bfdd3af053c0a31b6ca269c5e11bc847c6282b22014995d3bcef2a7df14739b2c180e72d0a9943ca28f1c0ed60da285e903e66df8910b7c8726e7e9f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un516547.exe

    Filesize

    541KB

    MD5

    962143872eddc595d354c37ac7e4bc63

    SHA1

    d3466b3c3c83543ead435cf06e424b7e7b3dfc38

    SHA256

    56b2742373a6af686c3186fbd46421ee41504d1ba0fb35376490f6cccb4ac9f0

    SHA512

    b4f89fa0bfdd3af053c0a31b6ca269c5e11bc847c6282b22014995d3bcef2a7df14739b2c180e72d0a9943ca28f1c0ed60da285e903e66df8910b7c8726e7e9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr888398.exe

    Filesize

    277KB

    MD5

    e0e1cf8f1be490a57e2147752eea65e6

    SHA1

    82c7835119e4f5b018026e8f8dd6ac11ad682863

    SHA256

    9b0eede3c827f8d7ec313c7e509d3ad38ceb1d6b227af78a3d8fe9345dc240f6

    SHA512

    cc3283f113adefc73d5a46fc02d969dbdc3ddef5bec530dd20b25c82ee09c9c2eff9805e7b415b33a2ffb2f1d48308923a7e19fa6f0d5336ef3fbdff840eb5bc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr888398.exe

    Filesize

    277KB

    MD5

    e0e1cf8f1be490a57e2147752eea65e6

    SHA1

    82c7835119e4f5b018026e8f8dd6ac11ad682863

    SHA256

    9b0eede3c827f8d7ec313c7e509d3ad38ceb1d6b227af78a3d8fe9345dc240f6

    SHA512

    cc3283f113adefc73d5a46fc02d969dbdc3ddef5bec530dd20b25c82ee09c9c2eff9805e7b415b33a2ffb2f1d48308923a7e19fa6f0d5336ef3fbdff840eb5bc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu884840.exe

    Filesize

    360KB

    MD5

    05cdc5748d36de9e0b326c3a836aa170

    SHA1

    c822f7c2f6cbb86f878e46b92e23ed902e9b6b11

    SHA256

    97405eb5e27c5473c2f490507e3db401daef5ba74d5a57c89140f6e27f114781

    SHA512

    f7012325334681f0e4de61d7bd0ec5031c6e65218d9b04f01a120da11140693cdf3860f85a02b7fdc979fc5c9988dbaf8959bcc1710b3d028c4e17e7d9a1eb33

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu884840.exe

    Filesize

    360KB

    MD5

    05cdc5748d36de9e0b326c3a836aa170

    SHA1

    c822f7c2f6cbb86f878e46b92e23ed902e9b6b11

    SHA256

    97405eb5e27c5473c2f490507e3db401daef5ba74d5a57c89140f6e27f114781

    SHA512

    f7012325334681f0e4de61d7bd0ec5031c6e65218d9b04f01a120da11140693cdf3860f85a02b7fdc979fc5c9988dbaf8959bcc1710b3d028c4e17e7d9a1eb33

  • memory/4144-994-0x0000000000460000-0x0000000000488000-memory.dmp

    Filesize

    160KB

  • memory/4144-995-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/4144-996-0x00000000071E0000-0x000000000722B000-memory.dmp

    Filesize

    300KB

  • memory/4312-147-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-159-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-138-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-139-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-141-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-143-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-145-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-136-0x0000000007290000-0x000000000778E000-memory.dmp

    Filesize

    5.0MB

  • memory/4312-149-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-151-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-153-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-155-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-157-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-137-0x0000000004A60000-0x0000000004A78000-memory.dmp

    Filesize

    96KB

  • memory/4312-161-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-163-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-165-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/4312-166-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/4312-167-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/4312-168-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/4312-169-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/4312-171-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/4312-172-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/4312-135-0x0000000002F50000-0x0000000002F6A000-memory.dmp

    Filesize

    104KB

  • memory/4312-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4580-180-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-617-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4580-182-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-184-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-186-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-188-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-190-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-192-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-194-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-196-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-198-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-200-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-202-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-204-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-206-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-208-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-210-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-212-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-615-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/4580-179-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/4580-621-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4580-619-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4580-975-0x0000000009B90000-0x000000000A196000-memory.dmp

    Filesize

    6.0MB

  • memory/4580-976-0x000000000A210000-0x000000000A222000-memory.dmp

    Filesize

    72KB

  • memory/4580-977-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4580-978-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/4580-979-0x000000000A4E0000-0x000000000A52B000-memory.dmp

    Filesize

    300KB

  • memory/4580-980-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4580-981-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4580-982-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/4580-983-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/4580-984-0x000000000AE40000-0x000000000AEB6000-memory.dmp

    Filesize

    472KB

  • memory/4580-178-0x0000000007130000-0x000000000716A000-memory.dmp

    Filesize

    232KB

  • memory/4580-177-0x00000000070B0000-0x00000000070EC000-memory.dmp

    Filesize

    240KB

  • memory/4580-985-0x000000000AF00000-0x000000000B0C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4580-986-0x000000000B0E0000-0x000000000B60C000-memory.dmp

    Filesize

    5.2MB

  • memory/4580-987-0x000000000B720000-0x000000000B73E000-memory.dmp

    Filesize

    120KB