Analysis

  • max time kernel
    141s
  • max time network
    98s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-04-2023 00:04

General

  • Target

    239e24be8110cb529ae4e8556cd6e9e3c2b03f89ee2262a233c6934699e3b9fb.exe

  • Size

    1.0MB

  • MD5

    59a38c9d61dfdf505b1db05731546959

  • SHA1

    70db877d7199fb92575e9f660607818a36b02a67

  • SHA256

    239e24be8110cb529ae4e8556cd6e9e3c2b03f89ee2262a233c6934699e3b9fb

  • SHA512

    a6544ce4cac04a5327c6fda4d37321caaa115fe7114e0f9d2e08bf8aec88286047b485c102560c09e603d1d4a6bbb60cb641b05eec40fe88ecb3ad25ab7fe4f7

  • SSDEEP

    24576:WyBS3oDpEJkqN17qsOsgrKrAEZqWXKXsheS6sPPBGty4:lBS3OEZN17qpi8yqWakj8t

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\239e24be8110cb529ae4e8556cd6e9e3c2b03f89ee2262a233c6934699e3b9fb.exe
    "C:\Users\Admin\AppData\Local\Temp\239e24be8110cb529ae4e8556cd6e9e3c2b03f89ee2262a233c6934699e3b9fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un250653.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un250653.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un277217.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un277217.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4132
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr116621.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr116621.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu583409.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu583409.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601469.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601469.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692141.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692141.exe
      2⤵
      • Executes dropped EXE
      PID:5036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 616
        3⤵
        • Program crash
        PID:3664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 696
        3⤵
        • Program crash
        PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 796
        3⤵
        • Program crash
        PID:1512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 840
        3⤵
        • Program crash
        PID:2852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 880
        3⤵
        • Program crash
        PID:2980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 856
        3⤵
        • Program crash
        PID:3900
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1124
        3⤵
        • Program crash
        PID:4184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1204
        3⤵
        • Program crash
        PID:2484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1180
        3⤵
        • Program crash
        PID:4700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692141.exe

    Filesize

    370KB

    MD5

    bb99d2b28449fd0a508c7d58762415bc

    SHA1

    4d92310992bf4070260af105b4128bd27ec4cb50

    SHA256

    e55c6a07cd65745491c0f42ea5459890f101e6895f8e2f7e1da0ebf442dbc4d0

    SHA512

    3a07db5fc7b5f538ae3619efb2ff987ddcf40f2199eeded69ca60bc84ee7f6f338be4827b4f7c7e3f77f992af6f16e2d78be66b00a4ed1c5c2f6bd41f1f64aa4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692141.exe

    Filesize

    370KB

    MD5

    bb99d2b28449fd0a508c7d58762415bc

    SHA1

    4d92310992bf4070260af105b4128bd27ec4cb50

    SHA256

    e55c6a07cd65745491c0f42ea5459890f101e6895f8e2f7e1da0ebf442dbc4d0

    SHA512

    3a07db5fc7b5f538ae3619efb2ff987ddcf40f2199eeded69ca60bc84ee7f6f338be4827b4f7c7e3f77f992af6f16e2d78be66b00a4ed1c5c2f6bd41f1f64aa4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un250653.exe

    Filesize

    752KB

    MD5

    f969e4b5f0e6e7f80d2158b85ebcbdcd

    SHA1

    8dfdab62e9afee7d1d57144e89346e54038e73c7

    SHA256

    3cc915ef76078a1cd47ccc0660def8623ffe3eddfa0f84147459b4d73841bd5d

    SHA512

    d47e1869dd8ec65781f76d6f265c5d45506b32455cbe26fbeccaecceb862f3afa5feff3f2cca2831ae0f06c702081ef10ef286952f05f17f64d8a9be67883c67

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un250653.exe

    Filesize

    752KB

    MD5

    f969e4b5f0e6e7f80d2158b85ebcbdcd

    SHA1

    8dfdab62e9afee7d1d57144e89346e54038e73c7

    SHA256

    3cc915ef76078a1cd47ccc0660def8623ffe3eddfa0f84147459b4d73841bd5d

    SHA512

    d47e1869dd8ec65781f76d6f265c5d45506b32455cbe26fbeccaecceb862f3afa5feff3f2cca2831ae0f06c702081ef10ef286952f05f17f64d8a9be67883c67

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601469.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601469.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un277217.exe

    Filesize

    597KB

    MD5

    3447b6ae491639f492a2f103b6b9fecd

    SHA1

    a698cc582d7a312c05118ec8f589194d2d62c150

    SHA256

    1e7bfcf9b928389aed09966f766e38791392ab07d3516aa74f016903f9b14928

    SHA512

    cba3396539fe902283cabfe702779a60cb184098f04f1c35ac9176ec8bf628fe3e71caadcbab65099c93ee2539bba20798b19423062b80861dd9b4b12c2100ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un277217.exe

    Filesize

    597KB

    MD5

    3447b6ae491639f492a2f103b6b9fecd

    SHA1

    a698cc582d7a312c05118ec8f589194d2d62c150

    SHA256

    1e7bfcf9b928389aed09966f766e38791392ab07d3516aa74f016903f9b14928

    SHA512

    cba3396539fe902283cabfe702779a60cb184098f04f1c35ac9176ec8bf628fe3e71caadcbab65099c93ee2539bba20798b19423062b80861dd9b4b12c2100ae

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr116621.exe

    Filesize

    391KB

    MD5

    bc3435b2f8883fa6ae9bd29f467542da

    SHA1

    870f2a62065ba8c2489aa27b0749689eaef1ee7b

    SHA256

    fae48445ed01bd8277d8b5ba585e24f3974f3b705e8c5bb199cda7b388c9f5ba

    SHA512

    f22c12e9d5f41812f803e9585882473302092306b907047342c9b900723836e26437da433ce9ef44a36b791127aba5dc4b4a6da164b53c734d85c254b63c6fca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr116621.exe

    Filesize

    391KB

    MD5

    bc3435b2f8883fa6ae9bd29f467542da

    SHA1

    870f2a62065ba8c2489aa27b0749689eaef1ee7b

    SHA256

    fae48445ed01bd8277d8b5ba585e24f3974f3b705e8c5bb199cda7b388c9f5ba

    SHA512

    f22c12e9d5f41812f803e9585882473302092306b907047342c9b900723836e26437da433ce9ef44a36b791127aba5dc4b4a6da164b53c734d85c254b63c6fca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu583409.exe

    Filesize

    473KB

    MD5

    6e2c3e1687cf57b27384e2f2777bc491

    SHA1

    3fe602b08bb650bfff86a1abbb0af725854670f5

    SHA256

    1443a828145f472933fe087f82d63a0ba94cd5b43d9a70c003550b2e40e6fd61

    SHA512

    aa3e15d5944d4b14edc9b2db80c674ea490fee44f4c7845648780353b8b99cd3b852a85501a48168bea57fb3cb75d1951fdb59bced4afb8ec08647030ef28ec9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu583409.exe

    Filesize

    473KB

    MD5

    6e2c3e1687cf57b27384e2f2777bc491

    SHA1

    3fe602b08bb650bfff86a1abbb0af725854670f5

    SHA256

    1443a828145f472933fe087f82d63a0ba94cd5b43d9a70c003550b2e40e6fd61

    SHA512

    aa3e15d5944d4b14edc9b2db80c674ea490fee44f4c7845648780353b8b99cd3b852a85501a48168bea57fb3cb75d1951fdb59bced4afb8ec08647030ef28ec9

  • memory/3476-1005-0x0000000007430000-0x0000000007440000-memory.dmp

    Filesize

    64KB

  • memory/3476-1004-0x00000000070A0000-0x00000000070EB000-memory.dmp

    Filesize

    300KB

  • memory/3476-1003-0x0000000000320000-0x0000000000348000-memory.dmp

    Filesize

    160KB

  • memory/3600-984-0x00000000077C0000-0x0000000007DC6000-memory.dmp

    Filesize

    6.0MB

  • memory/3600-988-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/3600-997-0x0000000004730000-0x0000000004780000-memory.dmp

    Filesize

    320KB

  • memory/3600-995-0x0000000008E80000-0x00000000093AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3600-994-0x0000000008CB0000-0x0000000008E72000-memory.dmp

    Filesize

    1.8MB

  • memory/3600-993-0x0000000008AE0000-0x0000000008AFE000-memory.dmp

    Filesize

    120KB

  • memory/3600-992-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/3600-991-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/3600-990-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/3600-989-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3600-987-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/3600-986-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3600-985-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/3600-240-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3600-238-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3600-236-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3600-235-0x0000000000A10000-0x0000000000A56000-memory.dmp

    Filesize

    280KB

  • memory/3600-221-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-186-0x00000000025D0000-0x000000000260C000-memory.dmp

    Filesize

    240KB

  • memory/3600-187-0x00000000052B0000-0x00000000052EA000-memory.dmp

    Filesize

    232KB

  • memory/3600-188-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-189-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-191-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-193-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-195-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-197-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-199-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-201-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-203-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-205-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-207-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-209-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-211-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-213-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-215-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-217-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/3600-219-0x00000000052B0000-0x00000000052E5000-memory.dmp

    Filesize

    212KB

  • memory/4956-164-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-181-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4956-176-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-166-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-178-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/4956-150-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-177-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4956-149-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-158-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-170-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-160-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-162-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-156-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-154-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-179-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/4956-172-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-174-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-168-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-152-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4956-146-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/4956-148-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/4956-147-0x00000000027F0000-0x0000000002808000-memory.dmp

    Filesize

    96KB

  • memory/4956-145-0x0000000004E00000-0x00000000052FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4956-144-0x0000000002490000-0x00000000024AA000-memory.dmp

    Filesize

    104KB

  • memory/4956-143-0x0000000000910000-0x000000000093D000-memory.dmp

    Filesize

    180KB

  • memory/5036-1011-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB