Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 01:50

General

  • Target

    5c8ed9a26091944304cbddae9644a6efca9af124603588ad42c4e020c5ecf4fe.exe

  • Size

    1.0MB

  • MD5

    56578f90b05876cd9cd5c8590dc1b6d8

  • SHA1

    68ff1addc201260db68c1299d1a88be91bef3d4e

  • SHA256

    5c8ed9a26091944304cbddae9644a6efca9af124603588ad42c4e020c5ecf4fe

  • SHA512

    c4091c739a824d256561ff21a6adfab06575296a885eee9573b44cb8eeb021c07afa2a2d4b4d10cf145a152074bb497b5b078c0f3cad2406924e74b38f0e9fe0

  • SSDEEP

    24576:byLNYSQNvkReZrPrZz7/xgQ1vgVpZB8N:OL+SQBkOD5/yK

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c8ed9a26091944304cbddae9644a6efca9af124603588ad42c4e020c5ecf4fe.exe
    "C:\Users\Admin\AppData\Local\Temp\5c8ed9a26091944304cbddae9644a6efca9af124603588ad42c4e020c5ecf4fe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430064.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430064.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609990.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609990.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr508226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr508226.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu267710.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu267710.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk602503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk602503.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742230.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742230.exe
      2⤵
      • Executes dropped EXE
      PID:3996
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 616
        3⤵
        • Program crash
        PID:3544
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 696
        3⤵
        • Program crash
        PID:3960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 840
        3⤵
        • Program crash
        PID:4380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 844
        3⤵
        • Program crash
        PID:4256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 872
        3⤵
        • Program crash
        PID:2652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 884
        3⤵
        • Program crash
        PID:3000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1068
        3⤵
        • Program crash
        PID:4772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742230.exe

          Filesize

          370KB

          MD5

          cd170dedcb92ebe2166ece87ca14fe55

          SHA1

          17934580602bdaa3f573d89fe4d5c1a1ad490e4f

          SHA256

          a21807cd9034245dac4479880b0cce5868f1fb538f31bfff02e479e3aa8308e6

          SHA512

          af9f3d18e6a5135804d06085d6bca3719329c2301c8ee6d7167c05bdeb217a38e3be3d139c225dad2c97de29fe8281183e6a0fd84fed51d1c3d1cd4dce68b789

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742230.exe

          Filesize

          370KB

          MD5

          cd170dedcb92ebe2166ece87ca14fe55

          SHA1

          17934580602bdaa3f573d89fe4d5c1a1ad490e4f

          SHA256

          a21807cd9034245dac4479880b0cce5868f1fb538f31bfff02e479e3aa8308e6

          SHA512

          af9f3d18e6a5135804d06085d6bca3719329c2301c8ee6d7167c05bdeb217a38e3be3d139c225dad2c97de29fe8281183e6a0fd84fed51d1c3d1cd4dce68b789

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430064.exe

          Filesize

          751KB

          MD5

          833666e6fd3c8fac0653abb186105e87

          SHA1

          966a7f14575a8cc7a4061ef2f458f8e55f989a0f

          SHA256

          1311f0df23662afa74be9541628a7ef2b3ce355a60c592bffce8d6d0b88e272d

          SHA512

          5fadc12ef166372fb96bcfec7787a252c9442db1319a699e5fd064ddd6a8a7e9b6d001b34db3602266c7fec1a5ab2059b18eb914b32a76df19233ebdb3d7046e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430064.exe

          Filesize

          751KB

          MD5

          833666e6fd3c8fac0653abb186105e87

          SHA1

          966a7f14575a8cc7a4061ef2f458f8e55f989a0f

          SHA256

          1311f0df23662afa74be9541628a7ef2b3ce355a60c592bffce8d6d0b88e272d

          SHA512

          5fadc12ef166372fb96bcfec7787a252c9442db1319a699e5fd064ddd6a8a7e9b6d001b34db3602266c7fec1a5ab2059b18eb914b32a76df19233ebdb3d7046e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk602503.exe

          Filesize

          136KB

          MD5

          ac0ffc4fceebe7be421ae8fc8517d1bf

          SHA1

          fa6a6f1878e561b5401ae36422add3d34cfdf6dd

          SHA256

          fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

          SHA512

          23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk602503.exe

          Filesize

          136KB

          MD5

          ac0ffc4fceebe7be421ae8fc8517d1bf

          SHA1

          fa6a6f1878e561b5401ae36422add3d34cfdf6dd

          SHA256

          fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

          SHA512

          23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609990.exe

          Filesize

          597KB

          MD5

          a91dd27887218a07a7edd9a6959414c9

          SHA1

          5592d24fdec84d29fc2e9a26deb66e0583d906ee

          SHA256

          9eab49721cec2ecf8e7902826ea1873f4e84d2a70e3c7e228a1916643905f79c

          SHA512

          3d99bd6d749ad9d669cdd0a1e9ac190d7e6124c6f7e1f38f5f94c573b094832126840260ee93e83b5ec88315bc82ab8871af8a129fdbbc73443e91ca14005196

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609990.exe

          Filesize

          597KB

          MD5

          a91dd27887218a07a7edd9a6959414c9

          SHA1

          5592d24fdec84d29fc2e9a26deb66e0583d906ee

          SHA256

          9eab49721cec2ecf8e7902826ea1873f4e84d2a70e3c7e228a1916643905f79c

          SHA512

          3d99bd6d749ad9d669cdd0a1e9ac190d7e6124c6f7e1f38f5f94c573b094832126840260ee93e83b5ec88315bc82ab8871af8a129fdbbc73443e91ca14005196

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr508226.exe

          Filesize

          391KB

          MD5

          278680f15530cb68594fd06ca913c334

          SHA1

          62fd9d15f260e58125d4f7e49415195a8b31bc41

          SHA256

          37545a83140b7db32f283c5170b4539ea8d91165d08e181154953afe3091e0e8

          SHA512

          03a8b367fe8060a5101915159c624a06c5b823893464c71ec665fefc8802869953dd6db31dd05281797366c72202016790116f22f69c888bdd497c5d78edac69

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr508226.exe

          Filesize

          391KB

          MD5

          278680f15530cb68594fd06ca913c334

          SHA1

          62fd9d15f260e58125d4f7e49415195a8b31bc41

          SHA256

          37545a83140b7db32f283c5170b4539ea8d91165d08e181154953afe3091e0e8

          SHA512

          03a8b367fe8060a5101915159c624a06c5b823893464c71ec665fefc8802869953dd6db31dd05281797366c72202016790116f22f69c888bdd497c5d78edac69

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu267710.exe

          Filesize

          474KB

          MD5

          2aeb21cdc71b9fb02507b6f04403251e

          SHA1

          4468eef8801b8246efc522062a97b19db80771a8

          SHA256

          492eadd452d888347f650be03ea643cafe54043d54d589b2fdfb1fbf087265b1

          SHA512

          bf7b694b6276a6b92bb70f8466dc5cc1b0ae1a772ee7bd5b90ee28167b47a42de48186e8d1145d92d772573c66ec3e3aaeb13fa5bd5b56b57e3a1f7347f420d8

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu267710.exe

          Filesize

          474KB

          MD5

          2aeb21cdc71b9fb02507b6f04403251e

          SHA1

          4468eef8801b8246efc522062a97b19db80771a8

          SHA256

          492eadd452d888347f650be03ea643cafe54043d54d589b2fdfb1fbf087265b1

          SHA512

          bf7b694b6276a6b92bb70f8466dc5cc1b0ae1a772ee7bd5b90ee28167b47a42de48186e8d1145d92d772573c66ec3e3aaeb13fa5bd5b56b57e3a1f7347f420d8

        • memory/3996-1007-0x0000000000920000-0x0000000000955000-memory.dmp

          Filesize

          212KB

        • memory/4028-982-0x0000000007850000-0x0000000007862000-memory.dmp

          Filesize

          72KB

        • memory/4028-984-0x00000000079A0000-0x00000000079DE000-memory.dmp

          Filesize

          248KB

        • memory/4028-993-0x00000000047E0000-0x0000000004830000-memory.dmp

          Filesize

          320KB

        • memory/4028-992-0x0000000009320000-0x000000000933E000-memory.dmp

          Filesize

          120KB

        • memory/4028-991-0x0000000008CE0000-0x000000000920C000-memory.dmp

          Filesize

          5.2MB

        • memory/4028-990-0x0000000008B00000-0x0000000008CC2000-memory.dmp

          Filesize

          1.8MB

        • memory/4028-989-0x0000000008A40000-0x0000000008AB6000-memory.dmp

          Filesize

          472KB

        • memory/4028-988-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/4028-987-0x0000000007CB0000-0x0000000007D16000-memory.dmp

          Filesize

          408KB

        • memory/4028-986-0x0000000007B20000-0x0000000007B6B000-memory.dmp

          Filesize

          300KB

        • memory/4028-985-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/4028-983-0x0000000007880000-0x000000000798A000-memory.dmp

          Filesize

          1.0MB

        • memory/4028-981-0x0000000007DF0000-0x00000000083F6000-memory.dmp

          Filesize

          6.0MB

        • memory/4028-222-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-220-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-218-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-216-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-214-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-212-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-183-0x0000000002550000-0x000000000258C000-memory.dmp

          Filesize

          240KB

        • memory/4028-184-0x0000000004C80000-0x0000000004CBA000-memory.dmp

          Filesize

          232KB

        • memory/4028-186-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-188-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-185-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-190-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-192-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-194-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-197-0x0000000000820000-0x0000000000866000-memory.dmp

          Filesize

          280KB

        • memory/4028-196-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-198-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/4028-200-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/4028-201-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-204-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-202-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/4028-206-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-208-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4028-210-0x0000000004C80000-0x0000000004CB5000-memory.dmp

          Filesize

          212KB

        • memory/4372-999-0x0000000000E50000-0x0000000000E78000-memory.dmp

          Filesize

          160KB

        • memory/4372-1001-0x0000000007B70000-0x0000000007B80000-memory.dmp

          Filesize

          64KB

        • memory/4372-1000-0x0000000007C00000-0x0000000007C4B000-memory.dmp

          Filesize

          300KB

        • memory/4884-163-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-159-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-173-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-171-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-148-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/4884-169-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-150-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-167-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-165-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-146-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-161-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-175-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-157-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-155-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-153-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-149-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/4884-145-0x00000000029E0000-0x00000000029F2000-memory.dmp

          Filesize

          72KB

        • memory/4884-144-0x00000000029E0000-0x00000000029F8000-memory.dmp

          Filesize

          96KB

        • memory/4884-176-0x0000000000400000-0x0000000000807000-memory.dmp

          Filesize

          4.0MB

        • memory/4884-178-0x0000000000400000-0x0000000000807000-memory.dmp

          Filesize

          4.0MB

        • memory/4884-152-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/4884-143-0x0000000004F30000-0x000000000542E000-memory.dmp

          Filesize

          5.0MB

        • memory/4884-142-0x00000000024E0000-0x00000000024FA000-memory.dmp

          Filesize

          104KB

        • memory/4884-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB