Analysis

  • max time kernel
    144s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-04-2023 02:33

General

  • Target

    5531f0819eb797f0c0ccdf7faebbbc44bf0a0a3623d04e165acb2b42d46e2b9a.exe

  • Size

    922KB

  • MD5

    3570419adaa5e4015037646875c059c6

  • SHA1

    687cfe6fe6ceda2e93f2e0d6943bb129bbb5a2bb

  • SHA256

    5531f0819eb797f0c0ccdf7faebbbc44bf0a0a3623d04e165acb2b42d46e2b9a

  • SHA512

    97c5550ced2b950aa7b8bb70c3af83abc1bd4f045b50fcdc51736c7be7854744ce15c95a792d1d7ffc68942ed4c78a7137cf87cd5953cb58f197d91be38518a4

  • SSDEEP

    12288:jy90TAjv74XhP/2RzhomqJor6wpgou5HnSktGIWwzZX6O7cv1qVkH0lanqep:jylUp2R2yTpgBvtTQO4tqCH0lanD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5531f0819eb797f0c0ccdf7faebbbc44bf0a0a3623d04e165acb2b42d46e2b9a.exe
    "C:\Users\Admin\AppData\Local\Temp\5531f0819eb797f0c0ccdf7faebbbc44bf0a0a3623d04e165acb2b42d46e2b9a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizT1527.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizT1527.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicK7292.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicK7292.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807037.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807037.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3608
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr501758.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr501758.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp057969.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp057969.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312077.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312077.exe
      2⤵
      • Executes dropped EXE
      PID:2644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 616
        3⤵
        • Program crash
        PID:3660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 696
        3⤵
        • Program crash
        PID:2156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 840
        3⤵
        • Program crash
        PID:4460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 884
        3⤵
        • Program crash
        PID:4904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 828
        3⤵
        • Program crash
        PID:2144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 824
        3⤵
        • Program crash
        PID:3576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 1072
        3⤵
        • Program crash
        PID:2124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312077.exe

    Filesize

    370KB

    MD5

    3d45ea007da32e516089ed0939f4b70c

    SHA1

    acbce9003b05ac1e01d3f7232295632f152ebe42

    SHA256

    7c1f41def4248bb74e5d86f83b872b4204fabcf279a16ca2ae87305d59814b7e

    SHA512

    75143559e1446b624e8b311df16e924a120dbefe646251c3c041b1ade6c145a9534041c071109b48d466ac5e1c7095beea64052c33b430f1f1ce55c75476b487

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312077.exe

    Filesize

    370KB

    MD5

    3d45ea007da32e516089ed0939f4b70c

    SHA1

    acbce9003b05ac1e01d3f7232295632f152ebe42

    SHA256

    7c1f41def4248bb74e5d86f83b872b4204fabcf279a16ca2ae87305d59814b7e

    SHA512

    75143559e1446b624e8b311df16e924a120dbefe646251c3c041b1ade6c145a9534041c071109b48d466ac5e1c7095beea64052c33b430f1f1ce55c75476b487

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizT1527.exe

    Filesize

    616KB

    MD5

    33bd012ff34c2cfb3421c97b7de6ff95

    SHA1

    12ed44f66a1c68d8e39e21d9bf48136fc71fd6a6

    SHA256

    a258e85939e0068496e4dc03097068f690f28cce71c73a8ae25fdba46d04268d

    SHA512

    a42095d971ab1de48287f1f8770b4f28f7a6552adaaa18c5b3710365fececfaf625a2107ebbb51222b6c0cd0994480f899ce7c1cc1c296d954d23e03bea88f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizT1527.exe

    Filesize

    616KB

    MD5

    33bd012ff34c2cfb3421c97b7de6ff95

    SHA1

    12ed44f66a1c68d8e39e21d9bf48136fc71fd6a6

    SHA256

    a258e85939e0068496e4dc03097068f690f28cce71c73a8ae25fdba46d04268d

    SHA512

    a42095d971ab1de48287f1f8770b4f28f7a6552adaaa18c5b3710365fececfaf625a2107ebbb51222b6c0cd0994480f899ce7c1cc1c296d954d23e03bea88f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp057969.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp057969.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicK7292.exe

    Filesize

    462KB

    MD5

    21b01586ec9d1c6778a1e9de7a9e2f84

    SHA1

    b4c4f71a00d0ef8ba46f144050ec9d395d1e31ab

    SHA256

    ab6bc9823a7dde62814a1ee2304cd83acf7d555a79ca1b9bf1499a0266468afc

    SHA512

    ca9a1b0f4c76545597df389ea3307c486ba15c1a82ebc00c9692c3783c63a956ca70784060a6de21b43e896c2cd069a3978170fa6eb344255f0c690bd3f610af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicK7292.exe

    Filesize

    462KB

    MD5

    21b01586ec9d1c6778a1e9de7a9e2f84

    SHA1

    b4c4f71a00d0ef8ba46f144050ec9d395d1e31ab

    SHA256

    ab6bc9823a7dde62814a1ee2304cd83acf7d555a79ca1b9bf1499a0266468afc

    SHA512

    ca9a1b0f4c76545597df389ea3307c486ba15c1a82ebc00c9692c3783c63a956ca70784060a6de21b43e896c2cd069a3978170fa6eb344255f0c690bd3f610af

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807037.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807037.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr501758.exe

    Filesize

    474KB

    MD5

    b969a74d74bf6b5f001ab2b9d7236858

    SHA1

    9f48d8c0a35d0d06c1cf5488879fc4b0f98e3346

    SHA256

    6911d10f532d3b3016537828ed907619086ecbce8cd6445211780df0e61a4ee0

    SHA512

    7865da2d52fedf46b8176abeff8ffd3bc599c3efab0f78bf973e0beca1486f7637589495fed20de461c5f0ff8a83f05cc17d18091d7321e06c16056b4ae01fd5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr501758.exe

    Filesize

    474KB

    MD5

    b969a74d74bf6b5f001ab2b9d7236858

    SHA1

    9f48d8c0a35d0d06c1cf5488879fc4b0f98e3346

    SHA256

    6911d10f532d3b3016537828ed907619086ecbce8cd6445211780df0e61a4ee0

    SHA512

    7865da2d52fedf46b8176abeff8ffd3bc599c3efab0f78bf973e0beca1486f7637589495fed20de461c5f0ff8a83f05cc17d18091d7321e06c16056b4ae01fd5

  • memory/2644-971-0x0000000000810000-0x0000000000845000-memory.dmp

    Filesize

    212KB

  • memory/2804-964-0x0000000007950000-0x000000000799B000-memory.dmp

    Filesize

    300KB

  • memory/2804-963-0x0000000000BB0000-0x0000000000BD8000-memory.dmp

    Filesize

    160KB

  • memory/2804-965-0x0000000007940000-0x0000000007950000-memory.dmp

    Filesize

    64KB

  • memory/3608-140-0x0000000000F30000-0x0000000000F3A000-memory.dmp

    Filesize

    40KB

  • memory/3968-180-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-200-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-152-0x0000000005300000-0x000000000533A000-memory.dmp

    Filesize

    232KB

  • memory/3968-153-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-154-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-156-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-158-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-160-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-162-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-164-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-166-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-168-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-170-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-172-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-174-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-176-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-178-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-150-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/3968-182-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-184-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-186-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-188-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-190-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-192-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-194-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-196-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-198-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-151-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/3968-202-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-204-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-206-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-208-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-210-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-212-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-214-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-216-0x0000000005300000-0x0000000005335000-memory.dmp

    Filesize

    212KB

  • memory/3968-945-0x0000000007800000-0x0000000007E06000-memory.dmp

    Filesize

    6.0MB

  • memory/3968-946-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/3968-947-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3968-948-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/3968-949-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/3968-950-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/3968-951-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/3968-952-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/3968-953-0x0000000008B40000-0x0000000008B90000-memory.dmp

    Filesize

    320KB

  • memory/3968-149-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/3968-147-0x0000000002230000-0x0000000002276000-memory.dmp

    Filesize

    280KB

  • memory/3968-148-0x0000000004DC0000-0x00000000052BE000-memory.dmp

    Filesize

    5.0MB

  • memory/3968-146-0x0000000004D80000-0x0000000004DBC000-memory.dmp

    Filesize

    240KB

  • memory/3968-954-0x0000000008B90000-0x0000000008C06000-memory.dmp

    Filesize

    472KB

  • memory/3968-955-0x0000000008C60000-0x0000000008E22000-memory.dmp

    Filesize

    1.8MB

  • memory/3968-956-0x0000000008E40000-0x000000000936C000-memory.dmp

    Filesize

    5.2MB

  • memory/3968-957-0x0000000009480000-0x000000000949E000-memory.dmp

    Filesize

    120KB