Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 21:11

General

  • Target

    583bb263cd22e44143c2871a7f787dc56704fde908d09ad6000f6bf4d0da885d.exe

  • Size

    943KB

  • MD5

    a29e809d44553ccd266f174ea49b2d51

  • SHA1

    119559cd61e275cd468daa76d4797c7685154268

  • SHA256

    583bb263cd22e44143c2871a7f787dc56704fde908d09ad6000f6bf4d0da885d

  • SHA512

    8cf0022787aaa741a270367137fef0e910832995ff21db7d0825c637a0c8208f3eb1fd1ff4bcf168fed27ee681206bd5c442f66c3dc662a1972d0cf4e4a567af

  • SSDEEP

    24576:RyXSNrtnBivPFdpx0WbKdmNnsC6Ch+7LvQak3M+yoqKNi:EXSNrdjdm6C6CUPQak3Mp2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\583bb263cd22e44143c2871a7f787dc56704fde908d09ad6000f6bf4d0da885d.exe
    "C:\Users\Admin\AppData\Local\Temp\583bb263cd22e44143c2871a7f787dc56704fde908d09ad6000f6bf4d0da885d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240096.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240096.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un268820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un268820.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr626159.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr626159.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu648139.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu648139.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk872263.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk872263.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si964572.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si964572.exe
      2⤵
      • Executes dropped EXE
      PID:2872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 620
        3⤵
        • Program crash
        PID:4412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 700
        3⤵
        • Program crash
        PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 836
        3⤵
        • Program crash
        PID:4944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 848
        3⤵
        • Program crash
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 884
        3⤵
        • Program crash
        PID:1072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 852
        3⤵
        • Program crash
        PID:2172
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1132
        3⤵
        • Program crash
        PID:4680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1156
        3⤵
        • Program crash
        PID:4676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1080
        3⤵
        • Program crash
        PID:1516

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si964572.exe

          Filesize

          257KB

          MD5

          aa4c6a82b087ef371d128629d99533d3

          SHA1

          c973df68418d2ce1d12f65a3126719a4747b7d59

          SHA256

          607ed348d1024212f5dd46ceda1f8fdf3fdde4693b11070213663faba4bce3c1

          SHA512

          3caf2d1e4d864974517b290fbf9daf01b016fae053770fd1af8eafd14fa15d5e8a848f4299893c0baa5ebe0566f87634034060c6511588c2c4ca5f0d7d6a3ba5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si964572.exe

          Filesize

          257KB

          MD5

          aa4c6a82b087ef371d128629d99533d3

          SHA1

          c973df68418d2ce1d12f65a3126719a4747b7d59

          SHA256

          607ed348d1024212f5dd46ceda1f8fdf3fdde4693b11070213663faba4bce3c1

          SHA512

          3caf2d1e4d864974517b290fbf9daf01b016fae053770fd1af8eafd14fa15d5e8a848f4299893c0baa5ebe0566f87634034060c6511588c2c4ca5f0d7d6a3ba5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240096.exe

          Filesize

          695KB

          MD5

          a9e6a3be634bf01000c66d441618889a

          SHA1

          facfbfa31e094fa29ad20f4bb68ee9e02b69afd2

          SHA256

          bee5a83804b534864320d33d1dbcd28e495c9d831706addaf0760a1831328999

          SHA512

          f935c154d605fc6f5c8670a04154b0f9d6e9d7d8df9377ea848e59a03010982b1a413015009270af436bb9c843e8a29fac6629257c721ae13930f1ae8d9be70c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240096.exe

          Filesize

          695KB

          MD5

          a9e6a3be634bf01000c66d441618889a

          SHA1

          facfbfa31e094fa29ad20f4bb68ee9e02b69afd2

          SHA256

          bee5a83804b534864320d33d1dbcd28e495c9d831706addaf0760a1831328999

          SHA512

          f935c154d605fc6f5c8670a04154b0f9d6e9d7d8df9377ea848e59a03010982b1a413015009270af436bb9c843e8a29fac6629257c721ae13930f1ae8d9be70c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk872263.exe

          Filesize

          136KB

          MD5

          e48a471cb7bc4ff6a6b32ae6d192dbbb

          SHA1

          d38181853eccf41490641e35b9f2b13e1f6d1711

          SHA256

          ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

          SHA512

          dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk872263.exe

          Filesize

          136KB

          MD5

          e48a471cb7bc4ff6a6b32ae6d192dbbb

          SHA1

          d38181853eccf41490641e35b9f2b13e1f6d1711

          SHA256

          ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

          SHA512

          dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un268820.exe

          Filesize

          541KB

          MD5

          f64b8d69bcaae2e59553f73cd4040e6c

          SHA1

          bde6775941f318666424ccc0af259d052caed609

          SHA256

          d884f3d690e5a0db56e119703f3591e9cb63952d44ae09467c8ee0edbacc363e

          SHA512

          039137ea54607c3da6d4a5c284b2040882a6f0652d94cbff8bf112b701106271e968b2239033b3ca2d82fcf7d2da45e38b7993a76d717c2b4bbbc7d938001cf3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un268820.exe

          Filesize

          541KB

          MD5

          f64b8d69bcaae2e59553f73cd4040e6c

          SHA1

          bde6775941f318666424ccc0af259d052caed609

          SHA256

          d884f3d690e5a0db56e119703f3591e9cb63952d44ae09467c8ee0edbacc363e

          SHA512

          039137ea54607c3da6d4a5c284b2040882a6f0652d94cbff8bf112b701106271e968b2239033b3ca2d82fcf7d2da45e38b7993a76d717c2b4bbbc7d938001cf3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr626159.exe

          Filesize

          278KB

          MD5

          66a3fcb7f5889b73570758b581abfe24

          SHA1

          3e39b0c92f43063866c7725b03f46851407bbd3d

          SHA256

          2355403791a12ccd571cf44ec0451d605d563f04816dce5406f74560265a73f1

          SHA512

          6a81dfd51478e86a2b09faab56f108cfca63634fb9d00a1eba42057806734b663bc0bac1a55fc2eb8a06a001ef4c0083def19b429505d7623c38b86229129800

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr626159.exe

          Filesize

          278KB

          MD5

          66a3fcb7f5889b73570758b581abfe24

          SHA1

          3e39b0c92f43063866c7725b03f46851407bbd3d

          SHA256

          2355403791a12ccd571cf44ec0451d605d563f04816dce5406f74560265a73f1

          SHA512

          6a81dfd51478e86a2b09faab56f108cfca63634fb9d00a1eba42057806734b663bc0bac1a55fc2eb8a06a001ef4c0083def19b429505d7623c38b86229129800

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu648139.exe

          Filesize

          361KB

          MD5

          a5393eae281839270006e2f299a3ecb5

          SHA1

          27f0deb89322b09bdd23591c129ad30698a46396

          SHA256

          62387b38d4f9389377fa017bc045a423b49f267dd784f2743bdf30c40f9f1535

          SHA512

          c8c2828fa3e8630d86ac7a10af7d2b76aa0c0ab67b34a855d8dc8d76af53e8d61e1c84fa565f19dc90558cbd856cfd994a9266fd4b59c8d1a25a5730376219c5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu648139.exe

          Filesize

          361KB

          MD5

          a5393eae281839270006e2f299a3ecb5

          SHA1

          27f0deb89322b09bdd23591c129ad30698a46396

          SHA256

          62387b38d4f9389377fa017bc045a423b49f267dd784f2743bdf30c40f9f1535

          SHA512

          c8c2828fa3e8630d86ac7a10af7d2b76aa0c0ab67b34a855d8dc8d76af53e8d61e1c84fa565f19dc90558cbd856cfd994a9266fd4b59c8d1a25a5730376219c5

        • memory/2336-1003-0x00000000002C0000-0x00000000002E8000-memory.dmp

          Filesize

          160KB

        • memory/2336-1005-0x0000000007340000-0x0000000007350000-memory.dmp

          Filesize

          64KB

        • memory/2336-1004-0x0000000007040000-0x000000000708B000-memory.dmp

          Filesize

          300KB

        • memory/2420-158-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-164-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-150-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-152-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-154-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-148-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-156-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-160-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-172-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-170-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-168-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-174-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-166-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-147-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-162-0x0000000004950000-0x0000000004962000-memory.dmp

          Filesize

          72KB

        • memory/2420-175-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/2420-176-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/2420-177-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/2420-178-0x0000000000400000-0x0000000002BA6000-memory.dmp

          Filesize

          39.6MB

        • memory/2420-180-0x0000000000400000-0x0000000002BA6000-memory.dmp

          Filesize

          39.6MB

        • memory/2420-181-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/2420-143-0x0000000002C80000-0x0000000002CAD000-memory.dmp

          Filesize

          180KB

        • memory/2420-146-0x0000000004950000-0x0000000004968000-memory.dmp

          Filesize

          96KB

        • memory/2420-145-0x00000000073E0000-0x00000000078DE000-memory.dmp

          Filesize

          5.0MB

        • memory/2420-144-0x0000000002E10000-0x0000000002E2A000-memory.dmp

          Filesize

          104KB

        • memory/2872-1011-0x0000000002BB0000-0x0000000002BE5000-memory.dmp

          Filesize

          212KB

        • memory/4664-189-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/4664-194-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-192-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-196-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-198-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-200-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-202-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-204-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-206-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-208-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-210-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-212-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-214-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-216-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-218-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-220-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-222-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-224-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-249-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/4664-984-0x0000000009B70000-0x000000000A176000-memory.dmp

          Filesize

          6.0MB

        • memory/4664-985-0x000000000A200000-0x000000000A212000-memory.dmp

          Filesize

          72KB

        • memory/4664-986-0x000000000A230000-0x000000000A33A000-memory.dmp

          Filesize

          1.0MB

        • memory/4664-987-0x000000000A350000-0x000000000A38E000-memory.dmp

          Filesize

          248KB

        • memory/4664-988-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/4664-989-0x000000000A3D0000-0x000000000A41B000-memory.dmp

          Filesize

          300KB

        • memory/4664-990-0x000000000A660000-0x000000000A6C6000-memory.dmp

          Filesize

          408KB

        • memory/4664-991-0x000000000AD20000-0x000000000ADB2000-memory.dmp

          Filesize

          584KB

        • memory/4664-993-0x000000000ADD0000-0x000000000AE46000-memory.dmp

          Filesize

          472KB

        • memory/4664-994-0x000000000AE80000-0x000000000AE9E000-memory.dmp

          Filesize

          120KB

        • memory/4664-191-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4664-190-0x0000000007670000-0x00000000076AA000-memory.dmp

          Filesize

          232KB

        • memory/4664-188-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/4664-187-0x0000000004580000-0x00000000045C6000-memory.dmp

          Filesize

          280KB

        • memory/4664-186-0x0000000004B40000-0x0000000004B7C000-memory.dmp

          Filesize

          240KB

        • memory/4664-995-0x000000000B020000-0x000000000B070000-memory.dmp

          Filesize

          320KB

        • memory/4664-996-0x000000000B090000-0x000000000B252000-memory.dmp

          Filesize

          1.8MB

        • memory/4664-997-0x000000000B270000-0x000000000B79C000-memory.dmp

          Filesize

          5.2MB