Analysis

  • max time kernel
    86s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 22:21

General

  • Target

    ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe

  • Size

    695KB

  • MD5

    1239093211c344fd497ac8ce854a81bb

  • SHA1

    56b7d01c64b039dae9d5afc77274c0b982c68b57

  • SHA256

    ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179

  • SHA512

    547e9713846cae65f861c8e5cf7614e2733d631f0d500ac9a41444b2000a70ee3fd6c4292ad3767f949485819673af482157f838f565617c3911d4d0d2f4abe4

  • SSDEEP

    12288:oy904lmpkkpEP2tXjsrV6T7uvYJ66jLTZuYeOcYKM/+6p:oyBdVPUX8V6T7uvYJxjBuYV3np

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe
    "C:\Users\Admin\AppData\Local\Temp\ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exe

    Filesize

    542KB

    MD5

    e944f3eb0f3097e99dc4dd30b12d8381

    SHA1

    7f81fb412dfddcffa5ee0bbf758ef0fb60a7ea2b

    SHA256

    54ea8a0eb0e35707a94646dcc399525a39726cb9bc8f34d1ba92f478d4935aa5

    SHA512

    d095d4fd528e06aba1cc4da67a8642d44234886f3a0188f2b2c07cc4d8400a57503d43f32d5c36d432f8780dd13ca6b2d74503790ae581d4e5511b903a8d2326

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exe

    Filesize

    542KB

    MD5

    e944f3eb0f3097e99dc4dd30b12d8381

    SHA1

    7f81fb412dfddcffa5ee0bbf758ef0fb60a7ea2b

    SHA256

    54ea8a0eb0e35707a94646dcc399525a39726cb9bc8f34d1ba92f478d4935aa5

    SHA512

    d095d4fd528e06aba1cc4da67a8642d44234886f3a0188f2b2c07cc4d8400a57503d43f32d5c36d432f8780dd13ca6b2d74503790ae581d4e5511b903a8d2326

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exe

    Filesize

    269KB

    MD5

    3ac03fb44cf10601101f49a2d78323c2

    SHA1

    b6a93be902ad12757011b0668fdea3ef7de3e1f9

    SHA256

    a96590f40a2db25be04529245265f9649a24eaaf5027654ea44e6d20a09f6790

    SHA512

    c2a622f1f846536c8b8f54643c4b79fb0db03a4bd028b998084a9a52df39226ee4bbefa9536f74cb919c50f16595006a7f49c55eec8e205ca452d47c3514461b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exe

    Filesize

    269KB

    MD5

    3ac03fb44cf10601101f49a2d78323c2

    SHA1

    b6a93be902ad12757011b0668fdea3ef7de3e1f9

    SHA256

    a96590f40a2db25be04529245265f9649a24eaaf5027654ea44e6d20a09f6790

    SHA512

    c2a622f1f846536c8b8f54643c4b79fb0db03a4bd028b998084a9a52df39226ee4bbefa9536f74cb919c50f16595006a7f49c55eec8e205ca452d47c3514461b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exe

    Filesize

    351KB

    MD5

    e1fb4b60a0f8ed00fd5d9cdc1b768f2b

    SHA1

    a1e5486bc40cdfd859d8e56eb1f426e4e6441ada

    SHA256

    a8c03a14f8e270a671f35485054be597f401cb3986cce3b165a19105fcbedaf9

    SHA512

    feb0b06af56565840f79e298095039b585d82ca3d5e40333ba78ccd8d3849da25342edb74c7b484667046ed97f30ab52bad1af1e89c8b6ea8ee3440d0309d30f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exe

    Filesize

    351KB

    MD5

    e1fb4b60a0f8ed00fd5d9cdc1b768f2b

    SHA1

    a1e5486bc40cdfd859d8e56eb1f426e4e6441ada

    SHA256

    a8c03a14f8e270a671f35485054be597f401cb3986cce3b165a19105fcbedaf9

    SHA512

    feb0b06af56565840f79e298095039b585d82ca3d5e40333ba78ccd8d3849da25342edb74c7b484667046ed97f30ab52bad1af1e89c8b6ea8ee3440d0309d30f

  • memory/1716-1000-0x0000000000E30000-0x0000000000E58000-memory.dmp

    Filesize

    160KB

  • memory/1716-1001-0x0000000007BB0000-0x0000000007BFB000-memory.dmp

    Filesize

    300KB

  • memory/1716-1002-0x0000000007F10000-0x0000000007F20000-memory.dmp

    Filesize

    64KB

  • memory/2960-150-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-158-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-140-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2960-142-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-144-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

    Filesize

    64KB

  • memory/2960-146-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

    Filesize

    64KB

  • memory/2960-138-0x0000000004A80000-0x0000000004A98000-memory.dmp

    Filesize

    96KB

  • memory/2960-148-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

    Filesize

    64KB

  • memory/2960-154-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-152-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-156-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-147-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-139-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-166-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-164-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-162-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-160-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-168-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-170-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/2960-171-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/2960-174-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

    Filesize

    64KB

  • memory/2960-173-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/2960-175-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

    Filesize

    64KB

  • memory/2960-137-0x0000000007130000-0x000000000762E000-memory.dmp

    Filesize

    5.0MB

  • memory/2960-136-0x0000000002F30000-0x0000000002F4A000-memory.dmp

    Filesize

    104KB

  • memory/3520-185-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-242-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-191-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-193-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-195-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-197-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-189-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-187-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-199-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-183-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-209-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-215-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-213-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-211-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-207-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-205-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-203-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-201-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-240-0x0000000002E60000-0x0000000002EA6000-memory.dmp

    Filesize

    280KB

  • memory/3520-182-0x00000000076B0000-0x00000000076E5000-memory.dmp

    Filesize

    212KB

  • memory/3520-244-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-246-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-978-0x000000000A1C0000-0x000000000A7C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3520-979-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/3520-980-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/3520-981-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/3520-982-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/3520-983-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-984-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/3520-985-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3520-986-0x000000000AED0000-0x000000000AF20000-memory.dmp

    Filesize

    320KB

  • memory/3520-987-0x000000000AF40000-0x000000000AFB6000-memory.dmp

    Filesize

    472KB

  • memory/3520-989-0x000000000B010000-0x000000000B1D2000-memory.dmp

    Filesize

    1.8MB

  • memory/3520-990-0x000000000B1F0000-0x000000000B71C000-memory.dmp

    Filesize

    5.2MB

  • memory/3520-991-0x000000000B830000-0x000000000B84E000-memory.dmp

    Filesize

    120KB

  • memory/3520-181-0x00000000076B0000-0x00000000076EA000-memory.dmp

    Filesize

    232KB

  • memory/3520-180-0x0000000004890000-0x00000000048CC000-memory.dmp

    Filesize

    240KB

  • memory/3520-994-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-995-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB

  • memory/3520-996-0x0000000002F00000-0x0000000002F10000-memory.dmp

    Filesize

    64KB