Analysis

  • max time kernel
    95s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 21:31

General

  • Target

    d7d399869e95cb2bf9201c5aaed908d3f08d51afd985a5fb03b3ce58472a4911.exe

  • Size

    559KB

  • MD5

    28156fa46e25856db4a06fffd2a71d13

  • SHA1

    9820f0e0aea8b4b69a90e6a5a06714f470168a34

  • SHA256

    d7d399869e95cb2bf9201c5aaed908d3f08d51afd985a5fb03b3ce58472a4911

  • SHA512

    ce89e5ca07e372078b6e73a5353c44dbc73109765da3abc617af3a68306bf7ea53f90bdf69893c56424ba2e289dbdae340811b67c413914a52bf89f1acc2f244

  • SSDEEP

    6144:A6p0yN90QEHfVhRcr/fQ6CcArC+m03h71fuV4r6x04HuEciuwm6Qk1lMFeEGQCKi:oy90ZfTbFef2kOr6ukuEcj/mwQhW99k

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7d399869e95cb2bf9201c5aaed908d3f08d51afd985a5fb03b3ce58472a4911.exe
    "C:\Users\Admin\AppData\Local\Temp\d7d399869e95cb2bf9201c5aaed908d3f08d51afd985a5fb03b3ce58472a4911.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAW7931.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAW7931.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it478069.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it478069.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp528674.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp528674.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 1992
          4⤵
          • Program crash
          PID:2180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr607860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr607860.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3108 -ip 3108
    1⤵
      PID:4764

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr607860.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr607860.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAW7931.exe

            Filesize

            405KB

            MD5

            9551878d929e861fb88f1c1391ddf258

            SHA1

            67eca5e43871c196bd09f8bee90e25d245e31d4a

            SHA256

            a7d799e2d592864500b46bf7192ec2f88e8225671ab2d5105fcafc024233892c

            SHA512

            53fa31dc9cca462e1ea38f8e2a7deb4e93d2d6bcaeab3ec9f8632539a64c36e193f4b2fed0ab51c8440975e3b2ed1b09e2cb8a673d8c187adefd7727a990124d

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAW7931.exe

            Filesize

            405KB

            MD5

            9551878d929e861fb88f1c1391ddf258

            SHA1

            67eca5e43871c196bd09f8bee90e25d245e31d4a

            SHA256

            a7d799e2d592864500b46bf7192ec2f88e8225671ab2d5105fcafc024233892c

            SHA512

            53fa31dc9cca462e1ea38f8e2a7deb4e93d2d6bcaeab3ec9f8632539a64c36e193f4b2fed0ab51c8440975e3b2ed1b09e2cb8a673d8c187adefd7727a990124d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it478069.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it478069.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp528674.exe

            Filesize

            351KB

            MD5

            4c7270e35d069fdf8521da986a34d313

            SHA1

            aa68de4f55874cec7162f1b3c079b9ada0e46d25

            SHA256

            fbafc58fc114dec19f7752bd45ff72145d9ee30f7e3ad36bcbf86790f014aac7

            SHA512

            6b9eec144f51644a2a373fd36ef7f090f1c91ad06dc61cc1c43da8b12dec084d36fd1b179a9f44ab3e43d0c75fccd225dd0c3569fd9c0b5dabf4f3a164779875

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp528674.exe

            Filesize

            351KB

            MD5

            4c7270e35d069fdf8521da986a34d313

            SHA1

            aa68de4f55874cec7162f1b3c079b9ada0e46d25

            SHA256

            fbafc58fc114dec19f7752bd45ff72145d9ee30f7e3ad36bcbf86790f014aac7

            SHA512

            6b9eec144f51644a2a373fd36ef7f090f1c91ad06dc61cc1c43da8b12dec084d36fd1b179a9f44ab3e43d0c75fccd225dd0c3569fd9c0b5dabf4f3a164779875

          • memory/3108-153-0x0000000002CF0000-0x0000000002D36000-memory.dmp

            Filesize

            280KB

          • memory/3108-154-0x0000000007350000-0x0000000007360000-memory.dmp

            Filesize

            64KB

          • memory/3108-155-0x0000000007360000-0x0000000007904000-memory.dmp

            Filesize

            5.6MB

          • memory/3108-156-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-159-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-157-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-161-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-163-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-165-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-167-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-169-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-171-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-173-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-175-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-177-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-179-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-181-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-183-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-185-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-187-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-189-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-191-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-193-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-195-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-199-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-197-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-201-0x0000000007350000-0x0000000007360000-memory.dmp

            Filesize

            64KB

          • memory/3108-204-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-202-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-206-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-208-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-210-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-212-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-214-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-216-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-218-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-220-0x00000000071E0000-0x0000000007215000-memory.dmp

            Filesize

            212KB

          • memory/3108-949-0x0000000009D90000-0x000000000A3A8000-memory.dmp

            Filesize

            6.1MB

          • memory/3108-950-0x00000000072C0000-0x00000000072D2000-memory.dmp

            Filesize

            72KB

          • memory/3108-951-0x000000000A3B0000-0x000000000A4BA000-memory.dmp

            Filesize

            1.0MB

          • memory/3108-952-0x00000000072F0000-0x000000000732C000-memory.dmp

            Filesize

            240KB

          • memory/3108-953-0x0000000007350000-0x0000000007360000-memory.dmp

            Filesize

            64KB

          • memory/3108-954-0x000000000A760000-0x000000000A7C6000-memory.dmp

            Filesize

            408KB

          • memory/3108-955-0x000000000AE30000-0x000000000AEC2000-memory.dmp

            Filesize

            584KB

          • memory/3108-956-0x000000000AEF0000-0x000000000AF66000-memory.dmp

            Filesize

            472KB

          • memory/3108-957-0x000000000AFD0000-0x000000000B192000-memory.dmp

            Filesize

            1.8MB

          • memory/3108-958-0x000000000B1A0000-0x000000000B6CC000-memory.dmp

            Filesize

            5.2MB

          • memory/3108-959-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

            Filesize

            120KB

          • memory/3108-960-0x0000000006D20000-0x0000000006D70000-memory.dmp

            Filesize

            320KB

          • memory/3108-963-0x0000000007350000-0x0000000007360000-memory.dmp

            Filesize

            64KB

          • memory/3956-968-0x0000000000A10000-0x0000000000A38000-memory.dmp

            Filesize

            160KB

          • memory/3956-969-0x0000000007730000-0x0000000007740000-memory.dmp

            Filesize

            64KB

          • memory/4428-147-0x0000000000A60000-0x0000000000A6A000-memory.dmp

            Filesize

            40KB