Analysis

  • max time kernel
    55s
  • max time network
    62s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 22:35

General

  • Target

    112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe

  • Size

    559KB

  • MD5

    009fa9d083e4a55495f0e3657e95ee0e

  • SHA1

    3220e7f4bebe5aa6cf9d95c3567727f8bebc2fc0

  • SHA256

    112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4

  • SHA512

    7ba528b3b2e95f5169221300814c4c8b5a28818745cf0d75b25807c59c020db19d9cdaee8a83f25fb0a4680dbc44d3c550fd45d6bd9c05e4e84dedf7b48e68dc

  • SSDEEP

    12288:Uy90A+0JeUO3XJFw/ZKo/6ukeEcR/kD/Za+HZ:UyO0J2nw/lCukjzau

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe
    "C:\Users\Admin\AppData\Local\Temp\112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exe

    Filesize

    405KB

    MD5

    ee3e42940707f89027331832e1b2fb80

    SHA1

    9926722b3360ef6e33aeebdef01673bb1bbbf6c5

    SHA256

    e549a4a022162e63c75a9730f4daa95019258fb1355c20ba5863fd22248b1340

    SHA512

    2df75a0d857d81d1e9f12825843c144f17ba2bdeaac6ab3f680a2bc1edd7198729283e58a09902b820f64a2499bbd3e671b717791c53e0a9a922383057e9e3e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exe

    Filesize

    405KB

    MD5

    ee3e42940707f89027331832e1b2fb80

    SHA1

    9926722b3360ef6e33aeebdef01673bb1bbbf6c5

    SHA256

    e549a4a022162e63c75a9730f4daa95019258fb1355c20ba5863fd22248b1340

    SHA512

    2df75a0d857d81d1e9f12825843c144f17ba2bdeaac6ab3f680a2bc1edd7198729283e58a09902b820f64a2499bbd3e671b717791c53e0a9a922383057e9e3e0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exe

    Filesize

    351KB

    MD5

    d93f21c48d46d276af1c36241368cd1f

    SHA1

    67bdc564bbad9d44ed1ccf4c0fd986429fcac003

    SHA256

    55df515adcf3061267ccbffd9766afa5be646a97de267c4453b316eef8f562ac

    SHA512

    6034ac7bd18cf41b56e7d1bec3fc8ee6b407de6ee22b922da04a4e263276e87d54100cd4832ca973e5affe4b942b3791e2ea4532ac19a09b332c31d943293ee2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exe

    Filesize

    351KB

    MD5

    d93f21c48d46d276af1c36241368cd1f

    SHA1

    67bdc564bbad9d44ed1ccf4c0fd986429fcac003

    SHA256

    55df515adcf3061267ccbffd9766afa5be646a97de267c4453b316eef8f562ac

    SHA512

    6034ac7bd18cf41b56e7d1bec3fc8ee6b407de6ee22b922da04a4e263276e87d54100cd4832ca973e5affe4b942b3791e2ea4532ac19a09b332c31d943293ee2

  • memory/2036-956-0x0000000000EF0000-0x0000000000F18000-memory.dmp

    Filesize

    160KB

  • memory/2036-957-0x0000000007C20000-0x0000000007C6B000-memory.dmp

    Filesize

    300KB

  • memory/2036-958-0x0000000007C80000-0x0000000007C90000-memory.dmp

    Filesize

    64KB

  • memory/4276-133-0x00000000001D0000-0x00000000001DA000-memory.dmp

    Filesize

    40KB

  • memory/4988-175-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-187-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-142-0x0000000007280000-0x000000000777E000-memory.dmp

    Filesize

    5.0MB

  • memory/4988-143-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/4988-144-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/4988-145-0x0000000004960000-0x000000000499A000-memory.dmp

    Filesize

    232KB

  • memory/4988-146-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-147-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-149-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-151-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-153-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-155-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-157-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-159-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-161-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-163-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-165-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-167-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-169-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-171-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-141-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/4988-173-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-177-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-179-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-181-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-183-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-185-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-140-0x0000000002CF0000-0x0000000002D36000-memory.dmp

    Filesize

    280KB

  • memory/4988-189-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-191-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-193-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-195-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-197-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-199-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-201-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-203-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-205-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-207-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-209-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/4988-938-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/4988-939-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/4988-940-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4988-941-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/4988-942-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/4988-943-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/4988-944-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/4988-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4988-946-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/4988-139-0x0000000004870000-0x00000000048AC000-memory.dmp

    Filesize

    240KB

  • memory/4988-947-0x000000000AE40000-0x000000000AEB6000-memory.dmp

    Filesize

    472KB

  • memory/4988-948-0x000000000AFE0000-0x000000000AFFE000-memory.dmp

    Filesize

    120KB

  • memory/4988-949-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/4988-950-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB