Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 22:40

General

  • Target

    08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe

  • Size

    697KB

  • MD5

    42aac73cddd9d225841002cc62eda5a5

  • SHA1

    3a7545f5bd9f9a706a6ed982300d8886155ebbed

  • SHA256

    08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130

  • SHA512

    36d20f8f270e54a525e1058c7f2ec4a7bd4e500886660309d54e877e732450d3e43241a4aa541fdbfb1aa79889ca5c022ff912932315abe06a44e44018f1f6a4

  • SSDEEP

    12288:by90TwHkniL1T55O1xHk7AnYigLuYYEcYrqScM30bbh3:by7Hky1/O3kknYiUuY1zcNV3

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe
    "C:\Users\Admin\AppData\Local\Temp\08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exe

    Filesize

    543KB

    MD5

    cb079323feb9ee27865abaa01f875335

    SHA1

    7244dda1653d3ddc446c5a7ae284455e47ec71ac

    SHA256

    012ec04a5e9a07d23b951e681bc9550114cf970cc1802d0b7faeda002cf3f86b

    SHA512

    385c5b0de440006e2d89754828bf81d1fad563d989ba89959bfbabd7029b3df8a3ecdfd04884e20d31874064f32bbce9b69b60b34b25c07ab774b8b3fdabbc14

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exe

    Filesize

    543KB

    MD5

    cb079323feb9ee27865abaa01f875335

    SHA1

    7244dda1653d3ddc446c5a7ae284455e47ec71ac

    SHA256

    012ec04a5e9a07d23b951e681bc9550114cf970cc1802d0b7faeda002cf3f86b

    SHA512

    385c5b0de440006e2d89754828bf81d1fad563d989ba89959bfbabd7029b3df8a3ecdfd04884e20d31874064f32bbce9b69b60b34b25c07ab774b8b3fdabbc14

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exe

    Filesize

    269KB

    MD5

    0a937ad6cb4e52e45ec2477662aca461

    SHA1

    9003c7e8a5d3dfea15a51d83650c684f176ebbd6

    SHA256

    7393f527944364f0136568a02edd4e349db62ecff9ad6e15d257b30e20a2cad2

    SHA512

    5d6fd274b913f2921f66a4da99347a1f79bddf6b145cfbf901e808851be1db022bfe8208e6524c33ea249faee608f31c6ec7e18d2700a7aeac67dfc5e5d0098d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exe

    Filesize

    269KB

    MD5

    0a937ad6cb4e52e45ec2477662aca461

    SHA1

    9003c7e8a5d3dfea15a51d83650c684f176ebbd6

    SHA256

    7393f527944364f0136568a02edd4e349db62ecff9ad6e15d257b30e20a2cad2

    SHA512

    5d6fd274b913f2921f66a4da99347a1f79bddf6b145cfbf901e808851be1db022bfe8208e6524c33ea249faee608f31c6ec7e18d2700a7aeac67dfc5e5d0098d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exe

    Filesize

    351KB

    MD5

    202297a9155195b49be8ffd303348948

    SHA1

    aab0dee3ea01548e15ebd8ee29d2f3f29593c50a

    SHA256

    9c11d94e789c936b3f4c60cffdd43d491d88463ec3c9e6ab54e27518307f07e0

    SHA512

    2b2072ced9e168cf67a940a40060ac6416345e261a656dc70d58f99e417155d699c18fb8c03f61c7b2c7678deeb888e252b3a0fce8b5bfbcfa8bfc90e8db97ad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exe

    Filesize

    351KB

    MD5

    202297a9155195b49be8ffd303348948

    SHA1

    aab0dee3ea01548e15ebd8ee29d2f3f29593c50a

    SHA256

    9c11d94e789c936b3f4c60cffdd43d491d88463ec3c9e6ab54e27518307f07e0

    SHA512

    2b2072ced9e168cf67a940a40060ac6416345e261a656dc70d58f99e417155d699c18fb8c03f61c7b2c7678deeb888e252b3a0fce8b5bfbcfa8bfc90e8db97ad

  • memory/3804-209-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-971-0x0000000004C20000-0x0000000004C32000-memory.dmp

    Filesize

    72KB

  • memory/3804-982-0x000000000B970000-0x000000000B98E000-memory.dmp

    Filesize

    120KB

  • memory/3804-981-0x000000000B330000-0x000000000B85C000-memory.dmp

    Filesize

    5.2MB

  • memory/3804-980-0x000000000B160000-0x000000000B322000-memory.dmp

    Filesize

    1.8MB

  • memory/3804-979-0x000000000AE40000-0x000000000AEB6000-memory.dmp

    Filesize

    472KB

  • memory/3804-978-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/3804-977-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3804-976-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/3804-974-0x000000000A3E0000-0x000000000A42B000-memory.dmp

    Filesize

    300KB

  • memory/3804-975-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3804-973-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/3804-972-0x000000000A250000-0x000000000A35A000-memory.dmp

    Filesize

    1.0MB

  • memory/3804-970-0x0000000009C40000-0x000000000A246000-memory.dmp

    Filesize

    6.0MB

  • memory/3804-211-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-207-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-205-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-203-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3804-202-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-201-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3804-199-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3804-172-0x0000000004800000-0x000000000483C000-memory.dmp

    Filesize

    240KB

  • memory/3804-173-0x0000000004AF0000-0x0000000004B2A000-memory.dmp

    Filesize

    232KB

  • memory/3804-174-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-175-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-177-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-179-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-181-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-183-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-185-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-187-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-189-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-191-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-193-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-195-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3804-198-0x0000000002CC0000-0x0000000002D06000-memory.dmp

    Filesize

    280KB

  • memory/3804-197-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/4112-988-0x0000000000990000-0x00000000009B8000-memory.dmp

    Filesize

    160KB

  • memory/4112-990-0x0000000007710000-0x000000000775B000-memory.dmp

    Filesize

    300KB

  • memory/4112-989-0x0000000007790000-0x00000000077A0000-memory.dmp

    Filesize

    64KB

  • memory/4484-152-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-148-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-162-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-133-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4484-160-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-158-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-136-0x0000000004870000-0x0000000004888000-memory.dmp

    Filesize

    96KB

  • memory/4484-156-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-154-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-134-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4484-150-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-164-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-146-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-144-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-142-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-140-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-138-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-137-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/4484-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4484-131-0x0000000002DD0000-0x0000000002DEA000-memory.dmp

    Filesize

    104KB

  • memory/4484-165-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/4484-167-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/4484-135-0x0000000007230000-0x000000000772E000-memory.dmp

    Filesize

    5.0MB