Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 23:38

General

  • Target

    257d2df80cb2ec8363adf2a022d3ccc0a2ca04b0c114e542292ebd8ce8de44e6.exe

  • Size

    695KB

  • MD5

    4d9d733d28de3349dd70af9f0705c2e9

  • SHA1

    621e761f815ff78609becfb3b62d87e8c761ec5d

  • SHA256

    257d2df80cb2ec8363adf2a022d3ccc0a2ca04b0c114e542292ebd8ce8de44e6

  • SHA512

    f86c71a2e4357a7cf49a9465c7b49d022d359db8a1e53324be34e76b33885a2cd81efd195a1367cd4c135de08df4fe092ae69bf77dcbf90a2f4d597be7be775b

  • SSDEEP

    12288:Hy90iBhxGB+g3QWdkOXromsxxECaFKCuYeHcYZxQQJb/iB04GXm:HyHT1W+OsH7ECaXuYQYcuoW

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\257d2df80cb2ec8363adf2a022d3ccc0a2ca04b0c114e542292ebd8ce8de44e6.exe
    "C:\Users\Admin\AppData\Local\Temp\257d2df80cb2ec8363adf2a022d3ccc0a2ca04b0c114e542292ebd8ce8de44e6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739030.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739030.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr453687.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr453687.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 1052
          4⤵
          • Program crash
          PID:3316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu349075.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu349075.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 1356
          4⤵
          • Program crash
          PID:444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840687.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840687.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2972
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4756 -ip 4756
    1⤵
      PID:1744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2508 -ip 2508
      1⤵
        PID:1448

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840687.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840687.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739030.exe

        Filesize

        541KB

        MD5

        8ffab0b068eeeb576c3f12dcdc32efc5

        SHA1

        c61b37d24fa23fb10aeb23393fff8b5c724c55a3

        SHA256

        070d3e359ab99db53ae9581ca5ce7db755d846602bef7f9a574bff33a272f6d5

        SHA512

        16baa4b8692994596e37ac093bbdb46cce67056a2969e39e1edd29c50cd506dadaa03ba02336dc064d30928b5ac43ffa8aa1029e47304ad87e9294233c492e28

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un739030.exe

        Filesize

        541KB

        MD5

        8ffab0b068eeeb576c3f12dcdc32efc5

        SHA1

        c61b37d24fa23fb10aeb23393fff8b5c724c55a3

        SHA256

        070d3e359ab99db53ae9581ca5ce7db755d846602bef7f9a574bff33a272f6d5

        SHA512

        16baa4b8692994596e37ac093bbdb46cce67056a2969e39e1edd29c50cd506dadaa03ba02336dc064d30928b5ac43ffa8aa1029e47304ad87e9294233c492e28

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr453687.exe

        Filesize

        269KB

        MD5

        4f489f11ad4d417574dc1a8d7e57e1e0

        SHA1

        efc6a096259272638fbe7e78247709accd6fa3fe

        SHA256

        5a990f01cc8d61ea614b3c77eec22b71ca691a92b28e8bfecbe4d5f2aeb0ef17

        SHA512

        a78918f51839cde30b63d30b4560c8c1e56b247be87964361b2c97c9aeb29f7e605cb6858336fb72554c934c4a5f346685c003053c52026fc037b8be8fe1b527

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr453687.exe

        Filesize

        269KB

        MD5

        4f489f11ad4d417574dc1a8d7e57e1e0

        SHA1

        efc6a096259272638fbe7e78247709accd6fa3fe

        SHA256

        5a990f01cc8d61ea614b3c77eec22b71ca691a92b28e8bfecbe4d5f2aeb0ef17

        SHA512

        a78918f51839cde30b63d30b4560c8c1e56b247be87964361b2c97c9aeb29f7e605cb6858336fb72554c934c4a5f346685c003053c52026fc037b8be8fe1b527

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu349075.exe

        Filesize

        351KB

        MD5

        062eca33791fb38f08560ffd48ef4f4e

        SHA1

        74e7440da48d10520f199814731d596af40239df

        SHA256

        91cf662a032be62ecc945cd8823629b6ab6ca05ac974b20a10fe5f9c0da4e0ad

        SHA512

        2c69d9bba9711918b3fd258d09b9083b920c3e84a0d385b7a524e5f2f691aabfa153d974a2bbb9bdb1d8cf18ce43e6d6fc57efb5b5e14917e08839c27f748159

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu349075.exe

        Filesize

        351KB

        MD5

        062eca33791fb38f08560ffd48ef4f4e

        SHA1

        74e7440da48d10520f199814731d596af40239df

        SHA256

        91cf662a032be62ecc945cd8823629b6ab6ca05ac974b20a10fe5f9c0da4e0ad

        SHA512

        2c69d9bba9711918b3fd258d09b9083b920c3e84a0d385b7a524e5f2f691aabfa153d974a2bbb9bdb1d8cf18ce43e6d6fc57efb5b5e14917e08839c27f748159

      • memory/2508-988-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/2508-991-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-1004-0x0000000006C60000-0x0000000006CB0000-memory.dmp

        Filesize

        320KB

      • memory/2508-1002-0x000000000BA60000-0x000000000BA7E000-memory.dmp

        Filesize

        120KB

      • memory/2508-1001-0x000000000B2E0000-0x000000000B80C000-memory.dmp

        Filesize

        5.2MB

      • memory/2508-1000-0x000000000B100000-0x000000000B2C2000-memory.dmp

        Filesize

        1.8MB

      • memory/2508-999-0x000000000B030000-0x000000000B0A6000-memory.dmp

        Filesize

        472KB

      • memory/2508-998-0x000000000AF70000-0x000000000B002000-memory.dmp

        Filesize

        584KB

      • memory/2508-997-0x000000000A8B0000-0x000000000A916000-memory.dmp

        Filesize

        408KB

      • memory/2508-996-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-995-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-994-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-993-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-212-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/2508-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/2508-987-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

        Filesize

        6.1MB

      • memory/2508-228-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-222-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-226-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-224-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-221-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-214-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-191-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-192-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-194-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-196-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-198-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-200-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-202-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-204-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-206-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-218-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-210-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-208-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2508-216-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/2508-215-0x0000000002CD0000-0x0000000002D16000-memory.dmp

        Filesize

        280KB

      • memory/2508-219-0x00000000071D0000-0x0000000007205000-memory.dmp

        Filesize

        212KB

      • memory/2972-1010-0x0000000000CB0000-0x0000000000CD8000-memory.dmp

        Filesize

        160KB

      • memory/2972-1011-0x0000000007AD0000-0x0000000007AE0000-memory.dmp

        Filesize

        64KB

      • memory/4756-157-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-149-0x00000000070E0000-0x0000000007684000-memory.dmp

        Filesize

        5.6MB

      • memory/4756-185-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-184-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-183-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-181-0x0000000000400000-0x0000000002BAD000-memory.dmp

        Filesize

        39.7MB

      • memory/4756-150-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-180-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-179-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-155-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-178-0x0000000004790000-0x00000000047A0000-memory.dmp

        Filesize

        64KB

      • memory/4756-186-0x0000000000400000-0x0000000002BAD000-memory.dmp

        Filesize

        39.7MB

      • memory/4756-175-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-169-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-173-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-167-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-165-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-163-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-161-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-159-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-177-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-171-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/4756-153-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/4756-151-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB