Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 00:04

General

  • Target

    e816a858352979dd4a0b6745ab64b988585dc3b5aff8bf86e2ffef3b8763cc3e.exe

  • Size

    965KB

  • MD5

    3670e664c78745aa6febfbbdd2f7ba88

  • SHA1

    13671c550b25f471d673e1e034f0bffef0d51ebf

  • SHA256

    e816a858352979dd4a0b6745ab64b988585dc3b5aff8bf86e2ffef3b8763cc3e

  • SHA512

    2eec9d678cb4a881aeed662565cd475d6c8cccd69acd8f220e0dbb456f4a5537eeaf1080da72b4cdb1990af5e6fcf2943f1559316886c3369d6b2af50cb215aa

  • SSDEEP

    12288:Cy90YdsYvyFqFvvrRt8KQehJsbe9p/AhniBBf4grgGU+OdOSE/X5qUHtT6xdvqP7:CyYYqonrz8LI6s7lU+2+PHx6xqIw19

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e816a858352979dd4a0b6745ab64b988585dc3b5aff8bf86e2ffef3b8763cc3e.exe
    "C:\Users\Admin\AppData\Local\Temp\e816a858352979dd4a0b6745ab64b988585dc3b5aff8bf86e2ffef3b8763cc3e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201858.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201858.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un182915.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un182915.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604275.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604275.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu377658.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu377658.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921319.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921319.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si374764.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si374764.exe
      2⤵
      • Executes dropped EXE
      PID:4940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 620
        3⤵
        • Program crash
        PID:3732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 700
        3⤵
        • Program crash
        PID:1384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 840
        3⤵
        • Program crash
        PID:2976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 848
        3⤵
        • Program crash
        PID:3092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 876
        3⤵
        • Program crash
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 888
        3⤵
        • Program crash
        PID:1096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 1080
        3⤵
        • Program crash
        PID:5028

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si374764.exe

          Filesize

          277KB

          MD5

          bbe19912aacaa5664174f616525060ab

          SHA1

          b628ca656534afc0e4ec1735442f1b0ecd3eeb9b

          SHA256

          f96ec0bf3e3d0180674c8f92b915bea30c5a964d2a57bed5049001a8627341e6

          SHA512

          2ec4b1d2dba72bd761bed671c0ff3e308e210af2d0b9e108bf603b663300f0e343c71b8986a2de2ebdd0d9327762d7c9815b482aa4c37420445a72f28d88dfe2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si374764.exe

          Filesize

          277KB

          MD5

          bbe19912aacaa5664174f616525060ab

          SHA1

          b628ca656534afc0e4ec1735442f1b0ecd3eeb9b

          SHA256

          f96ec0bf3e3d0180674c8f92b915bea30c5a964d2a57bed5049001a8627341e6

          SHA512

          2ec4b1d2dba72bd761bed671c0ff3e308e210af2d0b9e108bf603b663300f0e343c71b8986a2de2ebdd0d9327762d7c9815b482aa4c37420445a72f28d88dfe2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201858.exe

          Filesize

          706KB

          MD5

          eff97cec574127a0dd1bdd5a580b7d88

          SHA1

          ed11f158daf5f6fb93fcfd3bf6216b45b37d7348

          SHA256

          b69c89acffa4dde2e2a48fafa045de8c2ded7835f5fe11d675932fc84c2775f1

          SHA512

          cb6fc2461b37c2baaecafa5a27eeee5cb230fdaef83af12f1040cf85c553027cecd22f41481b6cb46fc2d34b2b087039c5b9365ac091077e2caf2bed6b86c823

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201858.exe

          Filesize

          706KB

          MD5

          eff97cec574127a0dd1bdd5a580b7d88

          SHA1

          ed11f158daf5f6fb93fcfd3bf6216b45b37d7348

          SHA256

          b69c89acffa4dde2e2a48fafa045de8c2ded7835f5fe11d675932fc84c2775f1

          SHA512

          cb6fc2461b37c2baaecafa5a27eeee5cb230fdaef83af12f1040cf85c553027cecd22f41481b6cb46fc2d34b2b087039c5b9365ac091077e2caf2bed6b86c823

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921319.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921319.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un182915.exe

          Filesize

          552KB

          MD5

          51745c9d99e28b8c504301adc79a54d1

          SHA1

          4691977b9884c1f9027a5896c0b11492485b6374

          SHA256

          81c3a011aae518cdc78157d4bd693b486cf972fbe7650ff14739dffeed4f2586

          SHA512

          bbace08f56affe55c4e34dc09373a581fead98def9beadc5d0241babf2867bd135fb268b74ea792f821611f0ca74b22effecd8f562a1919be1eddd2001adabca

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un182915.exe

          Filesize

          552KB

          MD5

          51745c9d99e28b8c504301adc79a54d1

          SHA1

          4691977b9884c1f9027a5896c0b11492485b6374

          SHA256

          81c3a011aae518cdc78157d4bd693b486cf972fbe7650ff14739dffeed4f2586

          SHA512

          bbace08f56affe55c4e34dc09373a581fead98def9beadc5d0241babf2867bd135fb268b74ea792f821611f0ca74b22effecd8f562a1919be1eddd2001adabca

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604275.exe

          Filesize

          299KB

          MD5

          8f13e8c3c0f04e69550a74725f2bfd95

          SHA1

          494fee57353c1c2d7ed642799566d9746fa9563d

          SHA256

          37c00ba3e82a5a3ab32cb6493f1ab5f037f9f95c5d2abbbc31d14bdac077543b

          SHA512

          3883ba406cdd4c37e605783bcac92fd48fc85b737ac2a2f5c628e0e214199ff2646e41f9f2497bc84180d1c4016a9ec6af5478f1cfc08b00a057dc1b4c6605ca

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604275.exe

          Filesize

          299KB

          MD5

          8f13e8c3c0f04e69550a74725f2bfd95

          SHA1

          494fee57353c1c2d7ed642799566d9746fa9563d

          SHA256

          37c00ba3e82a5a3ab32cb6493f1ab5f037f9f95c5d2abbbc31d14bdac077543b

          SHA512

          3883ba406cdd4c37e605783bcac92fd48fc85b737ac2a2f5c628e0e214199ff2646e41f9f2497bc84180d1c4016a9ec6af5478f1cfc08b00a057dc1b4c6605ca

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu377658.exe

          Filesize

          381KB

          MD5

          e4fc8ab4c3f9af5eb67a9c45b93c5979

          SHA1

          1e7650e56880e0c9163a2d31ad4c538c1a82d87d

          SHA256

          4671fb72690ed0d96fd34a20c9f3514d641c88c687cec6ee7c8076dee0a5148b

          SHA512

          913b392e3b0276e05c8db7ef5a7d119ad198b89682efa6802d9c6aa24489494d2a8a95d5bb19f9e65eb311ad3ed7414b2ea586142c5fe56a95d9e7092283e436

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu377658.exe

          Filesize

          381KB

          MD5

          e4fc8ab4c3f9af5eb67a9c45b93c5979

          SHA1

          1e7650e56880e0c9163a2d31ad4c538c1a82d87d

          SHA256

          4671fb72690ed0d96fd34a20c9f3514d641c88c687cec6ee7c8076dee0a5148b

          SHA512

          913b392e3b0276e05c8db7ef5a7d119ad198b89682efa6802d9c6aa24489494d2a8a95d5bb19f9e65eb311ad3ed7414b2ea586142c5fe56a95d9e7092283e436

        • memory/2152-1005-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/2152-1004-0x0000000007210000-0x000000000725B000-memory.dmp

          Filesize

          300KB

        • memory/2152-1003-0x0000000000450000-0x0000000000478000-memory.dmp

          Filesize

          160KB

        • memory/2232-986-0x0000000007170000-0x0000000007182000-memory.dmp

          Filesize

          72KB

        • memory/2232-990-0x000000000A4F0000-0x000000000A53B000-memory.dmp

          Filesize

          300KB

        • memory/2232-997-0x0000000006C80000-0x0000000006CD0000-memory.dmp

          Filesize

          320KB

        • memory/2232-996-0x000000000B240000-0x000000000B76C000-memory.dmp

          Filesize

          5.2MB

        • memory/2232-995-0x000000000B070000-0x000000000B232000-memory.dmp

          Filesize

          1.8MB

        • memory/2232-994-0x000000000AF90000-0x000000000AFAE000-memory.dmp

          Filesize

          120KB

        • memory/2232-993-0x000000000AED0000-0x000000000AF46000-memory.dmp

          Filesize

          472KB

        • memory/2232-992-0x000000000AD30000-0x000000000ADC2000-memory.dmp

          Filesize

          584KB

        • memory/2232-991-0x000000000A670000-0x000000000A6D6000-memory.dmp

          Filesize

          408KB

        • memory/2232-989-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/2232-988-0x00000000071B0000-0x00000000071EE000-memory.dmp

          Filesize

          248KB

        • memory/2232-987-0x000000000A2E0000-0x000000000A3EA000-memory.dmp

          Filesize

          1.0MB

        • memory/2232-985-0x0000000009CD0000-0x000000000A2D6000-memory.dmp

          Filesize

          6.0MB

        • memory/2232-226-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-224-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-222-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-220-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-218-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-216-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-214-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-187-0x0000000002F70000-0x0000000002FAC000-memory.dmp

          Filesize

          240KB

        • memory/2232-188-0x0000000004810000-0x000000000484A000-memory.dmp

          Filesize

          232KB

        • memory/2232-189-0x0000000002BD0000-0x0000000002C16000-memory.dmp

          Filesize

          280KB

        • memory/2232-190-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/2232-193-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/2232-194-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-192-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-191-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/2232-198-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-200-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-196-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-202-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-204-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-206-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-208-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-210-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/2232-212-0x0000000004810000-0x0000000004845000-memory.dmp

          Filesize

          212KB

        • memory/3092-170-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-145-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-182-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-179-0x0000000000400000-0x0000000002BB4000-memory.dmp

          Filesize

          39.7MB

        • memory/3092-154-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-181-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-177-0x0000000000400000-0x0000000002BB4000-memory.dmp

          Filesize

          39.7MB

        • memory/3092-176-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-152-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-174-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-165-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-172-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-156-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-158-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-180-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-166-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-168-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-164-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/3092-162-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-160-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-150-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-148-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-146-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/3092-169-0x0000000007240000-0x0000000007250000-memory.dmp

          Filesize

          64KB

        • memory/3092-144-0x0000000004C80000-0x0000000004C98000-memory.dmp

          Filesize

          96KB

        • memory/3092-143-0x0000000007250000-0x000000000774E000-memory.dmp

          Filesize

          5.0MB

        • memory/3092-142-0x0000000004930000-0x000000000494A000-memory.dmp

          Filesize

          104KB

        • memory/4940-1011-0x0000000002C80000-0x0000000002CB5000-memory.dmp

          Filesize

          212KB