Analysis

  • max time kernel
    89s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 00:19

General

  • Target

    3fc681c1832f3265be6909c3ae37b93eef68c8ab77b1ad6985ec93d08155a48a.exe

  • Size

    568KB

  • MD5

    5fde3138231de80ccebc9024e4007b54

  • SHA1

    6ec7137b0db877cefe78a0632562399743d540d2

  • SHA256

    3fc681c1832f3265be6909c3ae37b93eef68c8ab77b1ad6985ec93d08155a48a

  • SHA512

    c5ddb8245c9c18abe1364d4c5435b240522d44e9f6d9fb20fbcf85b618f7e7a9bb56d68865805484f111d2703519d9fdece0fa8a6e9c7dd1a69f76b4b51e7ef6

  • SSDEEP

    12288:ry90sp4crwFY0Ss/2er2iwjOKrejcIy1B:ryfp4cwr3/JwjNrejK

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fc681c1832f3265be6909c3ae37b93eef68c8ab77b1ad6985ec93d08155a48a.exe
    "C:\Users\Admin\AppData\Local\Temp\3fc681c1832f3265be6909c3ae37b93eef68c8ab77b1ad6985ec93d08155a48a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieR6246.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieR6246.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it558149.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it558149.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp275078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp275078.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 1856
          4⤵
          • Program crash
          PID:2580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr516148.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr516148.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 232 -ip 232
    1⤵
      PID:4840

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr516148.exe

            Filesize

            136KB

            MD5

            9c75a048f066d01b19ed80dc6e7a7101

            SHA1

            7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

            SHA256

            c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

            SHA512

            b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr516148.exe

            Filesize

            136KB

            MD5

            9c75a048f066d01b19ed80dc6e7a7101

            SHA1

            7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

            SHA256

            c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

            SHA512

            b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieR6246.exe

            Filesize

            414KB

            MD5

            26e413c89dbd349b7ddf82e92f437eb9

            SHA1

            a87a82da3440b1bf20d82f8b00fd1853246814e1

            SHA256

            8e71a104fcd32bd9a4816b4aabfd859ae1dd116bbfea879def5f592b32ea32a1

            SHA512

            88f8e0dce40188b01af5e476d8c0948b48219e236361b2585091d5ce1cf3c947b2369fb4a276d66baa0f5eeef38bd4457636e3d30082b118048a1dca5305b686

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieR6246.exe

            Filesize

            414KB

            MD5

            26e413c89dbd349b7ddf82e92f437eb9

            SHA1

            a87a82da3440b1bf20d82f8b00fd1853246814e1

            SHA256

            8e71a104fcd32bd9a4816b4aabfd859ae1dd116bbfea879def5f592b32ea32a1

            SHA512

            88f8e0dce40188b01af5e476d8c0948b48219e236361b2585091d5ce1cf3c947b2369fb4a276d66baa0f5eeef38bd4457636e3d30082b118048a1dca5305b686

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it558149.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it558149.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp275078.exe

            Filesize

            381KB

            MD5

            e075bd55ef55ea0d530ba494c1905e6a

            SHA1

            b542ac5613c509e3fce0ff9ce155d068688de716

            SHA256

            c833f01b1040e3cbe55f329387d6f61791c864d03c384eab3e3d3ed27f301c58

            SHA512

            04851f9b917ead4de8914bd50052277bca6f0a16c8b7f9ccb8e031d72134d1d9a996ce57bba4dea153b7873ad5066d8c3a3d45682467b78635e098e65e7eb8c5

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp275078.exe

            Filesize

            381KB

            MD5

            e075bd55ef55ea0d530ba494c1905e6a

            SHA1

            b542ac5613c509e3fce0ff9ce155d068688de716

            SHA256

            c833f01b1040e3cbe55f329387d6f61791c864d03c384eab3e3d3ed27f301c58

            SHA512

            04851f9b917ead4de8914bd50052277bca6f0a16c8b7f9ccb8e031d72134d1d9a996ce57bba4dea153b7873ad5066d8c3a3d45682467b78635e098e65e7eb8c5

          • memory/232-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

            Filesize

            280KB

          • memory/232-154-0x00000000073C0000-0x00000000073D0000-memory.dmp

            Filesize

            64KB

          • memory/232-155-0x00000000073D0000-0x0000000007974000-memory.dmp

            Filesize

            5.6MB

          • memory/232-156-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-157-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-159-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-161-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-163-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-165-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-167-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-169-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-171-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-173-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-175-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-177-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-179-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-181-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-183-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-186-0x00000000073C0000-0x00000000073D0000-memory.dmp

            Filesize

            64KB

          • memory/232-185-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-189-0x00000000073C0000-0x00000000073D0000-memory.dmp

            Filesize

            64KB

          • memory/232-188-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-191-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-193-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-195-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-197-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-201-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-199-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-203-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-205-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-207-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-209-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-211-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-213-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-215-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-217-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-219-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-221-0x0000000007310000-0x0000000007345000-memory.dmp

            Filesize

            212KB

          • memory/232-950-0x0000000009E00000-0x000000000A418000-memory.dmp

            Filesize

            6.1MB

          • memory/232-951-0x000000000A460000-0x000000000A472000-memory.dmp

            Filesize

            72KB

          • memory/232-952-0x000000000A480000-0x000000000A58A000-memory.dmp

            Filesize

            1.0MB

          • memory/232-953-0x000000000A5B0000-0x000000000A5EC000-memory.dmp

            Filesize

            240KB

          • memory/232-954-0x00000000073C0000-0x00000000073D0000-memory.dmp

            Filesize

            64KB

          • memory/232-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

            Filesize

            408KB

          • memory/232-956-0x000000000AF70000-0x000000000B002000-memory.dmp

            Filesize

            584KB

          • memory/232-957-0x000000000B270000-0x000000000B2E6000-memory.dmp

            Filesize

            472KB

          • memory/232-958-0x000000000B350000-0x000000000B512000-memory.dmp

            Filesize

            1.8MB

          • memory/232-959-0x000000000B520000-0x000000000BA4C000-memory.dmp

            Filesize

            5.2MB

          • memory/232-960-0x000000000BB60000-0x000000000BB7E000-memory.dmp

            Filesize

            120KB

          • memory/232-961-0x0000000004DF0000-0x0000000004E40000-memory.dmp

            Filesize

            320KB

          • memory/1996-968-0x0000000000160000-0x0000000000188000-memory.dmp

            Filesize

            160KB

          • memory/1996-969-0x0000000006F90000-0x0000000006FA0000-memory.dmp

            Filesize

            64KB

          • memory/4088-147-0x0000000000140000-0x000000000014A000-memory.dmp

            Filesize

            40KB