Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 02:00

General

  • Target

    2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe

  • Size

    568KB

  • MD5

    9e64bb9cbfdfd6f5ef2f426e4e305c0c

  • SHA1

    dac3cff0a3de05be1d9f26ada41f2e3dc2cbd642

  • SHA256

    2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2

  • SHA512

    95e1c212fa856c49e2bc725c739e3f8dc703e648bc96224f283a3a45bc9e08c29005bfb9510e93361618d8b899ee8a990337dca329a241e9482ead0648cdb39e

  • SSDEEP

    12288:Fy90DKdnyIvGaopZfN/mxrhiYtOmPdE2+eI7KGvB:FyCQnBJopZl/HYtho9Kc

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe
    "C:\Users\Admin\AppData\Local\Temp\2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 2004
          4⤵
          • Program crash
          PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4772
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3380 -ip 3380
    1⤵
      PID:392

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exe

      Filesize

      136KB

      MD5

      9c75a048f066d01b19ed80dc6e7a7101

      SHA1

      7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

      SHA256

      c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

      SHA512

      b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exe

      Filesize

      136KB

      MD5

      9c75a048f066d01b19ed80dc6e7a7101

      SHA1

      7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

      SHA256

      c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

      SHA512

      b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exe

      Filesize

      414KB

      MD5

      a2b1374993fcda11a8dfa8c528a4be9b

      SHA1

      0608a55f85ce500bc6b7f6aaf4f6766e16115a06

      SHA256

      e6bd1f5206613794d33b469d0457f5bd45c8539a314058e683c86726331fbefe

      SHA512

      149da8976f7b01e6de562219635da2026f0373c3fd282371ad9522ba00f52822cc0211e91cc615a04a13862b2bd27e09b4c0c62d3741d115cc348c425f7c037f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exe

      Filesize

      414KB

      MD5

      a2b1374993fcda11a8dfa8c528a4be9b

      SHA1

      0608a55f85ce500bc6b7f6aaf4f6766e16115a06

      SHA256

      e6bd1f5206613794d33b469d0457f5bd45c8539a314058e683c86726331fbefe

      SHA512

      149da8976f7b01e6de562219635da2026f0373c3fd282371ad9522ba00f52822cc0211e91cc615a04a13862b2bd27e09b4c0c62d3741d115cc348c425f7c037f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exe

      Filesize

      381KB

      MD5

      44eca4dfe4926d4d0dff3a7aafab6fcb

      SHA1

      d43dd39c1fd5ae03d9d6cce0c2d51b95ee1a3b8b

      SHA256

      9398a05e57b5c1470f9aa1f37b63d645bfd7ddd01be120265d7e1fe471acc87b

      SHA512

      1cf1ee314252515defa7b463c08d0940a13f9e67b57bede56d7cd7f35fbbb057ccd93d0f16fb95a4e89ecb31c4ede86f3622b5718cd1ddd6099d52b330ea1784

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exe

      Filesize

      381KB

      MD5

      44eca4dfe4926d4d0dff3a7aafab6fcb

      SHA1

      d43dd39c1fd5ae03d9d6cce0c2d51b95ee1a3b8b

      SHA256

      9398a05e57b5c1470f9aa1f37b63d645bfd7ddd01be120265d7e1fe471acc87b

      SHA512

      1cf1ee314252515defa7b463c08d0940a13f9e67b57bede56d7cd7f35fbbb057ccd93d0f16fb95a4e89ecb31c4ede86f3622b5718cd1ddd6099d52b330ea1784

    • memory/2072-147-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/3380-153-0x0000000002CB0000-0x0000000002CF6000-memory.dmp

      Filesize

      280KB

    • memory/3380-154-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3380-155-0x0000000007290000-0x0000000007834000-memory.dmp

      Filesize

      5.6MB

    • memory/3380-156-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-159-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-161-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-157-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-163-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-165-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-167-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-169-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-171-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-173-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-175-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-177-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-179-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-181-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-183-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-185-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-187-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-189-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-191-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-193-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-195-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-197-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-199-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-203-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-201-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-205-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-207-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3380-208-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-209-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3380-211-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-215-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-217-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-213-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-219-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-221-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/3380-950-0x0000000009DA0000-0x000000000A3B8000-memory.dmp

      Filesize

      6.1MB

    • memory/3380-951-0x000000000A460000-0x000000000A472000-memory.dmp

      Filesize

      72KB

    • memory/3380-952-0x000000000A480000-0x000000000A58A000-memory.dmp

      Filesize

      1.0MB

    • memory/3380-953-0x000000000A5B0000-0x000000000A5EC000-memory.dmp

      Filesize

      240KB

    • memory/3380-954-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3380-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

      Filesize

      408KB

    • memory/3380-956-0x000000000AF50000-0x000000000AFE2000-memory.dmp

      Filesize

      584KB

    • memory/3380-957-0x000000000B030000-0x000000000B0A6000-memory.dmp

      Filesize

      472KB

    • memory/3380-958-0x000000000B0D0000-0x000000000B0EE000-memory.dmp

      Filesize

      120KB

    • memory/3380-959-0x000000000B2F0000-0x000000000B4B2000-memory.dmp

      Filesize

      1.8MB

    • memory/3380-960-0x000000000B4C0000-0x000000000B9EC000-memory.dmp

      Filesize

      5.2MB

    • memory/3380-961-0x00000000048A0000-0x00000000048F0000-memory.dmp

      Filesize

      320KB

    • memory/4772-967-0x0000000000BF0000-0x0000000000C18000-memory.dmp

      Filesize

      160KB

    • memory/4772-968-0x0000000007930000-0x0000000007940000-memory.dmp

      Filesize

      64KB