Analysis

  • max time kernel
    92s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 02:05

General

  • Target

    b71e8857a69dcac8581f9755635ba72aca0ebc8de77d3a2e62762d339f4e29a4.exe

  • Size

    706KB

  • MD5

    5a60744c237fc9433fd28336c12b5dbd

  • SHA1

    6dc5a6ac2186a32b75a2807b66d5e533c7716c8a

  • SHA256

    b71e8857a69dcac8581f9755635ba72aca0ebc8de77d3a2e62762d339f4e29a4

  • SHA512

    98895de87bd955fc5f92fd43847aa17d3c68086b69deb712cfca79f6c93555016a657b52255d84e8fabcbbd3d86afe0dbc2dfe8c59dacc4e6d48c6cd7e23b816

  • SSDEEP

    12288:Vy90uIiwYTqiiiN3TVD4xHEZ3t3TLTgrCiUSOr7OlPsQYxESa:VyRXwYTqiiExMxkxtgUS0NQYxI

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b71e8857a69dcac8581f9755635ba72aca0ebc8de77d3a2e62762d339f4e29a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b71e8857a69dcac8581f9755635ba72aca0ebc8de77d3a2e62762d339f4e29a4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477962.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477962.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499326.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499326.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 1080
          4⤵
          • Program crash
          PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu776605.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu776605.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 1688
          4⤵
          • Program crash
          PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si876335.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si876335.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3144
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 872 -ip 872
    1⤵
      PID:2436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3932 -ip 3932
      1⤵
        PID:1220

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si876335.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si876335.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477962.exe

        Filesize

        552KB

        MD5

        0712ea25d289f909851ae9159f09d55b

        SHA1

        156b0f55858ff1f7a07363f77c6c22096cca0d89

        SHA256

        286dd011def3b88317ebd9148730a48ed9b490fa905f8877a237a9b6d480745f

        SHA512

        05bfa5b54dc32ee32b64d5bdcf3a963202d276cfec27480816196ba6b760eede5a8054c906fbc5dc27782f3791a350f72df6165c05fba568aa1f9fff1ee21c99

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477962.exe

        Filesize

        552KB

        MD5

        0712ea25d289f909851ae9159f09d55b

        SHA1

        156b0f55858ff1f7a07363f77c6c22096cca0d89

        SHA256

        286dd011def3b88317ebd9148730a48ed9b490fa905f8877a237a9b6d480745f

        SHA512

        05bfa5b54dc32ee32b64d5bdcf3a963202d276cfec27480816196ba6b760eede5a8054c906fbc5dc27782f3791a350f72df6165c05fba568aa1f9fff1ee21c99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499326.exe

        Filesize

        299KB

        MD5

        10e9dcc44620a668203c1c712671ee94

        SHA1

        35ff0438205b2238796f64e38055a5587145e161

        SHA256

        e716876d6fb5e649b9e183b3d20fe042a235b7a3141c9dbe90b6c6b9ad13c46f

        SHA512

        06aedaa8fe9a716c4b3b69bea77f9278d259dda0701c94aa08840a07957467e3a835d912571fa92d147241f2a905284980cf5e136f254f57d44f0cb0b806b473

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499326.exe

        Filesize

        299KB

        MD5

        10e9dcc44620a668203c1c712671ee94

        SHA1

        35ff0438205b2238796f64e38055a5587145e161

        SHA256

        e716876d6fb5e649b9e183b3d20fe042a235b7a3141c9dbe90b6c6b9ad13c46f

        SHA512

        06aedaa8fe9a716c4b3b69bea77f9278d259dda0701c94aa08840a07957467e3a835d912571fa92d147241f2a905284980cf5e136f254f57d44f0cb0b806b473

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu776605.exe

        Filesize

        381KB

        MD5

        3a8b2cd1e49a2a9db2a73fa2add45ebe

        SHA1

        a11f79d8409a983def81651eed9cbcce475d9fc2

        SHA256

        7b471e2158ed54c4ab79917b8068ea536fceebf6976cec5a44ae7f8a961dbb57

        SHA512

        89305f42b67080184978e6a44fc74d7688f2371f13318a56b61f588c1c8a7d39fd21746401e2632ba59ebe7867f5bb0b07d8f3016b46d307f7a4d66897715a0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu776605.exe

        Filesize

        381KB

        MD5

        3a8b2cd1e49a2a9db2a73fa2add45ebe

        SHA1

        a11f79d8409a983def81651eed9cbcce475d9fc2

        SHA256

        7b471e2158ed54c4ab79917b8068ea536fceebf6976cec5a44ae7f8a961dbb57

        SHA512

        89305f42b67080184978e6a44fc74d7688f2371f13318a56b61f588c1c8a7d39fd21746401e2632ba59ebe7867f5bb0b07d8f3016b46d307f7a4d66897715a0f

      • memory/872-161-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-171-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-150-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-151-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-153-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-155-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-157-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-159-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-148-0x0000000002BC0000-0x0000000002BED000-memory.dmp

        Filesize

        180KB

      • memory/872-163-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-165-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-167-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-169-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-149-0x0000000007460000-0x0000000007A04000-memory.dmp

        Filesize

        5.6MB

      • memory/872-173-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-175-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-177-0x0000000007270000-0x0000000007282000-memory.dmp

        Filesize

        72KB

      • memory/872-178-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-179-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-180-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-181-0x0000000000400000-0x0000000002BB4000-memory.dmp

        Filesize

        39.7MB

      • memory/872-183-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-184-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-185-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/872-186-0x0000000000400000-0x0000000002BB4000-memory.dmp

        Filesize

        39.7MB

      • memory/3144-1005-0x0000000000F20000-0x0000000000F48000-memory.dmp

        Filesize

        160KB

      • memory/3144-1006-0x0000000007C70000-0x0000000007C80000-memory.dmp

        Filesize

        64KB

      • memory/3932-191-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-194-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-196-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-198-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-200-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-202-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-204-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-206-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-208-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-210-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-212-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-214-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-216-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-218-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-221-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-220-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

        Filesize

        280KB

      • memory/3932-223-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/3932-225-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/3932-226-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/3932-224-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-228-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-987-0x0000000009C60000-0x000000000A278000-memory.dmp

        Filesize

        6.1MB

      • memory/3932-988-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/3932-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/3932-990-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/3932-991-0x000000000A470000-0x000000000A4AC000-memory.dmp

        Filesize

        240KB

      • memory/3932-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/3932-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/3932-994-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/3932-995-0x000000000AF90000-0x000000000AFAE000-memory.dmp

        Filesize

        120KB

      • memory/3932-192-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/3932-996-0x000000000B1B0000-0x000000000B372000-memory.dmp

        Filesize

        1.8MB

      • memory/3932-997-0x000000000B380000-0x000000000B8AC000-memory.dmp

        Filesize

        5.2MB

      • memory/3932-998-0x00000000048A0000-0x00000000048F0000-memory.dmp

        Filesize

        320KB