Analysis

  • max time kernel
    67s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 06:16

General

  • Target

    8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe

  • Size

    569KB

  • MD5

    68b8e410cc5d6b07910f13815043595e

  • SHA1

    735d3fd85e5d01389c9137795416f663a3151fe1

  • SHA256

    8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8

  • SHA512

    60fdf15852416eb8450ef7a61c53d6184c4aebd1bff0239c1c24f0e252f377bb51adfd15426e916644c94e887ed8d0c6d33be912faba42e40624f14c31848901

  • SSDEEP

    12288:4y90WYsjSYqAlKQ3EkRbIPE3d/nrY8L0LT9rrRL14T32JF:4yVbjSYBlKWEk+st/ntLYzQ32D

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe
    "C:\Users\Admin\AppData\Local\Temp\8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1872
          4⤵
          • Program crash
          PID:2736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3952 -ip 3952
    1⤵
      PID:380

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exe

            Filesize

            136KB

            MD5

            9c75a048f066d01b19ed80dc6e7a7101

            SHA1

            7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

            SHA256

            c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

            SHA512

            b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exe

            Filesize

            136KB

            MD5

            9c75a048f066d01b19ed80dc6e7a7101

            SHA1

            7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

            SHA256

            c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

            SHA512

            b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exe

            Filesize

            415KB

            MD5

            af688850d3eb94f999bb5feddd0d3b51

            SHA1

            c8e115cc0569bc31193397005163c19010b13663

            SHA256

            77f9da5f07dcf9384c4eddefa2fb9185056e3b867d9f15eb7ad2154e1376df23

            SHA512

            13dd82c5362112ee6027af75cbd9db884a3b0ca6654471e51e86d171d9fbf90f0c4476d15b940b9a02b090ca6e83f6dc222d82e88dc2d9bfdd13402f2ddec22a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exe

            Filesize

            415KB

            MD5

            af688850d3eb94f999bb5feddd0d3b51

            SHA1

            c8e115cc0569bc31193397005163c19010b13663

            SHA256

            77f9da5f07dcf9384c4eddefa2fb9185056e3b867d9f15eb7ad2154e1376df23

            SHA512

            13dd82c5362112ee6027af75cbd9db884a3b0ca6654471e51e86d171d9fbf90f0c4476d15b940b9a02b090ca6e83f6dc222d82e88dc2d9bfdd13402f2ddec22a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exe

            Filesize

            382KB

            MD5

            a923a47204481208ac8f64d0102cac82

            SHA1

            64e3b90f73759d02e99a59e58180344ae69117d1

            SHA256

            77dc572834f2af2db5e9968ccb75aa8f4eba1e7c8b9100d13c7d918c9ded8c4d

            SHA512

            31d736fda36ad02a67cbd58bbfa60ad5503d103535fdd568579d30dbba8b1d4ef2e35598967a08232109585f0877342674f0db5c84379669c6c2052733d62f2b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exe

            Filesize

            382KB

            MD5

            a923a47204481208ac8f64d0102cac82

            SHA1

            64e3b90f73759d02e99a59e58180344ae69117d1

            SHA256

            77dc572834f2af2db5e9968ccb75aa8f4eba1e7c8b9100d13c7d918c9ded8c4d

            SHA512

            31d736fda36ad02a67cbd58bbfa60ad5503d103535fdd568579d30dbba8b1d4ef2e35598967a08232109585f0877342674f0db5c84379669c6c2052733d62f2b

          • memory/2428-147-0x0000000000920000-0x000000000092A000-memory.dmp

            Filesize

            40KB

          • memory/3952-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

            Filesize

            280KB

          • memory/3952-154-0x0000000007270000-0x0000000007814000-memory.dmp

            Filesize

            5.6MB

          • memory/3952-155-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-156-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-157-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-158-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-162-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-160-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-164-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-166-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-168-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-170-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-172-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-176-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-174-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-178-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-180-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-182-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-184-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-186-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-188-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-190-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-192-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-194-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-196-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-198-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-200-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-202-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-204-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-206-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-208-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-210-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-212-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-214-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-216-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-218-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-220-0x0000000007170000-0x00000000071A5000-memory.dmp

            Filesize

            212KB

          • memory/3952-949-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

            Filesize

            6.1MB

          • memory/3952-950-0x000000000A320000-0x000000000A332000-memory.dmp

            Filesize

            72KB

          • memory/3952-951-0x000000000A340000-0x000000000A44A000-memory.dmp

            Filesize

            1.0MB

          • memory/3952-952-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-953-0x000000000A470000-0x000000000A4AC000-memory.dmp

            Filesize

            240KB

          • memory/3952-954-0x000000000A760000-0x000000000A7C6000-memory.dmp

            Filesize

            408KB

          • memory/3952-955-0x000000000AE20000-0x000000000AEB2000-memory.dmp

            Filesize

            584KB

          • memory/3952-956-0x000000000AED0000-0x000000000AF46000-memory.dmp

            Filesize

            472KB

          • memory/3952-958-0x000000000AFA0000-0x000000000AFBE000-memory.dmp

            Filesize

            120KB

          • memory/3952-959-0x000000000B020000-0x000000000B070000-memory.dmp

            Filesize

            320KB

          • memory/3952-960-0x000000000B1B0000-0x000000000B372000-memory.dmp

            Filesize

            1.8MB

          • memory/3952-961-0x000000000B390000-0x000000000B8BC000-memory.dmp

            Filesize

            5.2MB

          • memory/3952-962-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-963-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-964-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/3952-967-0x0000000007260000-0x0000000007270000-memory.dmp

            Filesize

            64KB

          • memory/4760-971-0x0000000000160000-0x0000000000188000-memory.dmp

            Filesize

            160KB

          • memory/4760-972-0x0000000006F40000-0x0000000006F50000-memory.dmp

            Filesize

            64KB