Analysis

  • max time kernel
    109s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 06:04

General

  • Target

    e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe

  • Size

    706KB

  • MD5

    cfe6b708a4f08ebf30b8da8c29f7af15

  • SHA1

    643876dba991672727d8c2ae1a93bba14c87acac

  • SHA256

    e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9

  • SHA512

    76678ab6f1af1577a0d89ae2bbca989e96dceaeb364e7dfb5d84e4cab797736b91278aba95bbbe156ea266ef0bcf80b130979f06c60ea2a4ee7835537df23211

  • SSDEEP

    12288:fy903OJcsDqiHubSLGQeSs29vQAGR0eQNdrHJY8c0pRZm7KkicAuo:fy/JcsDfub+sAGe1rHTc6H/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe
    "C:\Users\Admin\AppData\Local\Temp\e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1080
          4⤵
          • Program crash
          PID:1624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1328
          4⤵
          • Program crash
          PID:1976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1736 -ip 1736
    1⤵
      PID:4028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3744 -ip 3744
      1⤵
        PID:4184

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exe

        Filesize

        552KB

        MD5

        f7dc772a89e6f87839a4068645152ac0

        SHA1

        6a807fe73426c929b804553629e38b6995d3900b

        SHA256

        704e9239932c5efa295d354f0353bef5c38556bfef19a02c2a58d081654d194b

        SHA512

        2e88cd24b5e97752b6538e42103e5a0757505363a6b91c642e7ad987c81457d6bf9db6dab42cc1d2f24f2ce4993711f03812a257ecf55f4dd32b56f83af87d18

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exe

        Filesize

        552KB

        MD5

        f7dc772a89e6f87839a4068645152ac0

        SHA1

        6a807fe73426c929b804553629e38b6995d3900b

        SHA256

        704e9239932c5efa295d354f0353bef5c38556bfef19a02c2a58d081654d194b

        SHA512

        2e88cd24b5e97752b6538e42103e5a0757505363a6b91c642e7ad987c81457d6bf9db6dab42cc1d2f24f2ce4993711f03812a257ecf55f4dd32b56f83af87d18

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exe

        Filesize

        299KB

        MD5

        c2a3bfe96ffb525e3998ba7850dc75f6

        SHA1

        205eddfce544f33dc8fe04da3323bb3378a256de

        SHA256

        438dd9fa1397a5b2fb7e9c636e722dffa8dd444a602e2611592c77245e68c73e

        SHA512

        bfcf75b1f4f2c1fb051c55cc3199f09df56b1586cdb4ea8afe4e21761f409b35ee49bdb25c8e55bab3e5bcfd7159f70bc7a899f5a2b3d52e330f07effa5eb9e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exe

        Filesize

        299KB

        MD5

        c2a3bfe96ffb525e3998ba7850dc75f6

        SHA1

        205eddfce544f33dc8fe04da3323bb3378a256de

        SHA256

        438dd9fa1397a5b2fb7e9c636e722dffa8dd444a602e2611592c77245e68c73e

        SHA512

        bfcf75b1f4f2c1fb051c55cc3199f09df56b1586cdb4ea8afe4e21761f409b35ee49bdb25c8e55bab3e5bcfd7159f70bc7a899f5a2b3d52e330f07effa5eb9e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exe

        Filesize

        382KB

        MD5

        96fe7c032e1746f316f17358633d1a5e

        SHA1

        f1a80e60a28ed5b5dc2cf6a5982c7768cc407748

        SHA256

        6db1a493b556a28dfba394ede73eeef360c3784bcaabfa68ad295562f66aa1ee

        SHA512

        195321ddba12b1eeb233ca65c64b1bde439bec20e209b680170e3ca36f69749dd40d4c7cae7251c9922e9800a81880d7bd0411d7cfa00b6fc33a497b123d6bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exe

        Filesize

        382KB

        MD5

        96fe7c032e1746f316f17358633d1a5e

        SHA1

        f1a80e60a28ed5b5dc2cf6a5982c7768cc407748

        SHA256

        6db1a493b556a28dfba394ede73eeef360c3784bcaabfa68ad295562f66aa1ee

        SHA512

        195321ddba12b1eeb233ca65c64b1bde439bec20e209b680170e3ca36f69749dd40d4c7cae7251c9922e9800a81880d7bd0411d7cfa00b6fc33a497b123d6bdc

      • memory/1736-158-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-168-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-149-0x00000000073D0000-0x0000000007974000-memory.dmp

        Filesize

        5.6MB

      • memory/1736-151-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-152-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-153-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-154-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-156-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-148-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

        Filesize

        180KB

      • memory/1736-160-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-162-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-164-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-166-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-150-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-170-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-172-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-174-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-176-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-178-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-180-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

        Filesize

        72KB

      • memory/1736-181-0x0000000000400000-0x0000000002BB5000-memory.dmp

        Filesize

        39.7MB

      • memory/1736-182-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-183-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-184-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/1736-186-0x0000000000400000-0x0000000002BB5000-memory.dmp

        Filesize

        39.7MB

      • memory/3632-1005-0x00000000003B0000-0x00000000003D8000-memory.dmp

        Filesize

        160KB

      • memory/3632-1006-0x00000000074A0000-0x00000000074B0000-memory.dmp

        Filesize

        64KB

      • memory/3744-191-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

        Filesize

        280KB

      • memory/3744-194-0x00000000049B0000-0x00000000049C0000-memory.dmp

        Filesize

        64KB

      • memory/3744-195-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-193-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-198-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-200-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-196-0x00000000049B0000-0x00000000049C0000-memory.dmp

        Filesize

        64KB

      • memory/3744-202-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-204-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-206-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-208-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-210-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-212-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-214-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-216-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-218-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-220-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-222-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-224-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-228-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-226-0x00000000077B0000-0x00000000077E5000-memory.dmp

        Filesize

        212KB

      • memory/3744-987-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

        Filesize

        6.1MB

      • memory/3744-988-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/3744-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/3744-990-0x000000000A470000-0x000000000A4AC000-memory.dmp

        Filesize

        240KB

      • memory/3744-991-0x00000000049B0000-0x00000000049C0000-memory.dmp

        Filesize

        64KB

      • memory/3744-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/3744-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/3744-994-0x000000000AEF0000-0x000000000AF66000-memory.dmp

        Filesize

        472KB

      • memory/3744-995-0x000000000AFD0000-0x000000000B192000-memory.dmp

        Filesize

        1.8MB

      • memory/3744-192-0x00000000049B0000-0x00000000049C0000-memory.dmp

        Filesize

        64KB

      • memory/3744-996-0x000000000B1A0000-0x000000000B6CC000-memory.dmp

        Filesize

        5.2MB

      • memory/3744-997-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

        Filesize

        120KB

      • memory/3744-999-0x000000000BA70000-0x000000000BAC0000-memory.dmp

        Filesize

        320KB