Analysis

  • max time kernel
    84s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 07:16

General

  • Target

    e7a90fb306b9a973c6ef7df37446bc9e1a0fbe79f1d473526bab110d8f2a42aa.exe

  • Size

    707KB

  • MD5

    0618462f2f222907a6470e8de03c6419

  • SHA1

    e881955e6e3e2da63813541f264d62bc234b0ab5

  • SHA256

    e7a90fb306b9a973c6ef7df37446bc9e1a0fbe79f1d473526bab110d8f2a42aa

  • SHA512

    930bfb8b018886cac816eb420d8ec644969c9c97e542337dfa8cbe3e6c1bd103cdc276732da0bea575eab0ccf05aafff4c9f6f0ec3e819a3b65db99cfc7c62bf

  • SSDEEP

    12288:Ly906zyuhU1TP0k6G+9kwWbeULOkJSMuWdDdreJY8c0f6ZdbL8t8C:Lylz/hUZIt0e18z7reTc4+68C

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a90fb306b9a973c6ef7df37446bc9e1a0fbe79f1d473526bab110d8f2a42aa.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a90fb306b9a973c6ef7df37446bc9e1a0fbe79f1d473526bab110d8f2a42aa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un391959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un391959.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr298868.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr298868.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 1080
          4⤵
          • Program crash
          PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu463827.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu463827.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 1328
          4⤵
          • Program crash
          PID:896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854259.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854259.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1276 -ip 1276
    1⤵
      PID:5048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 444 -ip 444
      1⤵
        PID:1276

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854259.exe

              Filesize

              136KB

              MD5

              9c75a048f066d01b19ed80dc6e7a7101

              SHA1

              7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

              SHA256

              c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

              SHA512

              b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854259.exe

              Filesize

              136KB

              MD5

              9c75a048f066d01b19ed80dc6e7a7101

              SHA1

              7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

              SHA256

              c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

              SHA512

              b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un391959.exe

              Filesize

              552KB

              MD5

              84bb8187ab8bb0d2a8547b6c2ffea03b

              SHA1

              be7be1a0c2b6d31ce35ea7623029398fd205f8b6

              SHA256

              d7ee4bd1468c2ed9b1415e1ed528886cffedf5b5fb03fd21608dcb148a280ec3

              SHA512

              a373d79bcd45637f577a7bc6b5dd83349da8078f103d52c9b649ffe4a1fb472d9292ed7be2495e7249669980d53d1ef732767865a71197d681f85058950bb6e9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un391959.exe

              Filesize

              552KB

              MD5

              84bb8187ab8bb0d2a8547b6c2ffea03b

              SHA1

              be7be1a0c2b6d31ce35ea7623029398fd205f8b6

              SHA256

              d7ee4bd1468c2ed9b1415e1ed528886cffedf5b5fb03fd21608dcb148a280ec3

              SHA512

              a373d79bcd45637f577a7bc6b5dd83349da8078f103d52c9b649ffe4a1fb472d9292ed7be2495e7249669980d53d1ef732767865a71197d681f85058950bb6e9

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr298868.exe

              Filesize

              299KB

              MD5

              174e75ab32059f5e64974d7fb2355bc8

              SHA1

              d2afce3118c441098bf60a4169a369448f832d84

              SHA256

              8660a3a830051d281005daa31f59780fe136cd8c8b9a829aa7d9b315e95549b4

              SHA512

              660edaea55cc8be4042d2e5cb8bf84ae1b49c14d3db130d642b1f3ae800f36ecdd17d02c182ddc4f16a403e40d6d4e7bff0f60d83e02de86913b514e207f46a6

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr298868.exe

              Filesize

              299KB

              MD5

              174e75ab32059f5e64974d7fb2355bc8

              SHA1

              d2afce3118c441098bf60a4169a369448f832d84

              SHA256

              8660a3a830051d281005daa31f59780fe136cd8c8b9a829aa7d9b315e95549b4

              SHA512

              660edaea55cc8be4042d2e5cb8bf84ae1b49c14d3db130d642b1f3ae800f36ecdd17d02c182ddc4f16a403e40d6d4e7bff0f60d83e02de86913b514e207f46a6

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu463827.exe

              Filesize

              382KB

              MD5

              5c5ef486fa7c1d4feec3fdca02060da8

              SHA1

              9932225b0dd39bacf23140314c3d5926008df313

              SHA256

              c9321ba9e71997dab9f056bab8ad241ec2c73a8c34b1a368141c4152c79b50c6

              SHA512

              9a6eb3aadb9d4462ba2c0288808c93673c5f4cf14b019012fd1d7855e3bc1c112aea31039480f8a28ec82f53235d2fb4aa8c8a0d0916dd764218e8569c1480fd

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu463827.exe

              Filesize

              382KB

              MD5

              5c5ef486fa7c1d4feec3fdca02060da8

              SHA1

              9932225b0dd39bacf23140314c3d5926008df313

              SHA256

              c9321ba9e71997dab9f056bab8ad241ec2c73a8c34b1a368141c4152c79b50c6

              SHA512

              9a6eb3aadb9d4462ba2c0288808c93673c5f4cf14b019012fd1d7855e3bc1c112aea31039480f8a28ec82f53235d2fb4aa8c8a0d0916dd764218e8569c1480fd

            • memory/444-227-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-986-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

              Filesize

              6.1MB

            • memory/444-997-0x000000000B390000-0x000000000B8BC000-memory.dmp

              Filesize

              5.2MB

            • memory/444-996-0x000000000B1C0000-0x000000000B382000-memory.dmp

              Filesize

              1.8MB

            • memory/444-995-0x000000000B160000-0x000000000B1B0000-memory.dmp

              Filesize

              320KB

            • memory/444-994-0x000000000B0A0000-0x000000000B0BE000-memory.dmp

              Filesize

              120KB

            • memory/444-993-0x000000000AFE0000-0x000000000B056000-memory.dmp

              Filesize

              472KB

            • memory/444-992-0x000000000AF30000-0x000000000AFC2000-memory.dmp

              Filesize

              584KB

            • memory/444-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

              Filesize

              408KB

            • memory/444-990-0x0000000007370000-0x0000000007380000-memory.dmp

              Filesize

              64KB

            • memory/444-989-0x000000000A470000-0x000000000A4AC000-memory.dmp

              Filesize

              240KB

            • memory/444-988-0x000000000A340000-0x000000000A44A000-memory.dmp

              Filesize

              1.0MB

            • memory/444-987-0x000000000A320000-0x000000000A332000-memory.dmp

              Filesize

              72KB

            • memory/444-225-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-223-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-221-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-219-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-217-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-215-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-213-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-211-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-209-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-190-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

              Filesize

              280KB

            • memory/444-191-0x0000000007370000-0x0000000007380000-memory.dmp

              Filesize

              64KB

            • memory/444-193-0x0000000007370000-0x0000000007380000-memory.dmp

              Filesize

              64KB

            • memory/444-195-0x0000000007370000-0x0000000007380000-memory.dmp

              Filesize

              64KB

            • memory/444-194-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-192-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-197-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-199-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-203-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-201-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-205-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/444-207-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

              Filesize

              212KB

            • memory/1276-173-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-149-0x0000000007320000-0x00000000078C4000-memory.dmp

              Filesize

              5.6MB

            • memory/1276-185-0x0000000000400000-0x0000000002BB5000-memory.dmp

              Filesize

              39.7MB

            • memory/1276-183-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1276-182-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1276-181-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1276-180-0x0000000000400000-0x0000000002BB5000-memory.dmp

              Filesize

              39.7MB

            • memory/1276-179-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-177-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-150-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1276-155-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-175-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-152-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-151-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1276-161-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-167-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-165-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-163-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-169-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-159-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-157-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-153-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-171-0x0000000007270000-0x0000000007282000-memory.dmp

              Filesize

              72KB

            • memory/1276-148-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

              Filesize

              180KB

            • memory/2696-1004-0x0000000000A60000-0x0000000000A88000-memory.dmp

              Filesize

              160KB

            • memory/2696-1005-0x00000000077B0000-0x00000000077C0000-memory.dmp

              Filesize

              64KB