Analysis

  • max time kernel
    146s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 07:36

General

  • Target

    a6a2643bfbbf600b0a9b45e7a842b8618a7b0e41bf282103352012fde302c1dc.exe

  • Size

    965KB

  • MD5

    414b0b8c7e6a23c76a9547224e9e8115

  • SHA1

    be26eaca6c77f2830d68732c88297decc5cd59a9

  • SHA256

    a6a2643bfbbf600b0a9b45e7a842b8618a7b0e41bf282103352012fde302c1dc

  • SHA512

    9cf7a617fb7842d42daef5e53201faa17755a618a6e55c03550a7214956ab14559e80a7b9f31d56c3548cc511c37da119369f3cdda400fcdefc779f9b523dad6

  • SSDEEP

    24576:6yScIkBD2JW+NN9HHpcV5C0rdicgOPdCKmyS5tF2:B9fd2Jdh4VFgOP4+c

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6a2643bfbbf600b0a9b45e7a842b8618a7b0e41bf282103352012fde302c1dc.exe
    "C:\Users\Admin\AppData\Local\Temp\a6a2643bfbbf600b0a9b45e7a842b8618a7b0e41bf282103352012fde302c1dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619623.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619623.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un044583.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un044583.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165891.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165891.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu437511.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu437511.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk778506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk778506.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687386.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687386.exe
      2⤵
      • Executes dropped EXE
      PID:320
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 616
        3⤵
        • Program crash
        PID:2872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 696
        3⤵
        • Program crash
        PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 768
        3⤵
        • Program crash
        PID:4072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 884
        3⤵
        • Program crash
        PID:2852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 848
        3⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 928
        3⤵
        • Program crash
        PID:2908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 1080
        3⤵
        • Program crash
        PID:1304

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687386.exe

          Filesize

          278KB

          MD5

          0f3d2771db3964b763efb6e16404d193

          SHA1

          1ada9a325d518cf867d2a4cdcd86b75d722efe32

          SHA256

          91465a34b013df154171ff8bf5572c8045b38854a36684d947fbb94d0b4b8ad2

          SHA512

          78498a2c775af0d4a249a16967ddc3d7ec5eb03febb0c51ef550556aeeedec5741d3eac837e858e4590adab100d8c69b71b608ff70ef998baf99ac923617114c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687386.exe

          Filesize

          278KB

          MD5

          0f3d2771db3964b763efb6e16404d193

          SHA1

          1ada9a325d518cf867d2a4cdcd86b75d722efe32

          SHA256

          91465a34b013df154171ff8bf5572c8045b38854a36684d947fbb94d0b4b8ad2

          SHA512

          78498a2c775af0d4a249a16967ddc3d7ec5eb03febb0c51ef550556aeeedec5741d3eac837e858e4590adab100d8c69b71b608ff70ef998baf99ac923617114c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619623.exe

          Filesize

          706KB

          MD5

          0d9b51e140ac7e29dfa792fcd69836f1

          SHA1

          c7a3bfe5d6733129acad0dcd3befea32bc0557fb

          SHA256

          7fdf0bc7d9c1ae711dc76eff6c24b3e1edb2d09442e9f135088f2cfe3f777577

          SHA512

          2535d43aff5a0c9df4bf437c315285ee986037a0fa5ac372b2ab8150fd4a3252613f574956f4374828607559ab14c6450f4999bac266d153ee403a60656f22a4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619623.exe

          Filesize

          706KB

          MD5

          0d9b51e140ac7e29dfa792fcd69836f1

          SHA1

          c7a3bfe5d6733129acad0dcd3befea32bc0557fb

          SHA256

          7fdf0bc7d9c1ae711dc76eff6c24b3e1edb2d09442e9f135088f2cfe3f777577

          SHA512

          2535d43aff5a0c9df4bf437c315285ee986037a0fa5ac372b2ab8150fd4a3252613f574956f4374828607559ab14c6450f4999bac266d153ee403a60656f22a4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk778506.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk778506.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un044583.exe

          Filesize

          552KB

          MD5

          555ced4322a7bb04d17c525c638f655f

          SHA1

          7c803323a3a794c728f70536cbd116d5bdaba091

          SHA256

          e5179a9b12dd7371287425b09fbafe24c3771ff95afe45a087ff7a5648928846

          SHA512

          d89066106638a9c768bfec70cd9e5eef44647833a8e69ab1997ca7a9cfde55ac8a46080a10761327b162d32f87cb420eb0165ca4285a8cedbf2f2a1ae7035231

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un044583.exe

          Filesize

          552KB

          MD5

          555ced4322a7bb04d17c525c638f655f

          SHA1

          7c803323a3a794c728f70536cbd116d5bdaba091

          SHA256

          e5179a9b12dd7371287425b09fbafe24c3771ff95afe45a087ff7a5648928846

          SHA512

          d89066106638a9c768bfec70cd9e5eef44647833a8e69ab1997ca7a9cfde55ac8a46080a10761327b162d32f87cb420eb0165ca4285a8cedbf2f2a1ae7035231

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165891.exe

          Filesize

          299KB

          MD5

          d15afebffbbdecab3234290048dcf7cb

          SHA1

          f1d8e96b06bac1e9db1b7c2268e9e1736c1737ea

          SHA256

          79279f2f24b72eeb464a2e42f680fd5c9fe07a025520a40e56f2d90b1da47e26

          SHA512

          5138d35ee349236ac09e75abea4373ed1878c19d05e974bdb3dbc08aacfed9ad8d4c51234d70aa2a880659ac42d077b4b9703c414effa82dbd69f63ce5d34bb1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165891.exe

          Filesize

          299KB

          MD5

          d15afebffbbdecab3234290048dcf7cb

          SHA1

          f1d8e96b06bac1e9db1b7c2268e9e1736c1737ea

          SHA256

          79279f2f24b72eeb464a2e42f680fd5c9fe07a025520a40e56f2d90b1da47e26

          SHA512

          5138d35ee349236ac09e75abea4373ed1878c19d05e974bdb3dbc08aacfed9ad8d4c51234d70aa2a880659ac42d077b4b9703c414effa82dbd69f63ce5d34bb1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu437511.exe

          Filesize

          382KB

          MD5

          0e5ac149dcd84fba63422a16ac34a953

          SHA1

          b47324a0e94fa1fe98c8bf551d92a98e9d4622a0

          SHA256

          7b033fc4dd77301db942e8d5ab71019aa4ad33317710fbc4934c9c27d0ff9280

          SHA512

          6de14547487685aef13fc45f0887685332027d94b92818eb810c5de3aa58c840da9c98c38538d9d4854eeae32806b66e94b434d497dc320e6105206c82e1bedd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu437511.exe

          Filesize

          382KB

          MD5

          0e5ac149dcd84fba63422a16ac34a953

          SHA1

          b47324a0e94fa1fe98c8bf551d92a98e9d4622a0

          SHA256

          7b033fc4dd77301db942e8d5ab71019aa4ad33317710fbc4934c9c27d0ff9280

          SHA512

          6de14547487685aef13fc45f0887685332027d94b92818eb810c5de3aa58c840da9c98c38538d9d4854eeae32806b66e94b434d497dc320e6105206c82e1bedd

        • memory/320-1011-0x0000000002BB0000-0x0000000002BE5000-memory.dmp

          Filesize

          212KB

        • memory/2980-984-0x0000000009CF0000-0x000000000A2F6000-memory.dmp

          Filesize

          6.0MB

        • memory/2980-989-0x000000000A410000-0x000000000A45B000-memory.dmp

          Filesize

          300KB

        • memory/2980-997-0x0000000004B70000-0x0000000004BC0000-memory.dmp

          Filesize

          320KB

        • memory/2980-996-0x000000000B6F0000-0x000000000B70E000-memory.dmp

          Filesize

          120KB

        • memory/2980-995-0x000000000B090000-0x000000000B5BC000-memory.dmp

          Filesize

          5.2MB

        • memory/2980-994-0x000000000AEB0000-0x000000000B072000-memory.dmp

          Filesize

          1.8MB

        • memory/2980-993-0x000000000ADF0000-0x000000000AE66000-memory.dmp

          Filesize

          472KB

        • memory/2980-991-0x000000000AD20000-0x000000000ADB2000-memory.dmp

          Filesize

          584KB

        • memory/2980-990-0x000000000A670000-0x000000000A6D6000-memory.dmp

          Filesize

          408KB

        • memory/2980-988-0x0000000007360000-0x0000000007370000-memory.dmp

          Filesize

          64KB

        • memory/2980-987-0x00000000072B0000-0x00000000072EE000-memory.dmp

          Filesize

          248KB

        • memory/2980-986-0x000000000A300000-0x000000000A40A000-memory.dmp

          Filesize

          1.0MB

        • memory/2980-985-0x0000000007280000-0x0000000007292000-memory.dmp

          Filesize

          72KB

        • memory/2980-225-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-223-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-221-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-219-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-217-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-215-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-213-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-186-0x0000000004880000-0x00000000048BC000-memory.dmp

          Filesize

          240KB

        • memory/2980-187-0x0000000004C00000-0x0000000004C3A000-memory.dmp

          Filesize

          232KB

        • memory/2980-188-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-189-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-191-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-193-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-195-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-197-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-200-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

          Filesize

          280KB

        • memory/2980-199-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-202-0x0000000007360000-0x0000000007370000-memory.dmp

          Filesize

          64KB

        • memory/2980-203-0x0000000007360000-0x0000000007370000-memory.dmp

          Filesize

          64KB

        • memory/2980-207-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-204-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-206-0x0000000007360000-0x0000000007370000-memory.dmp

          Filesize

          64KB

        • memory/2980-209-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/2980-211-0x0000000004C00000-0x0000000004C35000-memory.dmp

          Filesize

          212KB

        • memory/3796-1003-0x0000000000010000-0x0000000000038000-memory.dmp

          Filesize

          160KB

        • memory/3796-1005-0x0000000006E10000-0x0000000006E20000-memory.dmp

          Filesize

          64KB

        • memory/3796-1004-0x0000000006D90000-0x0000000006DDB000-memory.dmp

          Filesize

          300KB

        • memory/4928-163-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-159-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-177-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-175-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-148-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4928-173-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-171-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-169-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-167-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-151-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-165-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-149-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4928-161-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-178-0x0000000000400000-0x0000000002BB5000-memory.dmp

          Filesize

          39.7MB

        • memory/4928-157-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-155-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-153-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-147-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4928-146-0x00000000070F0000-0x0000000007108000-memory.dmp

          Filesize

          96KB

        • memory/4928-179-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4928-181-0x0000000000400000-0x0000000002BB5000-memory.dmp

          Filesize

          39.7MB

        • memory/4928-150-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4928-145-0x0000000007150000-0x000000000764E000-memory.dmp

          Filesize

          5.0MB

        • memory/4928-144-0x0000000004750000-0x000000000476A000-memory.dmp

          Filesize

          104KB

        • memory/4928-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB