Analysis

  • max time kernel
    50s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 08:47

General

  • Target

    2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe

  • Size

    568KB

  • MD5

    9830817982d399d4fc989c79cce60959

  • SHA1

    a055ed2e3394a773d6996b0a549c00678fa944e3

  • SHA256

    2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0

  • SHA512

    927c0e582745fe0cf6ac3e3dddd604b59ee94dcf1c08796f0055c9b84b71edcfb85569bfa6c3801a8211397d7c868847ff98f2e9f2676c40be716a4050c63bd1

  • SSDEEP

    12288:0y90pzoxSMQwcFhr+TeDxE9JKOrZm6/UD8n6+6Wl+SvioS:0yScxSHwEDNEPBZSZSqoS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe

    Filesize

    136KB

    MD5

    9c75a048f066d01b19ed80dc6e7a7101

    SHA1

    7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

    SHA256

    c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

    SHA512

    b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe

    Filesize

    136KB

    MD5

    9c75a048f066d01b19ed80dc6e7a7101

    SHA1

    7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

    SHA256

    c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

    SHA512

    b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe

    Filesize

    414KB

    MD5

    42a3ea583d4af5b67ae26424a5400f27

    SHA1

    2c1bbc2a39c53a25163e33565383bd63028217bf

    SHA256

    0f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4

    SHA512

    34b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe

    Filesize

    414KB

    MD5

    42a3ea583d4af5b67ae26424a5400f27

    SHA1

    2c1bbc2a39c53a25163e33565383bd63028217bf

    SHA256

    0f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4

    SHA512

    34b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe

    Filesize

    362KB

    MD5

    8d6366fffc044541e309b1220dc62726

    SHA1

    60e618166978f1769aacb344cbb63c896f8f9b28

    SHA256

    0c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc

    SHA512

    60c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe

    Filesize

    362KB

    MD5

    8d6366fffc044541e309b1220dc62726

    SHA1

    60e618166978f1769aacb344cbb63c896f8f9b28

    SHA256

    0c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc

    SHA512

    60c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70

  • memory/2424-956-0x0000000000DD0000-0x0000000000DF8000-memory.dmp

    Filesize

    160KB

  • memory/2424-957-0x0000000007B50000-0x0000000007B9B000-memory.dmp

    Filesize

    300KB

  • memory/2424-958-0x0000000007E80000-0x0000000007E90000-memory.dmp

    Filesize

    64KB

  • memory/4280-133-0x00000000006A0000-0x00000000006AA000-memory.dmp

    Filesize

    40KB

  • memory/4828-173-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-187-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-142-0x0000000004BE0000-0x0000000004C1A000-memory.dmp

    Filesize

    232KB

  • memory/4828-143-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-144-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-146-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-148-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-150-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-152-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-154-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-156-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-158-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-160-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-162-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-164-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-167-0x00000000074F0000-0x0000000007500000-memory.dmp

    Filesize

    64KB

  • memory/4828-165-0x00000000074F0000-0x0000000007500000-memory.dmp

    Filesize

    64KB

  • memory/4828-169-0x00000000074F0000-0x0000000007500000-memory.dmp

    Filesize

    64KB

  • memory/4828-168-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-171-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-140-0x0000000004B40000-0x0000000004B7C000-memory.dmp

    Filesize

    240KB

  • memory/4828-175-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-177-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-179-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-181-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-183-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-185-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-141-0x0000000007500000-0x00000000079FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4828-189-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-191-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-193-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-195-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-197-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-199-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-201-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-203-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-205-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-207-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-209-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/4828-938-0x0000000009D80000-0x000000000A386000-memory.dmp

    Filesize

    6.0MB

  • memory/4828-939-0x0000000004D20000-0x0000000004D32000-memory.dmp

    Filesize

    72KB

  • memory/4828-940-0x000000000A390000-0x000000000A49A000-memory.dmp

    Filesize

    1.0MB

  • memory/4828-941-0x0000000004D60000-0x0000000004D9E000-memory.dmp

    Filesize

    248KB

  • memory/4828-942-0x0000000007430000-0x000000000747B000-memory.dmp

    Filesize

    300KB

  • memory/4828-943-0x00000000074F0000-0x0000000007500000-memory.dmp

    Filesize

    64KB

  • memory/4828-944-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4828-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4828-946-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/4828-139-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4828-947-0x000000000AE90000-0x000000000AEAE000-memory.dmp

    Filesize

    120KB

  • memory/4828-948-0x000000000B060000-0x000000000B222000-memory.dmp

    Filesize

    1.8MB

  • memory/4828-949-0x000000000B230000-0x000000000B75C000-memory.dmp

    Filesize

    5.2MB

  • memory/4828-950-0x0000000004950000-0x00000000049A0000-memory.dmp

    Filesize

    320KB