Analysis

  • max time kernel
    50s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 08:47

General

  • Target

    2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe

  • Size

    568KB

  • MD5

    9830817982d399d4fc989c79cce60959

  • SHA1

    a055ed2e3394a773d6996b0a549c00678fa944e3

  • SHA256

    2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0

  • SHA512

    927c0e582745fe0cf6ac3e3dddd604b59ee94dcf1c08796f0055c9b84b71edcfb85569bfa6c3801a8211397d7c868847ff98f2e9f2676c40be716a4050c63bd1

  • SSDEEP

    12288:0y90pzoxSMQwcFhr+TeDxE9JKOrZm6/UD8n6+6Wl+SvioS:0yScxSHwEDNEPBZSZSqoS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2424

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe

          Filesize

          136KB

          MD5

          9c75a048f066d01b19ed80dc6e7a7101

          SHA1

          7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

          SHA256

          c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

          SHA512

          b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe

          Filesize

          414KB

          MD5

          42a3ea583d4af5b67ae26424a5400f27

          SHA1

          2c1bbc2a39c53a25163e33565383bd63028217bf

          SHA256

          0f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4

          SHA512

          34b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe

          Filesize

          414KB

          MD5

          42a3ea583d4af5b67ae26424a5400f27

          SHA1

          2c1bbc2a39c53a25163e33565383bd63028217bf

          SHA256

          0f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4

          SHA512

          34b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe

          Filesize

          362KB

          MD5

          8d6366fffc044541e309b1220dc62726

          SHA1

          60e618166978f1769aacb344cbb63c896f8f9b28

          SHA256

          0c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc

          SHA512

          60c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe

          Filesize

          362KB

          MD5

          8d6366fffc044541e309b1220dc62726

          SHA1

          60e618166978f1769aacb344cbb63c896f8f9b28

          SHA256

          0c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc

          SHA512

          60c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70

        • memory/2424-956-0x0000000000DD0000-0x0000000000DF8000-memory.dmp

          Filesize

          160KB

        • memory/2424-957-0x0000000007B50000-0x0000000007B9B000-memory.dmp

          Filesize

          300KB

        • memory/2424-958-0x0000000007E80000-0x0000000007E90000-memory.dmp

          Filesize

          64KB

        • memory/4280-133-0x00000000006A0000-0x00000000006AA000-memory.dmp

          Filesize

          40KB

        • memory/4828-173-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-187-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-142-0x0000000004BE0000-0x0000000004C1A000-memory.dmp

          Filesize

          232KB

        • memory/4828-143-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-144-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-146-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-148-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-150-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-152-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-154-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-156-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-158-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-160-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-162-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-164-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-167-0x00000000074F0000-0x0000000007500000-memory.dmp

          Filesize

          64KB

        • memory/4828-165-0x00000000074F0000-0x0000000007500000-memory.dmp

          Filesize

          64KB

        • memory/4828-169-0x00000000074F0000-0x0000000007500000-memory.dmp

          Filesize

          64KB

        • memory/4828-168-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-171-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-140-0x0000000004B40000-0x0000000004B7C000-memory.dmp

          Filesize

          240KB

        • memory/4828-175-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-177-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-179-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-181-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-183-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-185-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-141-0x0000000007500000-0x00000000079FE000-memory.dmp

          Filesize

          5.0MB

        • memory/4828-189-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-191-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-193-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-195-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-197-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-199-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-201-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-203-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-205-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-207-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-209-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/4828-938-0x0000000009D80000-0x000000000A386000-memory.dmp

          Filesize

          6.0MB

        • memory/4828-939-0x0000000004D20000-0x0000000004D32000-memory.dmp

          Filesize

          72KB

        • memory/4828-940-0x000000000A390000-0x000000000A49A000-memory.dmp

          Filesize

          1.0MB

        • memory/4828-941-0x0000000004D60000-0x0000000004D9E000-memory.dmp

          Filesize

          248KB

        • memory/4828-942-0x0000000007430000-0x000000000747B000-memory.dmp

          Filesize

          300KB

        • memory/4828-943-0x00000000074F0000-0x0000000007500000-memory.dmp

          Filesize

          64KB

        • memory/4828-944-0x000000000A670000-0x000000000A6D6000-memory.dmp

          Filesize

          408KB

        • memory/4828-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

          Filesize

          584KB

        • memory/4828-946-0x000000000ADD0000-0x000000000AE46000-memory.dmp

          Filesize

          472KB

        • memory/4828-139-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

          Filesize

          280KB

        • memory/4828-947-0x000000000AE90000-0x000000000AEAE000-memory.dmp

          Filesize

          120KB

        • memory/4828-948-0x000000000B060000-0x000000000B222000-memory.dmp

          Filesize

          1.8MB

        • memory/4828-949-0x000000000B230000-0x000000000B75C000-memory.dmp

          Filesize

          5.2MB

        • memory/4828-950-0x0000000004950000-0x00000000049A0000-memory.dmp

          Filesize

          320KB