Analysis

  • max time kernel
    111s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 08:46

General

  • Target

    23dfe58789c140fb3020f9b97c4c6a9635e00fdff341e169e8683629dd810e42.exe

  • Size

    707KB

  • MD5

    ab74fb9069dc3151aee0e4ce6287dceb

  • SHA1

    7f4a6c04c7cfacc7a9d2d4e2d46c2e6de6d36215

  • SHA256

    23dfe58789c140fb3020f9b97c4c6a9635e00fdff341e169e8683629dd810e42

  • SHA512

    74a707eca1583cb2a5a239aea2c48f62b5826ada14344db86b9d239b72cba86600012e896767291e8e31bc3510888c19446984bf8aba469f3b859cc48d424943

  • SSDEEP

    12288:7y90h+/0Z/IAgrNzZ3oRQZbpCbu8JQT+KOzn6W/cE8kmFkgK1XH:7yM+/0Z/IP1oRgtqrJQYjPXH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23dfe58789c140fb3020f9b97c4c6a9635e00fdff341e169e8683629dd810e42.exe
    "C:\Users\Admin\AppData\Local\Temp\23dfe58789c140fb3020f9b97c4c6a9635e00fdff341e169e8683629dd810e42.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835075.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835075.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783257.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783257.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 1084
          4⤵
          • Program crash
          PID:3000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834984.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834984.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 2108
          4⤵
          • Program crash
          PID:1756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052679.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052679.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1796
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3680 -ip 3680
    1⤵
      PID:4304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 380 -ip 380
      1⤵
        PID:1672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052679.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052679.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835075.exe

        Filesize

        552KB

        MD5

        23f91f747c6fcf5e4d2516ddb9b6e226

        SHA1

        60d7fae1f4a84102b474719c37d07f58807cb30b

        SHA256

        e274b13a5615c26e7a6207f6015e96e85f154dbe6ddb2b52236cff1cf5edaf28

        SHA512

        ddb4d393fec2ef604a877d3f20e14c2adbe9f9ae25c25db00c461751b0d958ab540f3135447c1042e5d01deae4078cb9f045a17c578b79bca1d774c7d019c97e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835075.exe

        Filesize

        552KB

        MD5

        23f91f747c6fcf5e4d2516ddb9b6e226

        SHA1

        60d7fae1f4a84102b474719c37d07f58807cb30b

        SHA256

        e274b13a5615c26e7a6207f6015e96e85f154dbe6ddb2b52236cff1cf5edaf28

        SHA512

        ddb4d393fec2ef604a877d3f20e14c2adbe9f9ae25c25db00c461751b0d958ab540f3135447c1042e5d01deae4078cb9f045a17c578b79bca1d774c7d019c97e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783257.exe

        Filesize

        279KB

        MD5

        a0c0cdcad03125d8a01a832802bf715b

        SHA1

        b4296f95dcbdee5dd8da9217177a5de2a6f7012c

        SHA256

        132d9f9cb55ea29f3b1a76406b0994e92c3b7595fcaa9703dc2677affb6582c6

        SHA512

        e08e07d6c557f8896e1c4ec103520f45f609c88dc48eac266f7077a652d2a4bb75e8aa205a6dadf4f59bb26e50a44fee39a0153906b5b0d310cbf51f7d7164fa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783257.exe

        Filesize

        279KB

        MD5

        a0c0cdcad03125d8a01a832802bf715b

        SHA1

        b4296f95dcbdee5dd8da9217177a5de2a6f7012c

        SHA256

        132d9f9cb55ea29f3b1a76406b0994e92c3b7595fcaa9703dc2677affb6582c6

        SHA512

        e08e07d6c557f8896e1c4ec103520f45f609c88dc48eac266f7077a652d2a4bb75e8aa205a6dadf4f59bb26e50a44fee39a0153906b5b0d310cbf51f7d7164fa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834984.exe

        Filesize

        362KB

        MD5

        a4e738809bda612c8607fd8ae9b84826

        SHA1

        0a9b29ded871db9b13188331d0f5c2e2327774cc

        SHA256

        61ca87fe2c5be8d9e8cc12c79cd0bb8d544cdb070ae146f1acebd18c3e84f508

        SHA512

        1dfb708cedc0e05a9beb8cd4236f59afee66e49327b6257b56e59af014400fdeda0443319e7b76df82a30603f6139fe0653f70575a20c2449af51128cefc60f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834984.exe

        Filesize

        362KB

        MD5

        a4e738809bda612c8607fd8ae9b84826

        SHA1

        0a9b29ded871db9b13188331d0f5c2e2327774cc

        SHA256

        61ca87fe2c5be8d9e8cc12c79cd0bb8d544cdb070ae146f1acebd18c3e84f508

        SHA512

        1dfb708cedc0e05a9beb8cd4236f59afee66e49327b6257b56e59af014400fdeda0443319e7b76df82a30603f6139fe0653f70575a20c2449af51128cefc60f3

      • memory/380-990-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/380-989-0x0000000009C60000-0x000000000A278000-memory.dmp

        Filesize

        6.1MB

      • memory/380-218-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-216-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-204-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-206-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-1004-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-1003-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-1001-0x000000000B6E0000-0x000000000BC0C000-memory.dmp

        Filesize

        5.2MB

      • memory/380-1000-0x000000000B510000-0x000000000B6D2000-memory.dmp

        Filesize

        1.8MB

      • memory/380-210-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-998-0x000000000B230000-0x000000000B24E000-memory.dmp

        Filesize

        120KB

      • memory/380-997-0x000000000AF40000-0x000000000AFB6000-memory.dmp

        Filesize

        472KB

      • memory/380-996-0x000000000AEE0000-0x000000000AF30000-memory.dmp

        Filesize

        320KB

      • memory/380-995-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/380-994-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/380-993-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-992-0x000000000A470000-0x000000000A4AC000-memory.dmp

        Filesize

        240KB

      • memory/380-991-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/380-220-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-251-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-249-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-247-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-244-0x00000000045B0000-0x00000000045F6000-memory.dmp

        Filesize

        280KB

      • memory/380-193-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-194-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-196-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-202-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-200-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-198-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-224-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-1005-0x00000000071D0000-0x00000000071E0000-memory.dmp

        Filesize

        64KB

      • memory/380-222-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-208-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-212-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/380-214-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1796-1010-0x0000000000E60000-0x0000000000E88000-memory.dmp

        Filesize

        160KB

      • memory/1796-1011-0x0000000007C30000-0x0000000007C40000-memory.dmp

        Filesize

        64KB

      • memory/3680-181-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-169-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/3680-151-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-152-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-188-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/3680-185-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-184-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-150-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-183-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/3680-182-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/3680-153-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-179-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-177-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-175-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-173-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-171-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-167-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-165-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-163-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-161-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-154-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/3680-149-0x00000000072B0000-0x0000000007854000-memory.dmp

        Filesize

        5.6MB

      • memory/3680-159-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-157-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB

      • memory/3680-155-0x0000000007260000-0x0000000007272000-memory.dmp

        Filesize

        72KB