Analysis

  • max time kernel
    111s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 09:42

General

  • Target

    a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe

  • Size

    707KB

  • MD5

    815d130721bec47c7835409265ea8f58

  • SHA1

    9188f7652b8fa338464783c38b8153d13db6998a

  • SHA256

    a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551

  • SHA512

    800c2a8f51c277a61b66bcf238af7d5255d36e31a54a84fdeda39ee669fcd4da3b53d7de010df0dee2a771e7bb304b3c6996e83ca4b79e0519e0ef87fd9095a2

  • SSDEEP

    12288:Muy90Zh6smduKlzSOfkx9ZQ+NUM9JFY6AO3U6Y/cX8FaIuN65:Hyuh6saSOfkx9ZQ+NUM9JFYOeKD65

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe
    "C:\Users\Admin\AppData\Local\Temp\a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1088
          4⤵
          • Program crash
          PID:1908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 1724
          4⤵
          • Program crash
          PID:4588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5000 -ip 5000
    1⤵
      PID:4672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1612 -ip 1612
      1⤵
        PID:4132

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exe

        Filesize

        552KB

        MD5

        cc1b4e071b445c8c794c94f0a4213eff

        SHA1

        35be48de3cd091dc9e6bb505acbf3807b2d81c4d

        SHA256

        47c20a395d9a888bbc78e97cdbf7ad946de7bad12dc3cb3c4b559e70007f741d

        SHA512

        d5de93dbeecbde7d62899acf0abc88c9740a82b298bddc319028cb952cf92147e0ea20ae743efb1f02566006a38ca7754bfe1fe4f9323956d716eefdcc90f7da

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exe

        Filesize

        552KB

        MD5

        cc1b4e071b445c8c794c94f0a4213eff

        SHA1

        35be48de3cd091dc9e6bb505acbf3807b2d81c4d

        SHA256

        47c20a395d9a888bbc78e97cdbf7ad946de7bad12dc3cb3c4b559e70007f741d

        SHA512

        d5de93dbeecbde7d62899acf0abc88c9740a82b298bddc319028cb952cf92147e0ea20ae743efb1f02566006a38ca7754bfe1fe4f9323956d716eefdcc90f7da

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exe

        Filesize

        279KB

        MD5

        18c687e11a2856aa02d78e0547cc20ef

        SHA1

        15502bef5101162719f0ec1d820bbbd35ec81664

        SHA256

        32b0fa28a0f3d240e7d139dbeea90255a30b8c6a3c61c301263910aa05877000

        SHA512

        1f79456016d3064072190472cc844c04f8d36d1d09122069a9c416a74078eb6f9ee3f8ed742184aabd2719ef6765452b3da120e5eb76ac7c58019696659581d7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exe

        Filesize

        279KB

        MD5

        18c687e11a2856aa02d78e0547cc20ef

        SHA1

        15502bef5101162719f0ec1d820bbbd35ec81664

        SHA256

        32b0fa28a0f3d240e7d139dbeea90255a30b8c6a3c61c301263910aa05877000

        SHA512

        1f79456016d3064072190472cc844c04f8d36d1d09122069a9c416a74078eb6f9ee3f8ed742184aabd2719ef6765452b3da120e5eb76ac7c58019696659581d7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exe

        Filesize

        362KB

        MD5

        1cd9086cee750c5f71220719510f2361

        SHA1

        b771665b186923f6250a4301e654f29daa090ca4

        SHA256

        c94fcb1a99fd2aad555659016563ee43d8c53e418152b3463c17b7c1ac9bb525

        SHA512

        6fb86e7297ff374d41563e013d70df025f73a43d6d4d467e247b7bdd5ebb8cb9b27c694c916f55b46651cd6c9c37c03e8415c224c54e6dd2fc814bc8dca46800

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exe

        Filesize

        362KB

        MD5

        1cd9086cee750c5f71220719510f2361

        SHA1

        b771665b186923f6250a4301e654f29daa090ca4

        SHA256

        c94fcb1a99fd2aad555659016563ee43d8c53e418152b3463c17b7c1ac9bb525

        SHA512

        6fb86e7297ff374d41563e013d70df025f73a43d6d4d467e247b7bdd5ebb8cb9b27c694c916f55b46651cd6c9c37c03e8415c224c54e6dd2fc814bc8dca46800

      • memory/1612-226-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-988-0x000000000A330000-0x000000000A342000-memory.dmp

        Filesize

        72KB

      • memory/1612-998-0x0000000004C40000-0x0000000004C90000-memory.dmp

        Filesize

        320KB

      • memory/1612-997-0x000000000B850000-0x000000000B86E000-memory.dmp

        Filesize

        120KB

      • memory/1612-996-0x000000000B2A0000-0x000000000B7CC000-memory.dmp

        Filesize

        5.2MB

      • memory/1612-995-0x000000000B0C0000-0x000000000B282000-memory.dmp

        Filesize

        1.8MB

      • memory/1612-994-0x000000000AFF0000-0x000000000B066000-memory.dmp

        Filesize

        472KB

      • memory/1612-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/1612-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/1612-991-0x00000000073D0000-0x00000000073E0000-memory.dmp

        Filesize

        64KB

      • memory/1612-990-0x000000000A470000-0x000000000A4AC000-memory.dmp

        Filesize

        240KB

      • memory/1612-989-0x000000000A350000-0x000000000A45A000-memory.dmp

        Filesize

        1.0MB

      • memory/1612-987-0x0000000009D10000-0x000000000A328000-memory.dmp

        Filesize

        6.1MB

      • memory/1612-228-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-222-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-224-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-221-0x00000000073D0000-0x00000000073E0000-memory.dmp

        Filesize

        64KB

      • memory/1612-219-0x00000000073D0000-0x00000000073E0000-memory.dmp

        Filesize

        64KB

      • memory/1612-216-0x00000000073D0000-0x00000000073E0000-memory.dmp

        Filesize

        64KB

      • memory/1612-218-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-214-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-215-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/1612-212-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-192-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-191-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-194-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-196-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-198-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-200-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-202-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-204-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-206-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-208-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/1612-210-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/4728-1004-0x0000000000A30000-0x0000000000A58000-memory.dmp

        Filesize

        160KB

      • memory/4728-1005-0x0000000007880000-0x0000000007890000-memory.dmp

        Filesize

        64KB

      • memory/5000-155-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-149-0x0000000007260000-0x0000000007804000-memory.dmp

        Filesize

        5.6MB

      • memory/5000-184-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-183-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/5000-180-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-179-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-151-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-178-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-177-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-150-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-175-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-185-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/5000-169-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-173-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-165-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-167-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-163-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-161-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-159-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-157-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-171-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/5000-148-0x0000000002C90000-0x0000000002CBD000-memory.dmp

        Filesize

        180KB

      • memory/5000-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/5000-153-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB