Analysis

  • max time kernel
    51s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-04-2023 10:26

General

  • Target

    998501f9fe9d5952fe6133c7381bd195e5ee18db4e9abdfb1746ceb9a7360fc5.exe

  • Size

    706KB

  • MD5

    7c9d8bf30191d060d7b84b720fd27197

  • SHA1

    452daeaf47c1ef21093f3b5cdfb850e88628b41b

  • SHA256

    998501f9fe9d5952fe6133c7381bd195e5ee18db4e9abdfb1746ceb9a7360fc5

  • SHA512

    c6299fc6339a3799fbaa3913c7255cbd54a06a74e6316546f7b6d5b2d2f84ec72e6bf9505b27474b78fd24beb05a0f281c544782775dfda97835eeebdc2f856f

  • SSDEEP

    12288:2y90BGpsD1PTt+atYjPERalYrzEv6XGzwnfDO3n64/cS8Asbe1bkKaOsi:2yFpsDFgatHwl0EvQKm6ttoedN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\998501f9fe9d5952fe6133c7381bd195e5ee18db4e9abdfb1746ceb9a7360fc5.exe
    "C:\Users\Admin\AppData\Local\Temp\998501f9fe9d5952fe6133c7381bd195e5ee18db4e9abdfb1746ceb9a7360fc5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026831.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026831.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr567208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr567208.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu273471.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu273471.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681195.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681195.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681195.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681195.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026831.exe

    Filesize

    551KB

    MD5

    fda2920b20f52280ca128df949c0c342

    SHA1

    5ad63f03c7a2dbb9d60cd3be9d85d748929ca415

    SHA256

    6c8a0cdb10bfd87c12317730124cdba1520ccdb6b78e14ff61f44115b1843312

    SHA512

    157228b1c4e0166e73eaa51cd724e5e35aa7dbdb76072bbce8379933886ff15c48a83b6759ee26a74cc11dd09a76b142a1f5be288a630c3f5bfceb68d5e20197

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026831.exe

    Filesize

    551KB

    MD5

    fda2920b20f52280ca128df949c0c342

    SHA1

    5ad63f03c7a2dbb9d60cd3be9d85d748929ca415

    SHA256

    6c8a0cdb10bfd87c12317730124cdba1520ccdb6b78e14ff61f44115b1843312

    SHA512

    157228b1c4e0166e73eaa51cd724e5e35aa7dbdb76072bbce8379933886ff15c48a83b6759ee26a74cc11dd09a76b142a1f5be288a630c3f5bfceb68d5e20197

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr567208.exe

    Filesize

    279KB

    MD5

    3fe3851a342426cd9e1cb7d34e44f333

    SHA1

    baeb93d05e5a8d4343821a33c7e824e764f4e822

    SHA256

    f92fe7349ebe6e604af698116fe9dda05e9c2ecef34aa0f499cd88f848846e2e

    SHA512

    ec4b32bdfb2e0760bc3dae66e3eff123f12280e8a2de5b537b475720f072d1e091f019569a1b4a6f94a924e80f72f70f5467e9a3351987bef8de95585bde8232

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr567208.exe

    Filesize

    279KB

    MD5

    3fe3851a342426cd9e1cb7d34e44f333

    SHA1

    baeb93d05e5a8d4343821a33c7e824e764f4e822

    SHA256

    f92fe7349ebe6e604af698116fe9dda05e9c2ecef34aa0f499cd88f848846e2e

    SHA512

    ec4b32bdfb2e0760bc3dae66e3eff123f12280e8a2de5b537b475720f072d1e091f019569a1b4a6f94a924e80f72f70f5467e9a3351987bef8de95585bde8232

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu273471.exe

    Filesize

    362KB

    MD5

    2da79804160a2088b0ddb25e8803310d

    SHA1

    903062a11ecac1d3d2c19fdbebf71521179658e4

    SHA256

    936758460d388dff576177049c14b4b9046352ff9a4d9e807d323afdf9c20a17

    SHA512

    fb5f021eb9dd968a1ece81880c6cc787149f0f1c84182c2ed301f14bf085fcb667e6fb025bd10e4069660ea50599d72189fbabc16358b0a4744b8887786f3911

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu273471.exe

    Filesize

    362KB

    MD5

    2da79804160a2088b0ddb25e8803310d

    SHA1

    903062a11ecac1d3d2c19fdbebf71521179658e4

    SHA256

    936758460d388dff576177049c14b4b9046352ff9a4d9e807d323afdf9c20a17

    SHA512

    fb5f021eb9dd968a1ece81880c6cc787149f0f1c84182c2ed301f14bf085fcb667e6fb025bd10e4069660ea50599d72189fbabc16358b0a4744b8887786f3911

  • memory/2836-1001-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2836-1002-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2836-1003-0x00000000072A0000-0x00000000072EB000-memory.dmp

    Filesize

    300KB

  • memory/2904-146-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-158-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-140-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-141-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-142-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-143-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-144-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-138-0x00000000072A0000-0x000000000779E000-memory.dmp

    Filesize

    5.0MB

  • memory/2904-148-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-150-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-152-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-154-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-156-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-139-0x0000000004C90000-0x0000000004CA8000-memory.dmp

    Filesize

    96KB

  • memory/2904-160-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-162-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-164-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-166-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-168-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-170-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2904-171-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/2904-172-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-173-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-174-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2904-176-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/2904-137-0x00000000047D0000-0x00000000047EA000-memory.dmp

    Filesize

    104KB

  • memory/2904-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4736-184-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-216-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-187-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-188-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-190-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-191-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-193-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-194-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-186-0x0000000002FA0000-0x0000000002FE6000-memory.dmp

    Filesize

    280KB

  • memory/4736-196-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-198-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-200-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-202-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-204-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-206-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-208-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-210-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-212-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-214-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-183-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-218-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-220-0x0000000007690000-0x00000000076C5000-memory.dmp

    Filesize

    212KB

  • memory/4736-979-0x000000000A1A0000-0x000000000A7A6000-memory.dmp

    Filesize

    6.0MB

  • memory/4736-980-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/4736-981-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4736-982-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/4736-983-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-984-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/4736-985-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/4736-986-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4736-988-0x000000000AEF0000-0x000000000AF66000-memory.dmp

    Filesize

    472KB

  • memory/4736-989-0x000000000AFB0000-0x000000000B172000-memory.dmp

    Filesize

    1.8MB

  • memory/4736-990-0x000000000B190000-0x000000000B6BC000-memory.dmp

    Filesize

    5.2MB

  • memory/4736-991-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-992-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-182-0x0000000007690000-0x00000000076CA000-memory.dmp

    Filesize

    232KB

  • memory/4736-181-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

    Filesize

    240KB

  • memory/4736-993-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4736-994-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

    Filesize

    120KB

  • memory/4736-995-0x0000000004AB0000-0x0000000004B00000-memory.dmp

    Filesize

    320KB