Analysis

  • max time kernel
    61s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 11:11

General

  • Target

    a66129bb7a3ca6e748104bba08d1c6b96dd63fdc85673c4c9bc8b538d037c103.exe

  • Size

    569KB

  • MD5

    6ecde8e73308db7ab4d48545519aa71c

  • SHA1

    12e7ff346013768a91710e50e29907220c1e30b8

  • SHA256

    a66129bb7a3ca6e748104bba08d1c6b96dd63fdc85673c4c9bc8b538d037c103

  • SHA512

    90a11b819f3d336d36e7bffe2b006e86958092f4bfc8a4676986c60c2448504f7e4188bc03d5f0ff323dc76acc9102597b7be695a8a0ad2ba60287c28538b410

  • SSDEEP

    12288:Vy9019ooJYBmg+TIeOduxE9JKOzZ/6/fD8ojw1GFW:VyG9vTLTIeOdGEPBspkF

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a66129bb7a3ca6e748104bba08d1c6b96dd63fdc85673c4c9bc8b538d037c103.exe
    "C:\Users\Admin\AppData\Local\Temp\a66129bb7a3ca6e748104bba08d1c6b96dd63fdc85673c4c9bc8b538d037c103.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicx3713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicx3713.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074711.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074711.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp123722.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp123722.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 2016
          4⤵
          • Program crash
          PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr030926.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr030926.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4524 -ip 4524
    1⤵
      PID:1012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr030926.exe

      Filesize

      136KB

      MD5

      49650cdcdc358bb2770f0062abeef88c

      SHA1

      d6f7ec7758e9a80700b81bc7a549838ba99aacac

      SHA256

      79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

      SHA512

      7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr030926.exe

      Filesize

      136KB

      MD5

      49650cdcdc358bb2770f0062abeef88c

      SHA1

      d6f7ec7758e9a80700b81bc7a549838ba99aacac

      SHA256

      79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

      SHA512

      7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicx3713.exe

      Filesize

      414KB

      MD5

      397e7f887bbd146a13f0f1a2af43d232

      SHA1

      6a5a2911c4559055facca9f75343fdc392d793c0

      SHA256

      5b30417c8f233c4521eb3e60cecbd172250fb21b3e9f6c6a45a48177b2565391

      SHA512

      2741c15744f2e99b73a3823b0d1c5b72a228c638d939e34e0961d7ecbbaa6fc6b459d6bfe5e6e3ac8cc8f3ae18e552678911616b8ca7df20f26e36fdbfe45e09

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicx3713.exe

      Filesize

      414KB

      MD5

      397e7f887bbd146a13f0f1a2af43d232

      SHA1

      6a5a2911c4559055facca9f75343fdc392d793c0

      SHA256

      5b30417c8f233c4521eb3e60cecbd172250fb21b3e9f6c6a45a48177b2565391

      SHA512

      2741c15744f2e99b73a3823b0d1c5b72a228c638d939e34e0961d7ecbbaa6fc6b459d6bfe5e6e3ac8cc8f3ae18e552678911616b8ca7df20f26e36fdbfe45e09

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074711.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074711.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp123722.exe

      Filesize

      362KB

      MD5

      a9d3b9ba08c0869bcefb27e9eda6fa2a

      SHA1

      74856b1c5576bd448e5c1987e75e69118e2b8cc9

      SHA256

      719b3f96b6ac95bd1e93a01a280ba397de3b5af60c139adba8888838fa485902

      SHA512

      71335beda2f524ecd5b5bcd0c62d90a5dba42dc313af5deae4a6bef9ca76042c077bf01654712b925d9cf4f23d3f5102bdb41ef012d307cfd11f221cea927db0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp123722.exe

      Filesize

      362KB

      MD5

      a9d3b9ba08c0869bcefb27e9eda6fa2a

      SHA1

      74856b1c5576bd448e5c1987e75e69118e2b8cc9

      SHA256

      719b3f96b6ac95bd1e93a01a280ba397de3b5af60c139adba8888838fa485902

      SHA512

      71335beda2f524ecd5b5bcd0c62d90a5dba42dc313af5deae4a6bef9ca76042c077bf01654712b925d9cf4f23d3f5102bdb41ef012d307cfd11f221cea927db0

    • memory/2272-147-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/3116-969-0x00000000002E0000-0x0000000000308000-memory.dmp

      Filesize

      160KB

    • memory/3116-970-0x0000000007090000-0x00000000070A0000-memory.dmp

      Filesize

      64KB

    • memory/4524-186-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-198-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-155-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-156-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-158-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-160-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-162-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-164-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-165-0x0000000007290000-0x00000000072A0000-memory.dmp

      Filesize

      64KB

    • memory/4524-167-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-168-0x0000000007290000-0x00000000072A0000-memory.dmp

      Filesize

      64KB

    • memory/4524-170-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-172-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-174-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-176-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-178-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-180-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-182-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-184-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

      Filesize

      280KB

    • memory/4524-188-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-190-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-192-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-194-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-196-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-154-0x00000000072A0000-0x0000000007844000-memory.dmp

      Filesize

      5.6MB

    • memory/4524-200-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-204-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-202-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-206-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-208-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-210-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-212-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-214-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-216-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-218-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-220-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4524-949-0x0000000009CD0000-0x000000000A2E8000-memory.dmp

      Filesize

      6.1MB

    • memory/4524-950-0x000000000A320000-0x000000000A332000-memory.dmp

      Filesize

      72KB

    • memory/4524-951-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/4524-952-0x000000000A470000-0x000000000A4AC000-memory.dmp

      Filesize

      240KB

    • memory/4524-953-0x0000000007290000-0x00000000072A0000-memory.dmp

      Filesize

      64KB

    • memory/4524-954-0x000000000A760000-0x000000000A7C6000-memory.dmp

      Filesize

      408KB

    • memory/4524-955-0x000000000AE30000-0x000000000AEC2000-memory.dmp

      Filesize

      584KB

    • memory/4524-956-0x000000000AEF0000-0x000000000AF66000-memory.dmp

      Filesize

      472KB

    • memory/4524-957-0x000000000AFC0000-0x000000000B182000-memory.dmp

      Filesize

      1.8MB

    • memory/4524-958-0x000000000B1A0000-0x000000000B6CC000-memory.dmp

      Filesize

      5.2MB

    • memory/4524-959-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

      Filesize

      120KB

    • memory/4524-961-0x00000000049F0000-0x0000000004A40000-memory.dmp

      Filesize

      320KB

    • memory/4524-964-0x0000000007290000-0x00000000072A0000-memory.dmp

      Filesize

      64KB

    • memory/4524-965-0x0000000007290000-0x00000000072A0000-memory.dmp

      Filesize

      64KB