Analysis

  • max time kernel
    121s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 11:38

General

  • Target

    a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe

  • Size

    568KB

  • MD5

    b0724e5c9ada958a7406de2cfb0d0009

  • SHA1

    c989edff4bc148971ba24767e5ba749886a43970

  • SHA256

    a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55

  • SHA512

    4ddb35ba79fee03327f34e53d2fd58becade78ec9307b1d27fa79b14c58b556b4a6fb61304c440f3c18857ea3fe57025e60b9750b81ced02da0bf527ad9af394

  • SSDEEP

    12288:1y90/nIuXR6WB6dVjZC+D4/GVqUP6ZdhyiHvGN55NSfqNVajsj:1y8np6W29s+DgjjhvPGNnSoaIj

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe
    "C:\Users\Admin\AppData\Local\Temp\a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exe

    Filesize

    414KB

    MD5

    079adaec3b3fc3186535ddc43e99d5e2

    SHA1

    c7e19214a2f93a38e11d23b494b2b6447270fc78

    SHA256

    e8bf80a4aa63c693b82c344818e5f007b0e29310b1b5e718f1a8506e348bc96f

    SHA512

    3b30d3b724dbb07318bea1c7761cef61d5fad9252f75ba74da9767e13600126fa86900f203bb061bec04f85bc1b9c070e5fffd4075117b4165c30cb47798631e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exe

    Filesize

    414KB

    MD5

    079adaec3b3fc3186535ddc43e99d5e2

    SHA1

    c7e19214a2f93a38e11d23b494b2b6447270fc78

    SHA256

    e8bf80a4aa63c693b82c344818e5f007b0e29310b1b5e718f1a8506e348bc96f

    SHA512

    3b30d3b724dbb07318bea1c7761cef61d5fad9252f75ba74da9767e13600126fa86900f203bb061bec04f85bc1b9c070e5fffd4075117b4165c30cb47798631e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exe

    Filesize

    367KB

    MD5

    6c651934cbadc678f23699b1ff307ca5

    SHA1

    ee56b3913bb8899aec273df3fe1cbc876ba6faa4

    SHA256

    fcb2f44f55171f469312ee1bffa907788499dcf33986d1eeed1671ebc1fc100c

    SHA512

    70c6d472fba4cd10b742b96716ead23019fd6231b9ade85ccece41455fd973b0aadd245d9c3432d7799933d81faedcb945f1986e9109b945bd07e500f2ec135a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exe

    Filesize

    367KB

    MD5

    6c651934cbadc678f23699b1ff307ca5

    SHA1

    ee56b3913bb8899aec273df3fe1cbc876ba6faa4

    SHA256

    fcb2f44f55171f469312ee1bffa907788499dcf33986d1eeed1671ebc1fc100c

    SHA512

    70c6d472fba4cd10b742b96716ead23019fd6231b9ade85ccece41455fd973b0aadd245d9c3432d7799933d81faedcb945f1986e9109b945bd07e500f2ec135a

  • memory/1892-956-0x00000000004C0000-0x00000000004E8000-memory.dmp

    Filesize

    160KB

  • memory/1892-957-0x0000000007260000-0x00000000072AB000-memory.dmp

    Filesize

    300KB

  • memory/1892-958-0x0000000007620000-0x0000000007630000-memory.dmp

    Filesize

    64KB

  • memory/4484-133-0x0000000000C50000-0x0000000000C5A000-memory.dmp

    Filesize

    40KB

  • memory/4980-173-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-187-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-142-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4980-144-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4980-146-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4980-143-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-145-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-149-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-148-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4980-151-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-153-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-155-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-157-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-159-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-161-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-163-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-165-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-167-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-169-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-171-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-140-0x0000000007280000-0x000000000777E000-memory.dmp

    Filesize

    5.0MB

  • memory/4980-175-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-177-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-179-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-181-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-183-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-185-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-141-0x0000000007150000-0x000000000718A000-memory.dmp

    Filesize

    232KB

  • memory/4980-189-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-191-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-193-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-195-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-197-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-199-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-201-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-203-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-205-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-207-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-209-0x0000000007150000-0x0000000007185000-memory.dmp

    Filesize

    212KB

  • memory/4980-938-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/4980-939-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/4980-940-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4980-941-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/4980-942-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/4980-943-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4980-944-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/4980-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4980-946-0x000000000AED0000-0x000000000AF20000-memory.dmp

    Filesize

    320KB

  • memory/4980-139-0x0000000004B60000-0x0000000004B9C000-memory.dmp

    Filesize

    240KB

  • memory/4980-947-0x000000000AF40000-0x000000000AFB6000-memory.dmp

    Filesize

    472KB

  • memory/4980-948-0x000000000AFE0000-0x000000000AFFE000-memory.dmp

    Filesize

    120KB

  • memory/4980-949-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/4980-950-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB