Analysis

  • max time kernel
    64s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 14:54

General

  • Target

    3dba62ae1d2106004549604d6e57afe02b0f6aba885a7debaf197b33a865ec51.exe

  • Size

    706KB

  • MD5

    fa5109ceec2ca6464b21751036d7bf4f

  • SHA1

    4591a7c971d08251b3d4ed890feab61d0745466e

  • SHA256

    3dba62ae1d2106004549604d6e57afe02b0f6aba885a7debaf197b33a865ec51

  • SHA512

    0fd2884a71c3a08f82646ceb23cf0bf633f5fce41952165c2d912a45740178759a0f4bf340703139856b6ea78688c60713505e74a5079471ad37031bd769da38

  • SSDEEP

    12288:Oy90bpCsFE26TKca6TtraD8h9eyRHXZtRhvJNcEOaTQHgP:OyOCsiPTfaYrZhDFh2aTQg

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dba62ae1d2106004549604d6e57afe02b0f6aba885a7debaf197b33a865ec51.exe
    "C:\Users\Admin\AppData\Local\Temp\3dba62ae1d2106004549604d6e57afe02b0f6aba885a7debaf197b33a865ec51.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un262277.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un262277.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr027662.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr027662.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1084
          4⤵
          • Program crash
          PID:1764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu061064.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu061064.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1744
          4⤵
          • Program crash
          PID:1436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si148129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si148129.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2192
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5000 -ip 5000
    1⤵
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4156 -ip 4156
      1⤵
        PID:796

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si148129.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si148129.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un262277.exe

              Filesize

              552KB

              MD5

              376be99839a1022513c06d41eaaad7c4

              SHA1

              a77885446c826ebb0a350ba33b4c228b3c4652b4

              SHA256

              8627ac76e1ee7ebfd40d276e9905a4a57b296bdc5640dad3dbf7a6932bc76323

              SHA512

              b2a14d33810f635a7f7d3ea56060cd82701555603a15f10e3554c60ba613f473e43451de8d2d01f15b7fdbe0b9331fd3f3aa1dea583e36d3d0edb3b97276375b

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un262277.exe

              Filesize

              552KB

              MD5

              376be99839a1022513c06d41eaaad7c4

              SHA1

              a77885446c826ebb0a350ba33b4c228b3c4652b4

              SHA256

              8627ac76e1ee7ebfd40d276e9905a4a57b296bdc5640dad3dbf7a6932bc76323

              SHA512

              b2a14d33810f635a7f7d3ea56060cd82701555603a15f10e3554c60ba613f473e43451de8d2d01f15b7fdbe0b9331fd3f3aa1dea583e36d3d0edb3b97276375b

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr027662.exe

              Filesize

              260KB

              MD5

              8ec53967cad54322a1d2abb20d6b814a

              SHA1

              00a108cbe830c56ff6c5f888b52c7f6f32e17828

              SHA256

              2b86dd19063cd7c830701e00ed6bae03da91588e7558a39fca535b389afa0e2e

              SHA512

              49b5470a666360acd0099bc1596b0a3734016a40c3be931a812036928d1d62af563abdb1f69cee65ceb633b42359bb1a1988eb90045b8ddb1515624fd4b31a94

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr027662.exe

              Filesize

              260KB

              MD5

              8ec53967cad54322a1d2abb20d6b814a

              SHA1

              00a108cbe830c56ff6c5f888b52c7f6f32e17828

              SHA256

              2b86dd19063cd7c830701e00ed6bae03da91588e7558a39fca535b389afa0e2e

              SHA512

              49b5470a666360acd0099bc1596b0a3734016a40c3be931a812036928d1d62af563abdb1f69cee65ceb633b42359bb1a1988eb90045b8ddb1515624fd4b31a94

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu061064.exe

              Filesize

              343KB

              MD5

              8ec7bd19336693f92f043d77d304e143

              SHA1

              3a8762afb636ae63a3e11f474a5edc3a241a0986

              SHA256

              1119f0e1b10ecb3ae6552cab3a6c690201ac550878797563f9e5615168e3ddf3

              SHA512

              e3af3f742e9cfb18f1fb34bd350ca66be238b956bee92447e1833335def14b1c8f79d41245c8a33015a272187bafd999ecea84f59c3e5f52206fe17b2ed62f10

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu061064.exe

              Filesize

              343KB

              MD5

              8ec7bd19336693f92f043d77d304e143

              SHA1

              3a8762afb636ae63a3e11f474a5edc3a241a0986

              SHA256

              1119f0e1b10ecb3ae6552cab3a6c690201ac550878797563f9e5615168e3ddf3

              SHA512

              e3af3f742e9cfb18f1fb34bd350ca66be238b956bee92447e1833335def14b1c8f79d41245c8a33015a272187bafd999ecea84f59c3e5f52206fe17b2ed62f10

            • memory/2192-1003-0x00000000072B0000-0x00000000072C0000-memory.dmp

              Filesize

              64KB

            • memory/2192-1002-0x0000000000230000-0x0000000000258000-memory.dmp

              Filesize

              160KB

            • memory/4156-347-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/4156-987-0x0000000007C50000-0x0000000007D5A000-memory.dmp

              Filesize

              1.0MB

            • memory/4156-996-0x0000000008EF0000-0x000000000941C000-memory.dmp

              Filesize

              5.2MB

            • memory/4156-995-0x0000000008D20000-0x0000000008EE2000-memory.dmp

              Filesize

              1.8MB

            • memory/4156-994-0x0000000008900000-0x000000000891E000-memory.dmp

              Filesize

              120KB

            • memory/4156-993-0x0000000008850000-0x00000000088C6000-memory.dmp

              Filesize

              472KB

            • memory/4156-992-0x0000000008800000-0x0000000008850000-memory.dmp

              Filesize

              320KB

            • memory/4156-991-0x0000000008720000-0x00000000087B2000-memory.dmp

              Filesize

              584KB

            • memory/4156-990-0x0000000008070000-0x00000000080D6000-memory.dmp

              Filesize

              408KB

            • memory/4156-989-0x0000000007D80000-0x0000000007DBC000-memory.dmp

              Filesize

              240KB

            • memory/4156-988-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/4156-986-0x0000000007C30000-0x0000000007C42000-memory.dmp

              Filesize

              72KB

            • memory/4156-985-0x0000000007570000-0x0000000007B88000-memory.dmp

              Filesize

              6.1MB

            • memory/4156-351-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/4156-349-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/4156-346-0x0000000000870000-0x00000000008B6000-memory.dmp

              Filesize

              280KB

            • memory/4156-222-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-220-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-218-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-190-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-189-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-192-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-194-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-196-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-198-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-200-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-202-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-204-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-206-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-208-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-210-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-214-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-212-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/4156-216-0x0000000004A80000-0x0000000004AB5000-memory.dmp

              Filesize

              212KB

            • memory/5000-174-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-176-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-184-0x0000000000400000-0x00000000004BE000-memory.dmp

              Filesize

              760KB

            • memory/5000-182-0x0000000004B70000-0x0000000004B80000-memory.dmp

              Filesize

              64KB

            • memory/5000-153-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-181-0x0000000000400000-0x00000000004BE000-memory.dmp

              Filesize

              760KB

            • memory/5000-180-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-170-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-172-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-155-0x0000000004B70000-0x0000000004B80000-memory.dmp

              Filesize

              64KB

            • memory/5000-158-0x0000000004B70000-0x0000000004B80000-memory.dmp

              Filesize

              64KB

            • memory/5000-156-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-178-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-168-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-166-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-164-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-159-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-160-0x0000000004B70000-0x0000000004B80000-memory.dmp

              Filesize

              64KB

            • memory/5000-162-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-151-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-150-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/5000-149-0x0000000004B80000-0x0000000005124000-memory.dmp

              Filesize

              5.6MB

            • memory/5000-148-0x00000000004C0000-0x00000000004ED000-memory.dmp

              Filesize

              180KB