Analysis

  • max time kernel
    94s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 14:03

General

  • Target

    976598aab41932cd79223bd26901816bae2f1cde2be72d20074373843394ba84.exe

  • Size

    706KB

  • MD5

    04be6476e0a6fa6e320213f078121914

  • SHA1

    4a7a34437ed114a733383aa86d3b4482a08e66b8

  • SHA256

    976598aab41932cd79223bd26901816bae2f1cde2be72d20074373843394ba84

  • SHA512

    3211418ec8a90d17d09cc11236c4257ef8c4c87ba10f649897f4a61bbc6c9744a3d83d20900c0c227dfe701555648991502306e5651fe7512e2c8a3f36172503

  • SSDEEP

    12288:dy90QrMHr2XYOV3uZ6ZhmvASrdmjoBcRiXZtRhvzNcb5J+P:dyC6XE67lSrd9Fh6J+P

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\976598aab41932cd79223bd26901816bae2f1cde2be72d20074373843394ba84.exe
    "C:\Users\Admin\AppData\Local\Temp\976598aab41932cd79223bd26901816bae2f1cde2be72d20074373843394ba84.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165339.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783264.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1088
          4⤵
          • Program crash
          PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu356771.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu356771.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 1332
          4⤵
          • Program crash
          PID:432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071213.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071213.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2052 -ip 2052
    1⤵
      PID:3388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4708 -ip 4708
      1⤵
        PID:1864

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071213.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si071213.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165339.exe

              Filesize

              551KB

              MD5

              e043a4fdf63a4cec912a1dd9a4d6bc18

              SHA1

              296dcea74c1944ea4a585cb0db07a96ac2ae4ce7

              SHA256

              babaff5d4a6242713bc0a91f2ec5fc5c7b95941d511a20e654030b4f2655ec9b

              SHA512

              040a7fcb8e8093e3945a66411cd20a8e24c0d794d661b44f3dfae632f67abeefc92a1aa3ca7b8dfb505282316505db60b5fb103a58356a13df222a146e357e27

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165339.exe

              Filesize

              551KB

              MD5

              e043a4fdf63a4cec912a1dd9a4d6bc18

              SHA1

              296dcea74c1944ea4a585cb0db07a96ac2ae4ce7

              SHA256

              babaff5d4a6242713bc0a91f2ec5fc5c7b95941d511a20e654030b4f2655ec9b

              SHA512

              040a7fcb8e8093e3945a66411cd20a8e24c0d794d661b44f3dfae632f67abeefc92a1aa3ca7b8dfb505282316505db60b5fb103a58356a13df222a146e357e27

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783264.exe

              Filesize

              260KB

              MD5

              a8cc75e6b6c719e93c6b128ad09a7847

              SHA1

              d2e916c0337ac140ce1ffa023bd5b8cf2dacca77

              SHA256

              f6118c7a339c4a786ea2078a8d1bb60677498d1ae1ca53684133bb77c03376c5

              SHA512

              3c85563a2f10a817d7a2b617127445b51c67909338e6b074b96f0878b58da375a3bcd68b64c55656732ce76218036f95e061fb9fedb5393f1c402b0990abcd42

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr783264.exe

              Filesize

              260KB

              MD5

              a8cc75e6b6c719e93c6b128ad09a7847

              SHA1

              d2e916c0337ac140ce1ffa023bd5b8cf2dacca77

              SHA256

              f6118c7a339c4a786ea2078a8d1bb60677498d1ae1ca53684133bb77c03376c5

              SHA512

              3c85563a2f10a817d7a2b617127445b51c67909338e6b074b96f0878b58da375a3bcd68b64c55656732ce76218036f95e061fb9fedb5393f1c402b0990abcd42

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu356771.exe

              Filesize

              343KB

              MD5

              085febd421436988d510381ddc8eb9f0

              SHA1

              5c5f5c863d02171e86d1ce5ca685d9dc62e30d33

              SHA256

              b4d657de65de89efb082ce7ac8ba4e4c45de53f4932d062091819e3850836649

              SHA512

              ab0a0f07c5ce98e714d823749e2f8f9e16c58eb3303a9b7b12b19487dae0012e803c20244d40e4b8c61ce16fece6cff17f70c49255b257ca40f234e571a049af

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu356771.exe

              Filesize

              343KB

              MD5

              085febd421436988d510381ddc8eb9f0

              SHA1

              5c5f5c863d02171e86d1ce5ca685d9dc62e30d33

              SHA256

              b4d657de65de89efb082ce7ac8ba4e4c45de53f4932d062091819e3850836649

              SHA512

              ab0a0f07c5ce98e714d823749e2f8f9e16c58eb3303a9b7b12b19487dae0012e803c20244d40e4b8c61ce16fece6cff17f70c49255b257ca40f234e571a049af

            • memory/2052-148-0x0000000000590000-0x00000000005BD000-memory.dmp

              Filesize

              180KB

            • memory/2052-149-0x0000000004C40000-0x00000000051E4000-memory.dmp

              Filesize

              5.6MB

            • memory/2052-150-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-151-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-152-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-153-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-154-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-156-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-158-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-160-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-162-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-164-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-166-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-168-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-170-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-172-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-174-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-176-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-178-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-180-0x0000000002480000-0x0000000002492000-memory.dmp

              Filesize

              72KB

            • memory/2052-181-0x0000000000400000-0x00000000004BE000-memory.dmp

              Filesize

              760KB

            • memory/2052-182-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-183-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-184-0x00000000021F0000-0x0000000002200000-memory.dmp

              Filesize

              64KB

            • memory/2052-186-0x0000000000400000-0x00000000004BE000-memory.dmp

              Filesize

              760KB

            • memory/4708-191-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-192-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-194-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-196-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-198-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-200-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-202-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-204-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-206-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-207-0x00000000004E0000-0x0000000000526000-memory.dmp

              Filesize

              280KB

            • memory/4708-210-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-208-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-212-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-211-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-214-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-216-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-218-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-222-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-220-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-224-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-226-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-228-0x00000000025F0000-0x0000000002625000-memory.dmp

              Filesize

              212KB

            • memory/4708-987-0x00000000075A0000-0x0000000007BB8000-memory.dmp

              Filesize

              6.1MB

            • memory/4708-988-0x0000000007C30000-0x0000000007C42000-memory.dmp

              Filesize

              72KB

            • memory/4708-989-0x0000000007C50000-0x0000000007D5A000-memory.dmp

              Filesize

              1.0MB

            • memory/4708-990-0x0000000007D80000-0x0000000007DBC000-memory.dmp

              Filesize

              240KB

            • memory/4708-991-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-992-0x0000000008070000-0x00000000080D6000-memory.dmp

              Filesize

              408KB

            • memory/4708-994-0x00000000087E0000-0x0000000008830000-memory.dmp

              Filesize

              320KB

            • memory/4708-993-0x0000000008720000-0x00000000087B2000-memory.dmp

              Filesize

              584KB

            • memory/4708-995-0x0000000008850000-0x00000000088C6000-memory.dmp

              Filesize

              472KB

            • memory/4708-996-0x0000000008940000-0x0000000008B02000-memory.dmp

              Filesize

              1.8MB

            • memory/4708-997-0x0000000008B10000-0x000000000903C000-memory.dmp

              Filesize

              5.2MB

            • memory/4708-998-0x00000000090B0000-0x00000000090CE000-memory.dmp

              Filesize

              120KB

            • memory/4708-1002-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-1003-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/4708-1001-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/5048-1008-0x00000000009C0000-0x00000000009E8000-memory.dmp

              Filesize

              160KB

            • memory/5048-1009-0x0000000007A40000-0x0000000007A50000-memory.dmp

              Filesize

              64KB