Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 15:01

General

  • Target

    baff88081e89feb1cddd1449bd53cfd9ef05f66d2e14ff8d10fe5244a7a64dfb.exe

  • Size

    568KB

  • MD5

    425cf8bd723e18ed5545773fa0acf7b8

  • SHA1

    6e5e8e2ced023ad9762558265962e82cdf874020

  • SHA256

    baff88081e89feb1cddd1449bd53cfd9ef05f66d2e14ff8d10fe5244a7a64dfb

  • SHA512

    e74cc8e1dd3cc2c0b03dc4146fac164067ac796232298c635230d44a91d20b45189470c141d1f8c2f0ece168a616f3bca82c02d86755b9b8b89522493b9f5cef

  • SSDEEP

    12288:5y90BTn+EPR/wjpkc0k1bxR9ubFRZXZtRhvYHckjU9b5/:5yulBwBzR9WFhd5/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baff88081e89feb1cddd1449bd53cfd9ef05f66d2e14ff8d10fe5244a7a64dfb.exe
    "C:\Users\Admin\AppData\Local\Temp\baff88081e89feb1cddd1449bd53cfd9ef05f66d2e14ff8d10fe5244a7a64dfb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6277.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6277.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it572212.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it572212.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp289575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp289575.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr930985.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr930985.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr930985.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr930985.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6277.exe

          Filesize

          414KB

          MD5

          ccdfe2f488932c37f77f755f21838546

          SHA1

          2e1d7350afe15f2344bacd8ff2406bb63105ae4f

          SHA256

          799ad29035a5fa90a9caca5cd21359ae29210dbaa48e5b40dba98487f6708241

          SHA512

          793c7d2edfe654ef2d181422a37aaf2b30ab2dd7b3345d73df1f98e080034efb58ef569277cec82664a8f0a10f9e724d379b345a73a397e2de183a465c6ec332

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6277.exe

          Filesize

          414KB

          MD5

          ccdfe2f488932c37f77f755f21838546

          SHA1

          2e1d7350afe15f2344bacd8ff2406bb63105ae4f

          SHA256

          799ad29035a5fa90a9caca5cd21359ae29210dbaa48e5b40dba98487f6708241

          SHA512

          793c7d2edfe654ef2d181422a37aaf2b30ab2dd7b3345d73df1f98e080034efb58ef569277cec82664a8f0a10f9e724d379b345a73a397e2de183a465c6ec332

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it572212.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it572212.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp289575.exe

          Filesize

          343KB

          MD5

          375706b6a031d634044c6bfef9dabd37

          SHA1

          5744482ce038c35ba5ddf46d1c204547f24c01cc

          SHA256

          548c13eb067dcc280099d37cb49e39b29072ba9dcf06a30c971569f8d4621dab

          SHA512

          b44db5e4b65ecc636ff6c91f6c7655852dcf3375f4f7063d2a058193fe5602e1df56f7db67c3af0ff4ece91e48830b3e5ed9a63bc657f972401dd50693711454

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp289575.exe

          Filesize

          343KB

          MD5

          375706b6a031d634044c6bfef9dabd37

          SHA1

          5744482ce038c35ba5ddf46d1c204547f24c01cc

          SHA256

          548c13eb067dcc280099d37cb49e39b29072ba9dcf06a30c971569f8d4621dab

          SHA512

          b44db5e4b65ecc636ff6c91f6c7655852dcf3375f4f7063d2a058193fe5602e1df56f7db67c3af0ff4ece91e48830b3e5ed9a63bc657f972401dd50693711454

        • memory/2600-135-0x00000000002C0000-0x00000000002CA000-memory.dmp

          Filesize

          40KB

        • memory/2648-141-0x00000000023C0000-0x00000000023FC000-memory.dmp

          Filesize

          240KB

        • memory/2648-142-0x0000000004C20000-0x000000000511E000-memory.dmp

          Filesize

          5.0MB

        • memory/2648-143-0x0000000004A80000-0x0000000004ABA000-memory.dmp

          Filesize

          232KB

        • memory/2648-144-0x00000000004E0000-0x0000000000526000-memory.dmp

          Filesize

          280KB

        • memory/2648-146-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/2648-145-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/2648-147-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/2648-148-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-149-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-151-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-153-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-155-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-157-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-159-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-161-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-163-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-165-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-167-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-169-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-171-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-173-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-175-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-177-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-179-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-181-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-183-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-185-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-187-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-189-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-191-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-193-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-195-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-197-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-199-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-201-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-203-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-205-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-207-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-209-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-211-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/2648-940-0x00000000074A0000-0x0000000007AA6000-memory.dmp

          Filesize

          6.0MB

        • memory/2648-941-0x0000000007B20000-0x0000000007B32000-memory.dmp

          Filesize

          72KB

        • memory/2648-942-0x0000000007B50000-0x0000000007C5A000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-943-0x0000000007C70000-0x0000000007CAE000-memory.dmp

          Filesize

          248KB

        • memory/2648-944-0x0000000007DF0000-0x0000000007E3B000-memory.dmp

          Filesize

          300KB

        • memory/2648-945-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/2648-946-0x0000000007F80000-0x0000000007FE6000-memory.dmp

          Filesize

          408KB

        • memory/2648-947-0x0000000008630000-0x00000000086C2000-memory.dmp

          Filesize

          584KB

        • memory/2648-948-0x00000000086E0000-0x0000000008730000-memory.dmp

          Filesize

          320KB

        • memory/2648-949-0x0000000008750000-0x00000000087C6000-memory.dmp

          Filesize

          472KB

        • memory/2648-950-0x0000000008820000-0x00000000089E2000-memory.dmp

          Filesize

          1.8MB

        • memory/2648-951-0x00000000089F0000-0x0000000008F1C000-memory.dmp

          Filesize

          5.2MB

        • memory/2648-952-0x0000000009040000-0x000000000905E000-memory.dmp

          Filesize

          120KB

        • memory/4104-959-0x0000000000EF0000-0x0000000000F18000-memory.dmp

          Filesize

          160KB

        • memory/4104-960-0x0000000007C70000-0x0000000007CBB000-memory.dmp

          Filesize

          300KB

        • memory/4104-961-0x0000000007FC0000-0x0000000007FD0000-memory.dmp

          Filesize

          64KB