Analysis

  • max time kernel
    51s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 15:27

General

  • Target

    8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe

  • Size

    568KB

  • MD5

    8e746a1075fd28de7c987277e3295fb3

  • SHA1

    6d42426c14a1c21ddf6029804e86b2e80505652c

  • SHA256

    8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584

  • SHA512

    47bb07832c9d30c728030a2b555d209fb562f642805ad03850bf57019150f73d33da9ce073ff1300b5cae79d1320f1768a231e5367fcc3e7bc72509fe71d1aea

  • SSDEEP

    12288:Wy90iDTSMQwtF0cBwmSFRpXZtRhvuHcS9kWdr+ZDFQMVh5:WyRDTSHw3lF6FhKkW5+XRj5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe
    "C:\Users\Admin\AppData\Local\Temp\8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2920

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exe

          Filesize

          414KB

          MD5

          a9c5590f4a74a8fcd874fe09d89c1a8a

          SHA1

          ff2e6b4f31c478db8ebaefada316c6c6789ed0e6

          SHA256

          6cc5105d43672f0fab0676c871f27ac8c908ca5b9996841de5e31e29344611f9

          SHA512

          dd23b3494ea39824b966742ba04a4faa751f392e12cf864fc3072c6890cb5c73e6ae3939d008d650cff6e4bb93dbaac9415e30aaf4611fc15868ae01e0f2b52f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exe

          Filesize

          414KB

          MD5

          a9c5590f4a74a8fcd874fe09d89c1a8a

          SHA1

          ff2e6b4f31c478db8ebaefada316c6c6789ed0e6

          SHA256

          6cc5105d43672f0fab0676c871f27ac8c908ca5b9996841de5e31e29344611f9

          SHA512

          dd23b3494ea39824b966742ba04a4faa751f392e12cf864fc3072c6890cb5c73e6ae3939d008d650cff6e4bb93dbaac9415e30aaf4611fc15868ae01e0f2b52f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exe

          Filesize

          343KB

          MD5

          eaab25a73b9addfd1b0ea7a5419b80cd

          SHA1

          821a6b01e37b1572fbcbb542606568f22fe55cce

          SHA256

          0901c1964f4e9bd65d4f7eb0bd91b7e07ba5f00a77e4b9e962604af32d9e29b8

          SHA512

          fb948628f6b340244ad14b5c555ec4f7895e76ceb3b5e5b984b3ea6015fafe18f213da000a6b1e4cc409a0de790568318cee5753d0a2373a1825d6710d10bff8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exe

          Filesize

          343KB

          MD5

          eaab25a73b9addfd1b0ea7a5419b80cd

          SHA1

          821a6b01e37b1572fbcbb542606568f22fe55cce

          SHA256

          0901c1964f4e9bd65d4f7eb0bd91b7e07ba5f00a77e4b9e962604af32d9e29b8

          SHA512

          fb948628f6b340244ad14b5c555ec4f7895e76ceb3b5e5b984b3ea6015fafe18f213da000a6b1e4cc409a0de790568318cee5753d0a2373a1825d6710d10bff8

        • memory/1928-136-0x0000000001F30000-0x0000000001F76000-memory.dmp

          Filesize

          280KB

        • memory/1928-137-0x0000000002290000-0x00000000022CC000-memory.dmp

          Filesize

          240KB

        • memory/1928-138-0x0000000004B50000-0x000000000504E000-memory.dmp

          Filesize

          5.0MB

        • memory/1928-139-0x0000000004A60000-0x0000000004A9A000-memory.dmp

          Filesize

          232KB

        • memory/1928-140-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-143-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-141-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-145-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-148-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1928-150-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1928-146-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1928-149-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-152-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-154-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-156-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-158-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-160-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-162-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-164-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-166-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-168-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-170-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-172-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-174-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-180-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-178-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-176-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-182-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-184-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-186-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-188-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-190-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-192-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-194-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-196-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-198-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-200-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-202-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-204-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-206-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1928-935-0x00000000074D0000-0x0000000007AD6000-memory.dmp

          Filesize

          6.0MB

        • memory/1928-936-0x0000000007B20000-0x0000000007B32000-memory.dmp

          Filesize

          72KB

        • memory/1928-937-0x0000000007B50000-0x0000000007C5A000-memory.dmp

          Filesize

          1.0MB

        • memory/1928-938-0x0000000007C70000-0x0000000007CAE000-memory.dmp

          Filesize

          248KB

        • memory/1928-939-0x0000000007CF0000-0x0000000007D3B000-memory.dmp

          Filesize

          300KB

        • memory/1928-940-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1928-941-0x0000000007F80000-0x0000000007FE6000-memory.dmp

          Filesize

          408KB

        • memory/1928-942-0x0000000008640000-0x00000000086D2000-memory.dmp

          Filesize

          584KB

        • memory/1928-943-0x0000000008800000-0x0000000008876000-memory.dmp

          Filesize

          472KB

        • memory/1928-944-0x00000000088C0000-0x0000000008A82000-memory.dmp

          Filesize

          1.8MB

        • memory/1928-945-0x0000000008AA0000-0x0000000008FCC000-memory.dmp

          Filesize

          5.2MB

        • memory/1928-946-0x00000000090E0000-0x00000000090FE000-memory.dmp

          Filesize

          120KB

        • memory/1928-947-0x00000000024A0000-0x00000000024F0000-memory.dmp

          Filesize

          320KB

        • memory/2920-953-0x0000000000AF0000-0x0000000000B18000-memory.dmp

          Filesize

          160KB

        • memory/2920-954-0x0000000007870000-0x00000000078BB000-memory.dmp

          Filesize

          300KB

        • memory/2920-955-0x0000000007C00000-0x0000000007C10000-memory.dmp

          Filesize

          64KB

        • memory/4944-130-0x0000000000C70000-0x0000000000C7A000-memory.dmp

          Filesize

          40KB