Analysis

  • max time kernel
    87s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 16:01

General

  • Target

    f7f72179c3792f8c82601df9ec44362842c408df5859cbc584adef969d1e593a.exe

  • Size

    710KB

  • MD5

    bf9336f41885f9645bfb2ae7369f4c9f

  • SHA1

    46270d9a387fa222a55818046fd19b30a667c2a0

  • SHA256

    f7f72179c3792f8c82601df9ec44362842c408df5859cbc584adef969d1e593a

  • SHA512

    2b71f1442620a7bbe272a8b9d9424cd018fc1c4ad09c8f60c67865f28fef93feb801dcc3b2b3e646a4e07f4dc6fa1ad9843bf3d6dffdf4a31836a4aa9a370b03

  • SSDEEP

    12288:0y90A2zhVJ1pitOrckxrBu4REsVEoJ3Cw/fmzn8gtr3pmz/0t5:0yuJ6wrckBBuRsVBlfiXQS5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7f72179c3792f8c82601df9ec44362842c408df5859cbc584adef969d1e593a.exe
    "C:\Users\Admin\AppData\Local\Temp\f7f72179c3792f8c82601df9ec44362842c408df5859cbc584adef969d1e593a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532280.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532280.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr529664.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr529664.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1080
          4⤵
          • Program crash
          PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu156691.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu156691.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 1320
          4⤵
          • Program crash
          PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422308.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422308.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4268
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4552 -ip 4552
    1⤵
      PID:1792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 488 -ip 488
      1⤵
        PID:788

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422308.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422308.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532280.exe

        Filesize

        556KB

        MD5

        e05805e17a3612ce07037d1c333d8eb2

        SHA1

        149abdd632d5fbd2de3ecab9e2fe3d813bb53b85

        SHA256

        ffdc3fa180bf77e0958aaf22266cf65116bf4f0dab733ec72c8fa0daa67f7d1f

        SHA512

        93b99ecfc3735a8f138b3bfca9ebefd25e75411819f97fe95177553ed134b920727c14f9d96a6aae175ae4338f070e19f97f6ad17a66c4c7bc1d9b3200a8629e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532280.exe

        Filesize

        556KB

        MD5

        e05805e17a3612ce07037d1c333d8eb2

        SHA1

        149abdd632d5fbd2de3ecab9e2fe3d813bb53b85

        SHA256

        ffdc3fa180bf77e0958aaf22266cf65116bf4f0dab733ec72c8fa0daa67f7d1f

        SHA512

        93b99ecfc3735a8f138b3bfca9ebefd25e75411819f97fe95177553ed134b920727c14f9d96a6aae175ae4338f070e19f97f6ad17a66c4c7bc1d9b3200a8629e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr529664.exe

        Filesize

        260KB

        MD5

        8f25caa7316d0bd2c0868356fd9d76fb

        SHA1

        e6ed97d9bba41e70fc477dd3275526becd6175c0

        SHA256

        290964750d0a269f21ee1041bb7e4fe35450a3305cc4cfcbf6b388103748134f

        SHA512

        84c85b27ed0e78185a5d260a8bf18e067848ae1673ebef13594db8423a51e5a1060e779b6c6e14d04bb519268b5db9b3ae9d081bee61ecb9e2d270278f5f6c84

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr529664.exe

        Filesize

        260KB

        MD5

        8f25caa7316d0bd2c0868356fd9d76fb

        SHA1

        e6ed97d9bba41e70fc477dd3275526becd6175c0

        SHA256

        290964750d0a269f21ee1041bb7e4fe35450a3305cc4cfcbf6b388103748134f

        SHA512

        84c85b27ed0e78185a5d260a8bf18e067848ae1673ebef13594db8423a51e5a1060e779b6c6e14d04bb519268b5db9b3ae9d081bee61ecb9e2d270278f5f6c84

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu156691.exe

        Filesize

        352KB

        MD5

        4b0b96b9291323698e3c8da6ca2af7e6

        SHA1

        ce613dc41c16eeccd1aed74b94cfc8c580e103e7

        SHA256

        a093019047ed2d46df9ff72dd8c873c6a47a6643f77c2b0a81d2f3ef8478b3e8

        SHA512

        a39e78d3cffcdfbb4bd7046f39f5bf4907e7df11512338c0e5a336eaf038444aebac4c9acdf98898e5a1bb635047ccada52b8b4d0816735277801ecc61f1024c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu156691.exe

        Filesize

        352KB

        MD5

        4b0b96b9291323698e3c8da6ca2af7e6

        SHA1

        ce613dc41c16eeccd1aed74b94cfc8c580e103e7

        SHA256

        a093019047ed2d46df9ff72dd8c873c6a47a6643f77c2b0a81d2f3ef8478b3e8

        SHA512

        a39e78d3cffcdfbb4bd7046f39f5bf4907e7df11512338c0e5a336eaf038444aebac4c9acdf98898e5a1bb635047ccada52b8b4d0816735277801ecc61f1024c

      • memory/488-467-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/488-986-0x0000000009C60000-0x000000000A278000-memory.dmp

        Filesize

        6.1MB

      • memory/488-997-0x0000000004A00000-0x0000000004A50000-memory.dmp

        Filesize

        320KB

      • memory/488-996-0x000000000B8E0000-0x000000000B8FE000-memory.dmp

        Filesize

        120KB

      • memory/488-995-0x000000000B2A0000-0x000000000B7CC000-memory.dmp

        Filesize

        5.2MB

      • memory/488-994-0x000000000B0C0000-0x000000000B282000-memory.dmp

        Filesize

        1.8MB

      • memory/488-993-0x000000000AFF0000-0x000000000B066000-memory.dmp

        Filesize

        472KB

      • memory/488-992-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/488-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/488-990-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/488-989-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/488-988-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/488-987-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/488-463-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/488-465-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/488-461-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/488-223-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-221-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-219-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-217-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-215-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-213-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-191-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-190-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-195-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-193-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-197-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-199-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-201-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-203-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-205-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-207-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-209-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/488-211-0x0000000007750000-0x0000000007785000-memory.dmp

        Filesize

        212KB

      • memory/4268-1003-0x0000000000310000-0x0000000000338000-memory.dmp

        Filesize

        160KB

      • memory/4268-1004-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/4552-172-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-148-0x0000000004DF0000-0x0000000005394000-memory.dmp

        Filesize

        5.6MB

      • memory/4552-182-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/4552-181-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/4552-180-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-178-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-176-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-150-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/4552-153-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-174-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-152-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/4552-183-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/4552-164-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-166-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-168-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-162-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-160-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-158-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-156-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-154-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-149-0x00000000004C0000-0x00000000004ED000-memory.dmp

        Filesize

        180KB

      • memory/4552-170-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4552-185-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/4552-151-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB