Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 17:38

General

  • Target

    385f725fc51704fd7cd713909d8002a1ea7326ee03d9984e382adbb332bdc36e.exe

  • Size

    697KB

  • MD5

    3a767b2b0d676b951577bac30ff9a169

  • SHA1

    d27a5dd827c141a57aad89b600915293e06739fe

  • SHA256

    385f725fc51704fd7cd713909d8002a1ea7326ee03d9984e382adbb332bdc36e

  • SHA512

    c7b99dd5af2fe26139b89ea33bf4116d7e2fe1b3fba5651878eb51ab1bf0b47bce72cbfa1ad8a493cf4e8e0d7e909089a92e158511471e9189177cc929a50113

  • SSDEEP

    12288:iy90LGiAyIyLPU1RCRZKOiCk0/a3ZzF09SvijWxp:iyEGilIOs1RCeOiCk1JzF0Ezxp

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\385f725fc51704fd7cd713909d8002a1ea7326ee03d9984e382adbb332bdc36e.exe
    "C:\Users\Admin\AppData\Local\Temp\385f725fc51704fd7cd713909d8002a1ea7326ee03d9984e382adbb332bdc36e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130848.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130848.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr368946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr368946.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu178273.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu178273.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372162.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372162.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372162.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372162.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130848.exe

    Filesize

    542KB

    MD5

    66fd27164c2f94ad233ac0eb81a5f57e

    SHA1

    be86ac3e694841b6ee611998f7d101368b571a32

    SHA256

    cf3360c6d7ce51efaf7dffefed6b6fc13f6de32c08d5f2407de8d9f262610721

    SHA512

    83912b1b0ae6673536e2680d190ede93f91f595aa398a2ed4936e8766365fb1e53334dd9f2d695795f5f40958dc99b7715ecde57a253c60ca2de2b7b39846b14

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130848.exe

    Filesize

    542KB

    MD5

    66fd27164c2f94ad233ac0eb81a5f57e

    SHA1

    be86ac3e694841b6ee611998f7d101368b571a32

    SHA256

    cf3360c6d7ce51efaf7dffefed6b6fc13f6de32c08d5f2407de8d9f262610721

    SHA512

    83912b1b0ae6673536e2680d190ede93f91f595aa398a2ed4936e8766365fb1e53334dd9f2d695795f5f40958dc99b7715ecde57a253c60ca2de2b7b39846b14

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr368946.exe

    Filesize

    269KB

    MD5

    94c71f3f561e4e7b510150ec7eb7d8f1

    SHA1

    c3117e2e101e4e278143ebd0b28142d12e701c13

    SHA256

    5a322f0193520725bf2ac2ffbd76147718c59c7af52a6b7f23e53dc467bd88d0

    SHA512

    c030fcb5be638a1ec4b8d601fd3ededab48d231946b872242a58030def465cf21e7a0e8ad3779ba196ee61fe97f253285489efa4ec5faf5996bec2ba49c8b9ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr368946.exe

    Filesize

    269KB

    MD5

    94c71f3f561e4e7b510150ec7eb7d8f1

    SHA1

    c3117e2e101e4e278143ebd0b28142d12e701c13

    SHA256

    5a322f0193520725bf2ac2ffbd76147718c59c7af52a6b7f23e53dc467bd88d0

    SHA512

    c030fcb5be638a1ec4b8d601fd3ededab48d231946b872242a58030def465cf21e7a0e8ad3779ba196ee61fe97f253285489efa4ec5faf5996bec2ba49c8b9ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu178273.exe

    Filesize

    352KB

    MD5

    1d1f4a7d606c044cb79e88ad633b83c8

    SHA1

    23603432bc293619f2341e8eae9d29d5614a6168

    SHA256

    7a87275b5c2477906ce2d5dc830cf916777463c58040f323369fd84c10dbca3c

    SHA512

    6da1abbe5e0e808da223e8352bb26c7627379771b98a136efb815006e8fc23b027cb6fc5931df13216ca0ee27ee2b20e1339ff9893c12001d22da7a241f54f0b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu178273.exe

    Filesize

    352KB

    MD5

    1d1f4a7d606c044cb79e88ad633b83c8

    SHA1

    23603432bc293619f2341e8eae9d29d5614a6168

    SHA256

    7a87275b5c2477906ce2d5dc830cf916777463c58040f323369fd84c10dbca3c

    SHA512

    6da1abbe5e0e808da223e8352bb26c7627379771b98a136efb815006e8fc23b027cb6fc5931df13216ca0ee27ee2b20e1339ff9893c12001d22da7a241f54f0b

  • memory/2348-143-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-153-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-133-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-134-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-135-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-136-0x0000000007250000-0x000000000774E000-memory.dmp

    Filesize

    5.0MB

  • memory/2348-137-0x00000000070D0000-0x00000000070E8000-memory.dmp

    Filesize

    96KB

  • memory/2348-138-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-139-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-141-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-131-0x00000000048E0000-0x00000000048FA000-memory.dmp

    Filesize

    104KB

  • memory/2348-145-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-147-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-149-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-151-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2348-155-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-157-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-159-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-161-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-163-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-165-0x00000000070D0000-0x00000000070E2000-memory.dmp

    Filesize

    72KB

  • memory/2348-166-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/2348-167-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-168-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-169-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/2348-171-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/3948-993-0x00000000004F0000-0x0000000000518000-memory.dmp

    Filesize

    160KB

  • memory/3948-994-0x0000000007290000-0x00000000072DB000-memory.dmp

    Filesize

    300KB

  • memory/3948-995-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4084-176-0x0000000004A10000-0x0000000004A4C000-memory.dmp

    Filesize

    240KB

  • memory/4084-179-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-181-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-183-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-185-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-187-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-189-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-191-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-194-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-195-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-197-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-193-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4084-199-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-201-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-198-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-203-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-205-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-207-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-209-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-213-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-211-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-215-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-974-0x0000000009C40000-0x000000000A246000-memory.dmp

    Filesize

    6.0MB

  • memory/4084-975-0x0000000007270000-0x0000000007282000-memory.dmp

    Filesize

    72KB

  • memory/4084-976-0x000000000A250000-0x000000000A35A000-memory.dmp

    Filesize

    1.0MB

  • memory/4084-977-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/4084-978-0x000000000A3E0000-0x000000000A42B000-memory.dmp

    Filesize

    300KB

  • memory/4084-979-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-980-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4084-981-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4084-982-0x000000000AED0000-0x000000000AF46000-memory.dmp

    Filesize

    472KB

  • memory/4084-983-0x000000000AF90000-0x000000000AFAE000-memory.dmp

    Filesize

    120KB

  • memory/4084-178-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4084-177-0x0000000004B00000-0x0000000004B3A000-memory.dmp

    Filesize

    232KB

  • memory/4084-984-0x000000000B040000-0x000000000B090000-memory.dmp

    Filesize

    320KB

  • memory/4084-985-0x000000000B0B0000-0x000000000B272000-memory.dmp

    Filesize

    1.8MB

  • memory/4084-986-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB