Analysis

  • max time kernel
    86s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 16:50

General

  • Target

    5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe

  • Size

    700KB

  • MD5

    76d94ca24334cf36730214e9d29a2c4f

  • SHA1

    4d2052dd829594747aa9b2e3da7b26f248dad00c

  • SHA256

    5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377

  • SHA512

    123083f522c9dfd88acc26b584885daa82a9d2acf55e6ada56bb1204398035915b433b5a6470c626d0fc1bdc50873ac95fbe85166a9d8116e48cbcfcde6dedc2

  • SSDEEP

    12288:Hy90bdBoMuZDcu+LXUVBjkdKAas4H2F4a9KMVdbs6poU8Xx05:HyQBaZAuG+WGawug48hi

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe
    "C:\Users\Admin\AppData\Local\Temp\5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2036

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exe

          Filesize

          546KB

          MD5

          24d03dfb2b1c56b6bc29fceb3c68e18c

          SHA1

          edb88a48ef736647617c47b874e833df12867985

          SHA256

          513132e2e8c8cb6017fa663f28478e39fb93c0b7fd257d71a9623746ece533f6

          SHA512

          c3197de442c0adf42d7fd7b363d10123d993249fa005b6f0b559d05c147e999dfa708d42db81f60f21eeb252257f47dfa163a69a69a14969828a521143354543

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exe

          Filesize

          546KB

          MD5

          24d03dfb2b1c56b6bc29fceb3c68e18c

          SHA1

          edb88a48ef736647617c47b874e833df12867985

          SHA256

          513132e2e8c8cb6017fa663f28478e39fb93c0b7fd257d71a9623746ece533f6

          SHA512

          c3197de442c0adf42d7fd7b363d10123d993249fa005b6f0b559d05c147e999dfa708d42db81f60f21eeb252257f47dfa163a69a69a14969828a521143354543

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exe

          Filesize

          270KB

          MD5

          5b614b56b3e2fb2dd9556e6a6ecca11a

          SHA1

          eea0be34148b9f8cd012879f731073590d68e5ee

          SHA256

          fb7db0aa780ff4635e4c1be200c647c4c283671253edc6f6a125af9c73968feb

          SHA512

          ac99c4479f65da8c29ace1815d4097592be4dc99a0896f598158162de84f5da122acedd7943b3414c3f0c2295721d195ae79889bfb687e1e1bbd0a2d980bef11

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exe

          Filesize

          270KB

          MD5

          5b614b56b3e2fb2dd9556e6a6ecca11a

          SHA1

          eea0be34148b9f8cd012879f731073590d68e5ee

          SHA256

          fb7db0aa780ff4635e4c1be200c647c4c283671253edc6f6a125af9c73968feb

          SHA512

          ac99c4479f65da8c29ace1815d4097592be4dc99a0896f598158162de84f5da122acedd7943b3414c3f0c2295721d195ae79889bfb687e1e1bbd0a2d980bef11

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exe

          Filesize

          352KB

          MD5

          7f949ea3f24253940a513391b07377c5

          SHA1

          e64f63beabfce03930ea74538d49bcc24f1ef6ae

          SHA256

          de4851b321a85fa2cc3bb78d5e509aad43d4bc868272caa016c1ec2165de3770

          SHA512

          f3655fb2cf597c8ec6caca06ba84c21764f5e0fcf7757cf3566344e14f4ade19ef906b3fc66c9269e284de90b329b1d21843ca1787f91822213a5dc973d8107e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exe

          Filesize

          352KB

          MD5

          7f949ea3f24253940a513391b07377c5

          SHA1

          e64f63beabfce03930ea74538d49bcc24f1ef6ae

          SHA256

          de4851b321a85fa2cc3bb78d5e509aad43d4bc868272caa016c1ec2165de3770

          SHA512

          f3655fb2cf597c8ec6caca06ba84c21764f5e0fcf7757cf3566344e14f4ade19ef906b3fc66c9269e284de90b329b1d21843ca1787f91822213a5dc973d8107e

        • memory/2036-999-0x0000000007960000-0x0000000007970000-memory.dmp

          Filesize

          64KB

        • memory/2036-998-0x0000000007970000-0x00000000079BB000-memory.dmp

          Filesize

          300KB

        • memory/2036-997-0x0000000000BD0000-0x0000000000BF8000-memory.dmp

          Filesize

          160KB

        • memory/2356-976-0x0000000004D10000-0x0000000004D22000-memory.dmp

          Filesize

          72KB

        • memory/2356-979-0x0000000004DE0000-0x0000000004E2B000-memory.dmp

          Filesize

          300KB

        • memory/2356-991-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-990-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-989-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-988-0x0000000004700000-0x0000000004750000-memory.dmp

          Filesize

          320KB

        • memory/2356-987-0x000000000B6F0000-0x000000000B70E000-memory.dmp

          Filesize

          120KB

        • memory/2356-986-0x000000000B090000-0x000000000B5BC000-memory.dmp

          Filesize

          5.2MB

        • memory/2356-985-0x000000000AEB0000-0x000000000B072000-memory.dmp

          Filesize

          1.8MB

        • memory/2356-984-0x000000000ADF0000-0x000000000AE66000-memory.dmp

          Filesize

          472KB

        • memory/2356-982-0x000000000AD30000-0x000000000ADC2000-memory.dmp

          Filesize

          584KB

        • memory/2356-981-0x000000000A060000-0x000000000A0C6000-memory.dmp

          Filesize

          408KB

        • memory/2356-980-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-978-0x0000000004D60000-0x0000000004D9E000-memory.dmp

          Filesize

          248KB

        • memory/2356-977-0x0000000009DD0000-0x0000000009EDA000-memory.dmp

          Filesize

          1.0MB

        • memory/2356-975-0x000000000A3E0000-0x000000000A9E6000-memory.dmp

          Filesize

          6.0MB

        • memory/2356-216-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-214-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-212-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-178-0x00000000048E0000-0x000000000491C000-memory.dmp

          Filesize

          240KB

        • memory/2356-179-0x0000000004AB0000-0x0000000004AEA000-memory.dmp

          Filesize

          232KB

        • memory/2356-180-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-181-0x0000000002BD0000-0x0000000002C16000-memory.dmp

          Filesize

          280KB

        • memory/2356-182-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-184-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-186-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2356-188-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-185-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-190-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-192-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-194-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-196-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-200-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-198-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-204-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-202-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-206-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-208-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2356-210-0x0000000004AB0000-0x0000000004AE5000-memory.dmp

          Filesize

          212KB

        • memory/2984-169-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2984-158-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-173-0x0000000000400000-0x0000000002BAD000-memory.dmp

          Filesize

          39.7MB

        • memory/2984-171-0x0000000000400000-0x0000000002BAD000-memory.dmp

          Filesize

          39.7MB

        • memory/2984-142-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-154-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-168-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2984-150-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-160-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-162-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-144-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-164-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-156-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-170-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2984-167-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2984-166-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-146-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-152-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-148-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-140-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-139-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

          Filesize

          72KB

        • memory/2984-138-0x0000000004AE0000-0x0000000004AF8000-memory.dmp

          Filesize

          96KB

        • memory/2984-137-0x0000000007200000-0x00000000076FE000-memory.dmp

          Filesize

          5.0MB

        • memory/2984-136-0x00000000047D0000-0x00000000047EA000-memory.dmp

          Filesize

          104KB