Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 17:13

General

  • Target

    141066d00ff9e16eba9e591d278c2c24e6e2e487bfc693879ba5f3b02e6883f3.exe

  • Size

    695KB

  • MD5

    bd6cd86d7667f12198d7b719a539a601

  • SHA1

    061ef71e823335d804a436095e07792a248435f7

  • SHA256

    141066d00ff9e16eba9e591d278c2c24e6e2e487bfc693879ba5f3b02e6883f3

  • SHA512

    358053e65f991351aad1c92edd7b891dfdc4aea5f1fb7c6720c56aa72c3eb8f4df8229b28ecbf31edf5b0b251e1d1ed5a56451d41b778f9c0c9cde9fca917681

  • SSDEEP

    12288:py90KOjaY1VrBrW5G5MJgZjmjM5KcztIWI7LnzZ09SvtORMDc:pyfYndH6jARvaDzZ0EKB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\141066d00ff9e16eba9e591d278c2c24e6e2e487bfc693879ba5f3b02e6883f3.exe
    "C:\Users\Admin\AppData\Local\Temp\141066d00ff9e16eba9e591d278c2c24e6e2e487bfc693879ba5f3b02e6883f3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741492.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr494629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr494629.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 1080
          4⤵
          • Program crash
          PID:4524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu065580.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu065580.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1324
          4⤵
          • Program crash
          PID:2640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790508.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790508.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4700 -ip 4700
    1⤵
      PID:2628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5036 -ip 5036
      1⤵
        PID:3592

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790508.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790508.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741492.exe

        Filesize

        541KB

        MD5

        1879065e8350ff1335b9e933f2eb063a

        SHA1

        aa0e7a926fd6d14b71e8315616491efd3af9bfff

        SHA256

        177f3dec6026c4569513d4c1a9ebd87dbd97dcb960af73b36ce31e988e25cc51

        SHA512

        706457e2993af3a872f3963a3d1d797ceac1e1389677437ba458659739e473ba86cd31f6ba92352820fb754c829a985a08d3942dc87d19da70cbd5b9b1de273c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741492.exe

        Filesize

        541KB

        MD5

        1879065e8350ff1335b9e933f2eb063a

        SHA1

        aa0e7a926fd6d14b71e8315616491efd3af9bfff

        SHA256

        177f3dec6026c4569513d4c1a9ebd87dbd97dcb960af73b36ce31e988e25cc51

        SHA512

        706457e2993af3a872f3963a3d1d797ceac1e1389677437ba458659739e473ba86cd31f6ba92352820fb754c829a985a08d3942dc87d19da70cbd5b9b1de273c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr494629.exe

        Filesize

        269KB

        MD5

        d3bb34e8bfca3f19386a75c660c7882a

        SHA1

        32528486a3eac5c1192eac6496d757df59e22f7a

        SHA256

        586529161cd509143677a089502b96944f633fa8d99d9b62bbbac347ee49f7fe

        SHA512

        a5eb56089010c25d9fa029ef5ac2d436c9f69eca597548f7f2a03beb824d6e8b40c89fd0d692749a2807844a431d173cf25806e25c9536ab9ddb9bb53ae44f75

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr494629.exe

        Filesize

        269KB

        MD5

        d3bb34e8bfca3f19386a75c660c7882a

        SHA1

        32528486a3eac5c1192eac6496d757df59e22f7a

        SHA256

        586529161cd509143677a089502b96944f633fa8d99d9b62bbbac347ee49f7fe

        SHA512

        a5eb56089010c25d9fa029ef5ac2d436c9f69eca597548f7f2a03beb824d6e8b40c89fd0d692749a2807844a431d173cf25806e25c9536ab9ddb9bb53ae44f75

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu065580.exe

        Filesize

        352KB

        MD5

        93e349162e3a8ef7f6cb4282b8eaefc3

        SHA1

        a267ad4ca38185f0f3796b9bb92237d16b4fb3c4

        SHA256

        98a149c84c23199ada48a6ef9a44f11d38ada5a98c59eea473df25b5ff63de40

        SHA512

        dc2a4aecc6ffa164a6610aa619457a51066a85866ecceccfacfe676bc36533b912abd5fa7c0435383f99ef70ba8b5c58a0a80276e1750f651f14de23fb54bdcd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu065580.exe

        Filesize

        352KB

        MD5

        93e349162e3a8ef7f6cb4282b8eaefc3

        SHA1

        a267ad4ca38185f0f3796b9bb92237d16b4fb3c4

        SHA256

        98a149c84c23199ada48a6ef9a44f11d38ada5a98c59eea473df25b5ff63de40

        SHA512

        dc2a4aecc6ffa164a6610aa619457a51066a85866ecceccfacfe676bc36533b912abd5fa7c0435383f99ef70ba8b5c58a0a80276e1750f651f14de23fb54bdcd

      • memory/628-1006-0x0000000007BE0000-0x0000000007BF0000-memory.dmp

        Filesize

        64KB

      • memory/628-1005-0x0000000000E60000-0x0000000000E88000-memory.dmp

        Filesize

        160KB

      • memory/4700-156-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-170-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-151-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-152-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-153-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-154-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-149-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-158-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-160-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-162-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-164-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-166-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-168-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-150-0x0000000007520000-0x0000000007AC4000-memory.dmp

        Filesize

        5.6MB

      • memory/4700-172-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-174-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-176-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-178-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-180-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4700-181-0x0000000000400000-0x0000000002BAD000-memory.dmp

        Filesize

        39.7MB

      • memory/4700-182-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-185-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-183-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/4700-186-0x0000000000400000-0x0000000002BAD000-memory.dmp

        Filesize

        39.7MB

      • memory/4700-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

        Filesize

        180KB

      • memory/5036-192-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-194-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-197-0x0000000007330000-0x0000000007340000-memory.dmp

        Filesize

        64KB

      • memory/5036-198-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-196-0x0000000002CE0000-0x0000000002D26000-memory.dmp

        Filesize

        280KB

      • memory/5036-199-0x0000000007330000-0x0000000007340000-memory.dmp

        Filesize

        64KB

      • memory/5036-202-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-201-0x0000000007330000-0x0000000007340000-memory.dmp

        Filesize

        64KB

      • memory/5036-204-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-206-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-208-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-210-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-212-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-214-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-216-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-218-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-222-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-220-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-224-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-226-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-228-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-987-0x0000000009D70000-0x000000000A388000-memory.dmp

        Filesize

        6.1MB

      • memory/5036-988-0x00000000072C0000-0x00000000072D2000-memory.dmp

        Filesize

        72KB

      • memory/5036-989-0x000000000A390000-0x000000000A49A000-memory.dmp

        Filesize

        1.0MB

      • memory/5036-990-0x0000000007330000-0x0000000007340000-memory.dmp

        Filesize

        64KB

      • memory/5036-991-0x00000000072F0000-0x000000000732C000-memory.dmp

        Filesize

        240KB

      • memory/5036-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/5036-993-0x000000000AF30000-0x000000000AFC2000-memory.dmp

        Filesize

        584KB

      • memory/5036-994-0x000000000AFE0000-0x000000000B030000-memory.dmp

        Filesize

        320KB

      • memory/5036-995-0x000000000B040000-0x000000000B0B6000-memory.dmp

        Filesize

        472KB

      • memory/5036-191-0x0000000004E20000-0x0000000004E55000-memory.dmp

        Filesize

        212KB

      • memory/5036-996-0x000000000B110000-0x000000000B2D2000-memory.dmp

        Filesize

        1.8MB

      • memory/5036-997-0x000000000B300000-0x000000000B82C000-memory.dmp

        Filesize

        5.2MB

      • memory/5036-998-0x000000000B930000-0x000000000B94E000-memory.dmp

        Filesize

        120KB