Analysis

  • max time kernel
    87s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 19:57

General

  • Target

    82cc0a730bb8afd512445a9eebabcf476101372ebc691f39e4529496bdda172d.exe

  • Size

    695KB

  • MD5

    a29f1c74e74cc108eb8c410647c9ed53

  • SHA1

    06ac9bac4ed30dbe02296117e97ea0b87d904a8c

  • SHA256

    82cc0a730bb8afd512445a9eebabcf476101372ebc691f39e4529496bdda172d

  • SHA512

    3a8c479fb0032a457da0a79abb404af26150dbc8bf58e81a858d385e924b32064d1ee2d91163bc80a42b816b433cbb19e4afd2b83859bb1e4b6e575d5ba1701f

  • SSDEEP

    12288:Sy90EODNLLsV9iPeffPK/yLM5Jy4RGalV0zfXbbRg0:Sy/ORLs2Wf3KCOpYal0/RN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82cc0a730bb8afd512445a9eebabcf476101372ebc691f39e4529496bdda172d.exe
    "C:\Users\Admin\AppData\Local\Temp\82cc0a730bb8afd512445a9eebabcf476101372ebc691f39e4529496bdda172d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un999308.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un999308.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr853909.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr853909.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 1088
          4⤵
          • Program crash
          PID:4604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu494826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu494826.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 1900
          4⤵
          • Program crash
          PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si474026.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si474026.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4816 -ip 4816
    1⤵
      PID:4668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3928 -ip 3928
      1⤵
        PID:4148

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si474026.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si474026.exe

              Filesize

              136KB

              MD5

              49650cdcdc358bb2770f0062abeef88c

              SHA1

              d6f7ec7758e9a80700b81bc7a549838ba99aacac

              SHA256

              79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

              SHA512

              7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un999308.exe

              Filesize

              541KB

              MD5

              feed8b0e70c5cfc33041d6a838047f2b

              SHA1

              9529caba12e575bf2fc3a5cb4da03468ab3a094a

              SHA256

              3d5319d951682d7fc38ca37c00c1b3cce34dfd4e3e9ccfe81e50cca51f5ea5b2

              SHA512

              02568aae880a4c50e8eecef897f91f0ac61acd2ccab42925f5fb1bec933b1f880257efb6dfda95c46f9882bfa4093fe68fe56677d1af9bee44fdb0e80859035e

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un999308.exe

              Filesize

              541KB

              MD5

              feed8b0e70c5cfc33041d6a838047f2b

              SHA1

              9529caba12e575bf2fc3a5cb4da03468ab3a094a

              SHA256

              3d5319d951682d7fc38ca37c00c1b3cce34dfd4e3e9ccfe81e50cca51f5ea5b2

              SHA512

              02568aae880a4c50e8eecef897f91f0ac61acd2ccab42925f5fb1bec933b1f880257efb6dfda95c46f9882bfa4093fe68fe56677d1af9bee44fdb0e80859035e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr853909.exe

              Filesize

              269KB

              MD5

              1ae896cfe40b8b50880b3cae8f41885f

              SHA1

              18a12f4312bdfb3f96aee93bcea6306b6cda6632

              SHA256

              5d07651bdaba519fde29be61699f99441ad3f6a7912d5ca2e83f554406997078

              SHA512

              cb06586b95041e67e50bf51fe316bbaef3653aefacd147b4a7726f25bd326e919b7c1f494345f7e7b4c08154dae3636d8ad90746b62f9ee0256f6ba62a906b0e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr853909.exe

              Filesize

              269KB

              MD5

              1ae896cfe40b8b50880b3cae8f41885f

              SHA1

              18a12f4312bdfb3f96aee93bcea6306b6cda6632

              SHA256

              5d07651bdaba519fde29be61699f99441ad3f6a7912d5ca2e83f554406997078

              SHA512

              cb06586b95041e67e50bf51fe316bbaef3653aefacd147b4a7726f25bd326e919b7c1f494345f7e7b4c08154dae3636d8ad90746b62f9ee0256f6ba62a906b0e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu494826.exe

              Filesize

              352KB

              MD5

              d48a362dee7645385f61a1e19b3cc4f3

              SHA1

              71c03b356157e0bbc8ddbd5dbbbd7484e855b59d

              SHA256

              ee7d9db8be4b4542e2074b9b076176650d00e5f4f9ee7aa94a2e3ea4ee22d158

              SHA512

              2b11d048d5ef1744c343bc5e3c8ac18ba2b681655f456927db37d886575a2ffdaf67432a7d6a9ff654d20989c7f9df32078bb91076f0c4d6eba8da376a512ef7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu494826.exe

              Filesize

              352KB

              MD5

              d48a362dee7645385f61a1e19b3cc4f3

              SHA1

              71c03b356157e0bbc8ddbd5dbbbd7484e855b59d

              SHA256

              ee7d9db8be4b4542e2074b9b076176650d00e5f4f9ee7aa94a2e3ea4ee22d158

              SHA512

              2b11d048d5ef1744c343bc5e3c8ac18ba2b681655f456927db37d886575a2ffdaf67432a7d6a9ff654d20989c7f9df32078bb91076f0c4d6eba8da376a512ef7

            • memory/3928-988-0x000000000A320000-0x000000000A332000-memory.dmp

              Filesize

              72KB

            • memory/3928-989-0x000000000A340000-0x000000000A44A000-memory.dmp

              Filesize

              1.0MB

            • memory/3928-1003-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-1001-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-1002-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-998-0x000000000B970000-0x000000000B9C0000-memory.dmp

              Filesize

              320KB

            • memory/3928-997-0x000000000B8E0000-0x000000000B8FE000-memory.dmp

              Filesize

              120KB

            • memory/3928-996-0x000000000B2A0000-0x000000000B7CC000-memory.dmp

              Filesize

              5.2MB

            • memory/3928-995-0x000000000B0D0000-0x000000000B292000-memory.dmp

              Filesize

              1.8MB

            • memory/3928-994-0x000000000AFF0000-0x000000000B066000-memory.dmp

              Filesize

              472KB

            • memory/3928-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

              Filesize

              584KB

            • memory/3928-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

              Filesize

              408KB

            • memory/3928-991-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-990-0x000000000A460000-0x000000000A49C000-memory.dmp

              Filesize

              240KB

            • memory/3928-204-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-987-0x0000000009D00000-0x000000000A318000-memory.dmp

              Filesize

              6.1MB

            • memory/3928-228-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-226-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-224-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-222-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-207-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-218-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-216-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-191-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-192-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-194-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-196-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-198-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-200-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-202-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-212-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-208-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-220-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/3928-206-0x0000000002D30000-0x0000000002D76000-memory.dmp

              Filesize

              280KB

            • memory/3928-211-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-210-0x00000000072C0000-0x00000000072D0000-memory.dmp

              Filesize

              64KB

            • memory/3928-214-0x0000000004E20000-0x0000000004E55000-memory.dmp

              Filesize

              212KB

            • memory/4712-1008-0x0000000000CE0000-0x0000000000D08000-memory.dmp

              Filesize

              160KB

            • memory/4712-1009-0x0000000007E10000-0x0000000007E20000-memory.dmp

              Filesize

              64KB

            • memory/4816-152-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-149-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-185-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-184-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-182-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-181-0x0000000000400000-0x0000000002BAD000-memory.dmp

              Filesize

              39.7MB

            • memory/4816-180-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-150-0x0000000007390000-0x0000000007934000-memory.dmp

              Filesize

              5.6MB

            • memory/4816-179-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/4816-156-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-178-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-186-0x0000000000400000-0x0000000002BAD000-memory.dmp

              Filesize

              39.7MB

            • memory/4816-174-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-168-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-172-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-166-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-164-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-162-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-160-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-158-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-176-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-170-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

              Filesize

              180KB

            • memory/4816-154-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/4816-151-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB