Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2023, 21:11

General

  • Target

    0113a7a2466709fcac2f7b51e986fa38.exe

  • Size

    559KB

  • MD5

    0113a7a2466709fcac2f7b51e986fa38

  • SHA1

    1a58399b704375b3267b4457542acd5ebc54624f

  • SHA256

    76eccf4cca6091b7dbeb31883ddb2cd8918ad4c6ab0079586d72e1040db8ed7e

  • SHA512

    01757e134b5f2ff0d666901dd9d35b65c017d2788ae35f6d674ccd3ca597a62fafd4b4f1b3e858367b626072fd766a1cd97aed43d2b1bc016f7ffe5e07f7c65a

  • SSDEEP

    12288:wy90EJyv/F1K5PuICU6u6eEcG/Wr0TUTYtFY6:wyDJyvd88Pu6jy0kYtG6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0113a7a2466709fcac2f7b51e986fa38.exe
    "C:\Users\Admin\AppData\Local\Temp\0113a7a2466709fcac2f7b51e986fa38.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1616

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

          Filesize

          405KB

          MD5

          2687be63ce841df3db7592703113af30

          SHA1

          5bf351e10e0bc560bfe080852992a0aeb10cf19a

          SHA256

          c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

          SHA512

          f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

          Filesize

          405KB

          MD5

          2687be63ce841df3db7592703113af30

          SHA1

          5bf351e10e0bc560bfe080852992a0aeb10cf19a

          SHA256

          c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

          SHA512

          f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

          Filesize

          405KB

          MD5

          2687be63ce841df3db7592703113af30

          SHA1

          5bf351e10e0bc560bfe080852992a0aeb10cf19a

          SHA256

          c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

          SHA512

          f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

          Filesize

          405KB

          MD5

          2687be63ce841df3db7592703113af30

          SHA1

          5bf351e10e0bc560bfe080852992a0aeb10cf19a

          SHA256

          c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

          SHA512

          f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

          Filesize

          351KB

          MD5

          d5fcb0bb29d23feb3eb8af483a542bde

          SHA1

          45051b8ccc7ae721751099966249e557f3e0a07d

          SHA256

          ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

          SHA512

          804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

        • memory/384-72-0x00000000010B0000-0x00000000010BA000-memory.dmp

          Filesize

          40KB

        • memory/580-104-0x0000000000290000-0x00000000002D6000-memory.dmp

          Filesize

          280KB

        • memory/580-124-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-92-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-94-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-96-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-98-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-100-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-102-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-106-0x0000000007110000-0x0000000007150000-memory.dmp

          Filesize

          256KB

        • memory/580-105-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-88-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-108-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-110-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-112-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-114-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-116-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-118-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-120-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-122-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-90-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-126-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-128-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-130-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-132-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-134-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-136-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-138-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-140-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-142-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-144-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-146-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-148-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-150-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-879-0x0000000007110000-0x0000000007150000-memory.dmp

          Filesize

          256KB

        • memory/580-86-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-85-0x0000000004930000-0x0000000004965000-memory.dmp

          Filesize

          212KB

        • memory/580-84-0x0000000004930000-0x000000000496A000-memory.dmp

          Filesize

          232KB

        • memory/580-83-0x0000000004880000-0x00000000048BC000-memory.dmp

          Filesize

          240KB

        • memory/1616-887-0x00000000003F0000-0x0000000000418000-memory.dmp

          Filesize

          160KB

        • memory/1616-888-0x0000000000990000-0x00000000009D0000-memory.dmp

          Filesize

          256KB