Analysis

  • max time kernel
    100s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 21:11

General

  • Target

    0113a7a2466709fcac2f7b51e986fa38.exe

  • Size

    559KB

  • MD5

    0113a7a2466709fcac2f7b51e986fa38

  • SHA1

    1a58399b704375b3267b4457542acd5ebc54624f

  • SHA256

    76eccf4cca6091b7dbeb31883ddb2cd8918ad4c6ab0079586d72e1040db8ed7e

  • SHA512

    01757e134b5f2ff0d666901dd9d35b65c017d2788ae35f6d674ccd3ca597a62fafd4b4f1b3e858367b626072fd766a1cd97aed43d2b1bc016f7ffe5e07f7c65a

  • SSDEEP

    12288:wy90EJyv/F1K5PuICU6u6eEcG/Wr0TUTYtFY6:wyDJyvd88Pu6jy0kYtG6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0113a7a2466709fcac2f7b51e986fa38.exe
    "C:\Users\Admin\AppData\Local\Temp\0113a7a2466709fcac2f7b51e986fa38.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 1652
          4⤵
          • Program crash
          PID:2248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1384 -ip 1384
    1⤵
      PID:3764

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746422.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

            Filesize

            405KB

            MD5

            2687be63ce841df3db7592703113af30

            SHA1

            5bf351e10e0bc560bfe080852992a0aeb10cf19a

            SHA256

            c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

            SHA512

            f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihk8454.exe

            Filesize

            405KB

            MD5

            2687be63ce841df3db7592703113af30

            SHA1

            5bf351e10e0bc560bfe080852992a0aeb10cf19a

            SHA256

            c9bc0a03d9c9f929b8fb561b20cf7e0508c77715f16dec5403aac8d412b8c8d2

            SHA512

            f2977a3817fdcafad5e60e3c3aa7dc60e9dc2704b6de0607577320e906ada330ad976204f5930099ee4e459cc2a80af6d63c6ad1ecfc0a6f838e45fee8e09dbd

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it919775.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

            Filesize

            351KB

            MD5

            d5fcb0bb29d23feb3eb8af483a542bde

            SHA1

            45051b8ccc7ae721751099966249e557f3e0a07d

            SHA256

            ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

            SHA512

            804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744409.exe

            Filesize

            351KB

            MD5

            d5fcb0bb29d23feb3eb8af483a542bde

            SHA1

            45051b8ccc7ae721751099966249e557f3e0a07d

            SHA256

            ce3de8203a6b19fe2123eb6533edcfbaeb8ad30ce2c29a6bb69ab19838f9ef4b

            SHA512

            804a062c451e29152204c0db58584632de3ec6724fbf3ae3a0465a24134ba8e5751b58c05d288cca95a1dab07c9bd252cb165e19977d9f0c27d1d7289009da4b

          • memory/1384-153-0x0000000007390000-0x0000000007934000-memory.dmp

            Filesize

            5.6MB

          • memory/1384-154-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

            Filesize

            280KB

          • memory/1384-157-0x0000000007380000-0x0000000007390000-memory.dmp

            Filesize

            64KB

          • memory/1384-155-0x0000000007380000-0x0000000007390000-memory.dmp

            Filesize

            64KB

          • memory/1384-156-0x0000000007380000-0x0000000007390000-memory.dmp

            Filesize

            64KB

          • memory/1384-158-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-161-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-163-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-159-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-165-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-167-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-169-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-171-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-173-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-175-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-177-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-179-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-183-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-185-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-181-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-187-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-189-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-191-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-193-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-195-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-197-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-199-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-201-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-203-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-205-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-207-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-209-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-211-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-213-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-215-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-217-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-219-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-221-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/1384-950-0x0000000009DC0000-0x000000000A3D8000-memory.dmp

            Filesize

            6.1MB

          • memory/1384-951-0x000000000A460000-0x000000000A472000-memory.dmp

            Filesize

            72KB

          • memory/1384-952-0x000000000A480000-0x000000000A58A000-memory.dmp

            Filesize

            1.0MB

          • memory/1384-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

            Filesize

            240KB

          • memory/1384-954-0x0000000007380000-0x0000000007390000-memory.dmp

            Filesize

            64KB

          • memory/1384-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

            Filesize

            408KB

          • memory/1384-956-0x000000000AF60000-0x000000000AFF2000-memory.dmp

            Filesize

            584KB

          • memory/1384-957-0x000000000B120000-0x000000000B196000-memory.dmp

            Filesize

            472KB

          • memory/1384-958-0x000000000B1D0000-0x000000000B1EE000-memory.dmp

            Filesize

            120KB

          • memory/1384-959-0x000000000B2F0000-0x000000000B4B2000-memory.dmp

            Filesize

            1.8MB

          • memory/1384-960-0x000000000B4C0000-0x000000000B9EC000-memory.dmp

            Filesize

            5.2MB

          • memory/1384-961-0x0000000004B30000-0x0000000004B80000-memory.dmp

            Filesize

            320KB

          • memory/2320-147-0x0000000000810000-0x000000000081A000-memory.dmp

            Filesize

            40KB

          • memory/3908-968-0x00000000004B0000-0x00000000004D8000-memory.dmp

            Filesize

            160KB

          • memory/3908-969-0x0000000007540000-0x0000000007550000-memory.dmp

            Filesize

            64KB