Analysis

  • max time kernel
    124s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 20:33

General

  • Target

    65fcbc24969a7000c5a5895fe3620a14f97c198940f32f88d4713f33a863002a.exe

  • Size

    560KB

  • MD5

    451906283d8329c83ae8541b07b892f1

  • SHA1

    701ab2386fa4c2d7a8ad2dad4e71164daa5005cb

  • SHA256

    65fcbc24969a7000c5a5895fe3620a14f97c198940f32f88d4713f33a863002a

  • SHA512

    789535cdd7d3187961495d6d41cc61d696aa5bf3ba0eabd3a378d7faabb507a433995000719f73add676be34d3817e20d8ccc12c8068bc4985e238f4d12d21c6

  • SSDEEP

    12288:dy90cQRG6pJCvGCy9SysD00QHDDgjufDII7Jl:dy7uwv7yyQjDgjc37Jl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65fcbc24969a7000c5a5895fe3620a14f97c198940f32f88d4713f33a863002a.exe
    "C:\Users\Admin\AppData\Local\Temp\65fcbc24969a7000c5a5895fe3620a14f97c198940f32f88d4713f33a863002a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj3062.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj3062.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it696584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it696584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp839339.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp839339.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1768
          4⤵
          • Program crash
          PID:4880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr020661.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr020661.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4504 -ip 4504
    1⤵
      PID:4452
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2900

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr020661.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr020661.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj3062.exe

            Filesize

            405KB

            MD5

            cde987cd3da6c420dfdfd35186e4c01a

            SHA1

            0ed729b91cf25688bc9f31dc0de1dc5a86a1539d

            SHA256

            68e7fc8248d5604240e138a9e538525a24b7e5bc7d6a7a6f0a6319ec491c3ee6

            SHA512

            cdfc64e0f1567bb52ff0031b5e77ac4007bee689d13c810df2902ce0864a1f69436f63ccffc847786accf3f184be892c95ba554881b040a8390d26155c397bb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj3062.exe

            Filesize

            405KB

            MD5

            cde987cd3da6c420dfdfd35186e4c01a

            SHA1

            0ed729b91cf25688bc9f31dc0de1dc5a86a1539d

            SHA256

            68e7fc8248d5604240e138a9e538525a24b7e5bc7d6a7a6f0a6319ec491c3ee6

            SHA512

            cdfc64e0f1567bb52ff0031b5e77ac4007bee689d13c810df2902ce0864a1f69436f63ccffc847786accf3f184be892c95ba554881b040a8390d26155c397bb4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it696584.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it696584.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp839339.exe

            Filesize

            351KB

            MD5

            2be37f11d682051271686b5c37abab94

            SHA1

            8cda7ef303b26f0363d114013678348067fb1383

            SHA256

            3eb9d7f6a87a79e376c9c0a24a26ddf2bd8cb31e8c7b39ef62661868303d4723

            SHA512

            9a498461cf9261584a3485c528b74bf9c48e109c92fe9c8fb8234e94a833e4d404063605b1fb28c2acdf02f2255ba8f81bf48867816a99a22b749dc7a508ab3f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp839339.exe

            Filesize

            351KB

            MD5

            2be37f11d682051271686b5c37abab94

            SHA1

            8cda7ef303b26f0363d114013678348067fb1383

            SHA256

            3eb9d7f6a87a79e376c9c0a24a26ddf2bd8cb31e8c7b39ef62661868303d4723

            SHA512

            9a498461cf9261584a3485c528b74bf9c48e109c92fe9c8fb8234e94a833e4d404063605b1fb28c2acdf02f2255ba8f81bf48867816a99a22b749dc7a508ab3f

          • memory/548-968-0x0000000000930000-0x0000000000958000-memory.dmp

            Filesize

            160KB

          • memory/548-969-0x0000000007740000-0x0000000007750000-memory.dmp

            Filesize

            64KB

          • memory/2156-147-0x00000000008D0000-0x00000000008DA000-memory.dmp

            Filesize

            40KB

          • memory/4504-189-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-197-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-155-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-156-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-158-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-160-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-162-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-164-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-166-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-168-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-170-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-172-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-174-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-176-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-178-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-180-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-182-0x0000000007330000-0x0000000007340000-memory.dmp

            Filesize

            64KB

          • memory/4504-184-0x0000000007330000-0x0000000007340000-memory.dmp

            Filesize

            64KB

          • memory/4504-187-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-153-0x0000000002CD0000-0x0000000002D16000-memory.dmp

            Filesize

            280KB

          • memory/4504-185-0x0000000007330000-0x0000000007340000-memory.dmp

            Filesize

            64KB

          • memory/4504-183-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-191-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-193-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-195-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-154-0x0000000007340000-0x00000000078E4000-memory.dmp

            Filesize

            5.6MB

          • memory/4504-199-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-201-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-203-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-205-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-207-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-209-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-211-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-213-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-215-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-217-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-219-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-221-0x00000000072C0000-0x00000000072F5000-memory.dmp

            Filesize

            212KB

          • memory/4504-950-0x0000000009DB0000-0x000000000A3C8000-memory.dmp

            Filesize

            6.1MB

          • memory/4504-951-0x000000000A460000-0x000000000A472000-memory.dmp

            Filesize

            72KB

          • memory/4504-952-0x000000000A480000-0x000000000A58A000-memory.dmp

            Filesize

            1.0MB

          • memory/4504-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

            Filesize

            240KB

          • memory/4504-954-0x0000000007330000-0x0000000007340000-memory.dmp

            Filesize

            64KB

          • memory/4504-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

            Filesize

            408KB

          • memory/4504-956-0x000000000AF60000-0x000000000AFF2000-memory.dmp

            Filesize

            584KB

          • memory/4504-957-0x000000000B130000-0x000000000B1A6000-memory.dmp

            Filesize

            472KB

          • memory/4504-958-0x000000000B200000-0x000000000B3C2000-memory.dmp

            Filesize

            1.8MB

          • memory/4504-959-0x000000000B420000-0x000000000B94C000-memory.dmp

            Filesize

            5.2MB

          • memory/4504-960-0x000000000BA20000-0x000000000BA3E000-memory.dmp

            Filesize

            120KB

          • memory/4504-961-0x00000000049F0000-0x0000000004A40000-memory.dmp

            Filesize

            320KB