Analysis

  • max time kernel
    64s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 20:41

General

  • Target

    af25111a225e484c58996c24c550d897.exe

  • Size

    559KB

  • MD5

    af25111a225e484c58996c24c550d897

  • SHA1

    a0ec04d55b799baea255720efc9e320911f04109

  • SHA256

    101b57871792d53eac167c7fab7503a5ef8c815283dbcc6682f587a10eea4074

  • SHA512

    fede48ef8dcd580007df444200fe1fb8da5a17b1776b31c282cc900cb6c7d76a80c04a499ad1bc30d6cf0fe2dd60a5280e693ed6a921382062f8cd12d364b914

  • SSDEEP

    12288:ey901NJEMoHcAh9jPFHotQjtmLo9SQsH09YGRDTMifJhUKhdq1f3F:eyeJETrVdtUQpYQDTnfJh7z43F

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af25111a225e484c58996c24c550d897.exe
    "C:\Users\Admin\AppData\Local\Temp\af25111a225e484c58996c24c550d897.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 1320
          4⤵
          • Program crash
          PID:4852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr146550.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr146550.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2076
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 724 -ip 724
    1⤵
      PID:3176

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr146550.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr146550.exe

            Filesize

            136KB

            MD5

            49650cdcdc358bb2770f0062abeef88c

            SHA1

            d6f7ec7758e9a80700b81bc7a549838ba99aacac

            SHA256

            79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

            SHA512

            7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

            Filesize

            405KB

            MD5

            01e78fe8ed422344c9c508971a22ea57

            SHA1

            38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

            SHA256

            647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

            SHA512

            443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

            Filesize

            405KB

            MD5

            01e78fe8ed422344c9c508971a22ea57

            SHA1

            38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

            SHA256

            647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

            SHA512

            443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

            Filesize

            351KB

            MD5

            c00dc58a2b7e066643ca181208a75c2f

            SHA1

            bc85d8340e66d4b954c2667c2f188de0deb29190

            SHA256

            5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

            SHA512

            d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

            Filesize

            351KB

            MD5

            c00dc58a2b7e066643ca181208a75c2f

            SHA1

            bc85d8340e66d4b954c2667c2f188de0deb29190

            SHA256

            5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

            SHA512

            d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

          • memory/724-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

            Filesize

            280KB

          • memory/724-154-0x0000000007490000-0x0000000007A34000-memory.dmp

            Filesize

            5.6MB

          • memory/724-155-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-156-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-158-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-160-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-162-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-164-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-166-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-168-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-170-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-172-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-174-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-176-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-179-0x0000000007480000-0x0000000007490000-memory.dmp

            Filesize

            64KB

          • memory/724-181-0x0000000007480000-0x0000000007490000-memory.dmp

            Filesize

            64KB

          • memory/724-183-0x0000000007480000-0x0000000007490000-memory.dmp

            Filesize

            64KB

          • memory/724-182-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-178-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-185-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-187-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-189-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-191-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-193-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-195-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-197-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-199-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-201-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-203-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-205-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-207-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-209-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-211-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-213-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-215-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-217-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-219-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-221-0x00000000072B0000-0x00000000072E5000-memory.dmp

            Filesize

            212KB

          • memory/724-950-0x0000000009DC0000-0x000000000A3D8000-memory.dmp

            Filesize

            6.1MB

          • memory/724-951-0x000000000A460000-0x000000000A472000-memory.dmp

            Filesize

            72KB

          • memory/724-952-0x000000000A480000-0x000000000A58A000-memory.dmp

            Filesize

            1.0MB

          • memory/724-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

            Filesize

            240KB

          • memory/724-954-0x0000000007480000-0x0000000007490000-memory.dmp

            Filesize

            64KB

          • memory/724-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

            Filesize

            408KB

          • memory/724-956-0x000000000AF60000-0x000000000AFF2000-memory.dmp

            Filesize

            584KB

          • memory/724-957-0x000000000B030000-0x000000000B0A6000-memory.dmp

            Filesize

            472KB

          • memory/724-958-0x000000000B100000-0x000000000B2C2000-memory.dmp

            Filesize

            1.8MB

          • memory/724-959-0x000000000B320000-0x000000000B84C000-memory.dmp

            Filesize

            5.2MB

          • memory/724-960-0x000000000B920000-0x000000000B93E000-memory.dmp

            Filesize

            120KB

          • memory/724-961-0x00000000049D0000-0x0000000004A20000-memory.dmp

            Filesize

            320KB

          • memory/2076-968-0x00000000004D0000-0x00000000004F8000-memory.dmp

            Filesize

            160KB

          • memory/2076-969-0x0000000007590000-0x00000000075A0000-memory.dmp

            Filesize

            64KB

          • memory/4668-147-0x00000000004A0000-0x00000000004AA000-memory.dmp

            Filesize

            40KB