Analysis

  • max time kernel
    34s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2023, 20:56

General

  • Target

    cca0a3cf478390927fca3d3f96c4c4f0.exe

  • Size

    559KB

  • MD5

    cca0a3cf478390927fca3d3f96c4c4f0

  • SHA1

    e407300634fbfe1924ce50ad3b70f91f642381f5

  • SHA256

    ac1f8cadff78a0040afad6ddd10f23e001c2b8a4dab4f6d0a3537d3ce1198240

  • SHA512

    26afaffdc305616516424e5724c5dfa45342f78f0f26faacaf3aa218682def8866419a5f02b3a3f1962e6a1bf440b8d55af431750f77dda9b8bf7cd9f10be24e

  • SSDEEP

    12288:sy901D7Z1XlRulcN78k16uSeEcb/EafMc3X:syoR1yly72uSjxKX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cca0a3cf478390927fca3d3f96c4c4f0.exe
    "C:\Users\Admin\AppData\Local\Temp\cca0a3cf478390927fca3d3f96c4c4f0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it746360.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it746360.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:528

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe

          Filesize

          405KB

          MD5

          8a9ca168f779eb777c9bd7c7929459c5

          SHA1

          77f9340c10b9a99f131d332ce32c4b0acb42ff5c

          SHA256

          711654d82768cc1a08da0550b094dc7a3a3de6835354ed0e6928288580ec2f32

          SHA512

          56b2625b925180027a760fa0ca0bd056efc1d579a49517d4d150da86b1144f495fb88b935abfb3906cd57c006ccf83249ea013567e158f6f5d1400360166e358

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe

          Filesize

          405KB

          MD5

          8a9ca168f779eb777c9bd7c7929459c5

          SHA1

          77f9340c10b9a99f131d332ce32c4b0acb42ff5c

          SHA256

          711654d82768cc1a08da0550b094dc7a3a3de6835354ed0e6928288580ec2f32

          SHA512

          56b2625b925180027a760fa0ca0bd056efc1d579a49517d4d150da86b1144f495fb88b935abfb3906cd57c006ccf83249ea013567e158f6f5d1400360166e358

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it746360.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it746360.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421982.exe

          Filesize

          136KB

          MD5

          49650cdcdc358bb2770f0062abeef88c

          SHA1

          d6f7ec7758e9a80700b81bc7a549838ba99aacac

          SHA256

          79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

          SHA512

          7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe

          Filesize

          405KB

          MD5

          8a9ca168f779eb777c9bd7c7929459c5

          SHA1

          77f9340c10b9a99f131d332ce32c4b0acb42ff5c

          SHA256

          711654d82768cc1a08da0550b094dc7a3a3de6835354ed0e6928288580ec2f32

          SHA512

          56b2625b925180027a760fa0ca0bd056efc1d579a49517d4d150da86b1144f495fb88b935abfb3906cd57c006ccf83249ea013567e158f6f5d1400360166e358

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zinD3244.exe

          Filesize

          405KB

          MD5

          8a9ca168f779eb777c9bd7c7929459c5

          SHA1

          77f9340c10b9a99f131d332ce32c4b0acb42ff5c

          SHA256

          711654d82768cc1a08da0550b094dc7a3a3de6835354ed0e6928288580ec2f32

          SHA512

          56b2625b925180027a760fa0ca0bd056efc1d579a49517d4d150da86b1144f495fb88b935abfb3906cd57c006ccf83249ea013567e158f6f5d1400360166e358

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\it746360.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp692460.exe

          Filesize

          351KB

          MD5

          49e20200e8acf5756bd814407b399411

          SHA1

          c5927b6209879a33ecb17fa0475b0c652e79d881

          SHA256

          8dae9363bed40904c80da095ef5add386750445e4cd9e8d28b83c9532944753f

          SHA512

          90b8cd592f50da16a2655bc3e3d056ad36ecebc77a67dda91a57ca27a1578aee9b4d3fe8a3aed04464cb4d825f49e219de79b2a0da4fdf8704fc799a22b522f3

        • memory/528-889-0x00000000072F0000-0x0000000007330000-memory.dmp

          Filesize

          256KB

        • memory/528-888-0x0000000000FB0000-0x0000000000FD8000-memory.dmp

          Filesize

          160KB

        • memory/740-107-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-127-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-97-0x0000000002BD0000-0x0000000002C16000-memory.dmp

          Filesize

          280KB

        • memory/740-96-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-98-0x0000000007140000-0x0000000007180000-memory.dmp

          Filesize

          256KB

        • memory/740-100-0x0000000007140000-0x0000000007180000-memory.dmp

          Filesize

          256KB

        • memory/740-101-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-103-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-105-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-92-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-109-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-111-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-113-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-115-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-117-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-119-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-121-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-123-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-125-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-94-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-129-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-131-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-133-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-135-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-137-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-139-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-141-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-143-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-145-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-147-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-149-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-151-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-880-0x0000000007140000-0x0000000007180000-memory.dmp

          Filesize

          256KB

        • memory/740-90-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-88-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-86-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-85-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/740-84-0x0000000007180000-0x00000000071BA000-memory.dmp

          Filesize

          232KB

        • memory/740-83-0x00000000048D0000-0x000000000490C000-memory.dmp

          Filesize

          240KB

        • memory/1444-72-0x0000000001340000-0x000000000134A000-memory.dmp

          Filesize

          40KB