Analysis

  • max time kernel
    49s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-04-2023 21:04

General

  • Target

    abadacb69f3dfddf36cc1d9ccc311e402ba2dd1510c49b18cde67c324fe6800a.exe

  • Size

    698KB

  • MD5

    2de8c0e5d1e55e02b2f0fc007aa5711a

  • SHA1

    47badc1f27b472600b4eb07ee0adaaaddcfc9f79

  • SHA256

    abadacb69f3dfddf36cc1d9ccc311e402ba2dd1510c49b18cde67c324fe6800a

  • SHA512

    be0a81295dcdeaba603f9d521f432b67c5d2624881c9f8d48f6367d271dfcc685783d488fba06341aa3278cf07e6f39725466b443a82a6448bafee688c907fa4

  • SSDEEP

    12288:uy90NNSsEKZh9pTnHO2x7U7HZMefBwj79uY4EcYnelmXfOT:uyzlK3uMRVuYVqMc

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abadacb69f3dfddf36cc1d9ccc311e402ba2dd1510c49b18cde67c324fe6800a.exe
    "C:\Users\Admin\AppData\Local\Temp\abadacb69f3dfddf36cc1d9ccc311e402ba2dd1510c49b18cde67c324fe6800a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un349744.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un349744.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr745874.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr745874.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu716935.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu716935.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501631.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501631.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501631.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501631.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un349744.exe

    Filesize

    543KB

    MD5

    6b0e31371e847eaff9e6fed589d368cc

    SHA1

    1b646876dd5b128e2e7c7aedea68de9817cbeb38

    SHA256

    ecbd0eed160375f8e0913429669f2a93bf3803e45ed32abbb12a40597f75d4e0

    SHA512

    90e71d0444878966b73e7d8d86b9165b7b3b278b4221e24f72cae05616b6b8ebfa451f00e46fa54ab73d30c04570fbf10d89b305438f50dc3901b2818e1fecfe

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un349744.exe

    Filesize

    543KB

    MD5

    6b0e31371e847eaff9e6fed589d368cc

    SHA1

    1b646876dd5b128e2e7c7aedea68de9817cbeb38

    SHA256

    ecbd0eed160375f8e0913429669f2a93bf3803e45ed32abbb12a40597f75d4e0

    SHA512

    90e71d0444878966b73e7d8d86b9165b7b3b278b4221e24f72cae05616b6b8ebfa451f00e46fa54ab73d30c04570fbf10d89b305438f50dc3901b2818e1fecfe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr745874.exe

    Filesize

    269KB

    MD5

    1c0bbe3b9364be8da055ee12e3a1da09

    SHA1

    95390de15f6582a9a488f7672ced7e5196ee5650

    SHA256

    0b7d1c2ab018112927e0348a0b0b083bbd51d990533b1c009f6b588ecae64ec0

    SHA512

    4f0da6834a5d9c702f265b119c899077c3e8e1ab665ffebd3bc0b6b16a641c25d8c626d70156ace776647fa270df5376a8482cabb5af27a6ec20e6a9cf369efd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr745874.exe

    Filesize

    269KB

    MD5

    1c0bbe3b9364be8da055ee12e3a1da09

    SHA1

    95390de15f6582a9a488f7672ced7e5196ee5650

    SHA256

    0b7d1c2ab018112927e0348a0b0b083bbd51d990533b1c009f6b588ecae64ec0

    SHA512

    4f0da6834a5d9c702f265b119c899077c3e8e1ab665ffebd3bc0b6b16a641c25d8c626d70156ace776647fa270df5376a8482cabb5af27a6ec20e6a9cf369efd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu716935.exe

    Filesize

    351KB

    MD5

    c4e384d0755354e586b7055556ee86c7

    SHA1

    2aef0e3ee218f49e1654b7eb291b25ab6fa68cab

    SHA256

    aa9c716cbefc42f002ca1cdeced8d9a11867745f980aa3023c5e0bc317fd447c

    SHA512

    79c458b62adec6039f000be8f5c9cf939d2343f47b34380582a94479478f89168fb6ddd521a604b08b9a421c45dabe6631091bb520f5560be5e4796a7c53ad57

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu716935.exe

    Filesize

    351KB

    MD5

    c4e384d0755354e586b7055556ee86c7

    SHA1

    2aef0e3ee218f49e1654b7eb291b25ab6fa68cab

    SHA256

    aa9c716cbefc42f002ca1cdeced8d9a11867745f980aa3023c5e0bc317fd447c

    SHA512

    79c458b62adec6039f000be8f5c9cf939d2343f47b34380582a94479478f89168fb6ddd521a604b08b9a421c45dabe6631091bb520f5560be5e4796a7c53ad57

  • memory/2556-148-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-158-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-138-0x00000000049C0000-0x00000000049D8000-memory.dmp

    Filesize

    96KB

  • memory/2556-141-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-142-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2556-140-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-143-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-144-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-146-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-136-0x0000000002E70000-0x0000000002E8A000-memory.dmp

    Filesize

    104KB

  • memory/2556-150-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-152-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-154-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-156-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-137-0x0000000007280000-0x000000000777E000-memory.dmp

    Filesize

    5.0MB

  • memory/2556-160-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-162-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-164-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-166-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-168-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-170-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/2556-171-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/2556-172-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-174-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-173-0x0000000002E00000-0x0000000002E10000-memory.dmp

    Filesize

    64KB

  • memory/2556-176-0x0000000000400000-0x0000000002BAD000-memory.dmp

    Filesize

    39.7MB

  • memory/3988-998-0x0000000000BA0000-0x0000000000BC8000-memory.dmp

    Filesize

    160KB

  • memory/3988-999-0x0000000007950000-0x000000000799B000-memory.dmp

    Filesize

    300KB

  • memory/3988-1000-0x00000000078C0000-0x00000000078D0000-memory.dmp

    Filesize

    64KB

  • memory/4400-181-0x0000000004B40000-0x0000000004B7C000-memory.dmp

    Filesize

    240KB

  • memory/4400-183-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-186-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-188-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-190-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-192-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-193-0x0000000002DD0000-0x0000000002E16000-memory.dmp

    Filesize

    280KB

  • memory/4400-194-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4400-197-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4400-196-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-199-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4400-202-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-200-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-204-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-206-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-210-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-208-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-212-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-214-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-218-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-216-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-220-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-979-0x0000000009BD0000-0x000000000A1D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4400-980-0x000000000A210000-0x000000000A222000-memory.dmp

    Filesize

    72KB

  • memory/4400-981-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4400-982-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/4400-983-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/4400-984-0x000000000A3E0000-0x000000000A42B000-memory.dmp

    Filesize

    300KB

  • memory/4400-985-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4400-986-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4400-987-0x000000000AED0000-0x000000000AF20000-memory.dmp

    Filesize

    320KB

  • memory/4400-988-0x000000000AF40000-0x000000000AFB6000-memory.dmp

    Filesize

    472KB

  • memory/4400-184-0x0000000004CF0000-0x0000000004D25000-memory.dmp

    Filesize

    212KB

  • memory/4400-182-0x0000000004CF0000-0x0000000004D2A000-memory.dmp

    Filesize

    232KB

  • memory/4400-990-0x000000000B020000-0x000000000B1E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4400-991-0x000000000B1F0000-0x000000000B71C000-memory.dmp

    Filesize

    5.2MB

  • memory/4400-992-0x000000000B830000-0x000000000B84E000-memory.dmp

    Filesize

    120KB