Analysis

  • max time kernel
    84s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 00:55

General

  • Target

    775af528b9b4a11979a06e1d353820acf983a6bb53b986b786f8f83fb462c810.exe

  • Size

    559KB

  • MD5

    80e28293a774fe80a20f7aea2e30e0f0

  • SHA1

    f87e4d81e5407ea2ecc56251ba6bd18fb47c007f

  • SHA256

    775af528b9b4a11979a06e1d353820acf983a6bb53b986b786f8f83fb462c810

  • SHA512

    74ef889a96208e9d1dd603d285e8e08d87fdd1d9e5bb0977f35be4d07bded42f8a55454533bfbc72e5c5b9869c27f4cfd0a016957f1cf743193c9108d59a9acd

  • SSDEEP

    12288:7y900Z2t52xVTZGGuVH6uCqEci/4n/2kKjsw7l:7yxZTuCHUKAG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\775af528b9b4a11979a06e1d353820acf983a6bb53b986b786f8f83fb462c810.exe
    "C:\Users\Admin\AppData\Local\Temp\775af528b9b4a11979a06e1d353820acf983a6bb53b986b786f8f83fb462c810.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioB5546.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioB5546.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it569797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it569797.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp309891.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp309891.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 1328
          4⤵
          • Program crash
          PID:620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr761934.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr761934.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3100 -ip 3100
    1⤵
      PID:4496

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr761934.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr761934.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioB5546.exe

      Filesize

      405KB

      MD5

      59a4df1887b72ed5a8806c1ac473f0d4

      SHA1

      b7cffea342e88dca9971b3466a7c19ed59eae902

      SHA256

      47d6cef8f2ef1cf86b818c62333ead3d9f0b5ab61066adf7ce16db2498a293a8

      SHA512

      faf90953cbd5e97c9887c80a1a14493c2cbc42173fd70e620e0a728af88e4ac5211bd6885b5a718594b2b35806ec95aba5929339a851bc0d6d1fd28047392f67

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioB5546.exe

      Filesize

      405KB

      MD5

      59a4df1887b72ed5a8806c1ac473f0d4

      SHA1

      b7cffea342e88dca9971b3466a7c19ed59eae902

      SHA256

      47d6cef8f2ef1cf86b818c62333ead3d9f0b5ab61066adf7ce16db2498a293a8

      SHA512

      faf90953cbd5e97c9887c80a1a14493c2cbc42173fd70e620e0a728af88e4ac5211bd6885b5a718594b2b35806ec95aba5929339a851bc0d6d1fd28047392f67

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it569797.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it569797.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp309891.exe

      Filesize

      351KB

      MD5

      2a9f16a7f59231a83f753b0dff00358e

      SHA1

      c8fa86afe45f1bd882916b0fc717c8f1317753b8

      SHA256

      66200c1a40a61320978bdc6f3afc96d5b1c0f58c9b66f4ecef8d8c58b2d6943e

      SHA512

      8d29a3a6fa0d6af554efb1be168dc5a888d617402c655b8f876b6a5bed4d1076d123326f865d83cbf56d0623a42fc76d6d09d9e28ff2fdbe0295a6eb1bbbd732

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp309891.exe

      Filesize

      351KB

      MD5

      2a9f16a7f59231a83f753b0dff00358e

      SHA1

      c8fa86afe45f1bd882916b0fc717c8f1317753b8

      SHA256

      66200c1a40a61320978bdc6f3afc96d5b1c0f58c9b66f4ecef8d8c58b2d6943e

      SHA512

      8d29a3a6fa0d6af554efb1be168dc5a888d617402c655b8f876b6a5bed4d1076d123326f865d83cbf56d0623a42fc76d6d09d9e28ff2fdbe0295a6eb1bbbd732

    • memory/544-147-0x00000000002A0000-0x00000000002AA000-memory.dmp

      Filesize

      40KB

    • memory/2412-967-0x00000000002F0000-0x0000000000318000-memory.dmp

      Filesize

      160KB

    • memory/2412-968-0x00000000070E0000-0x00000000070F0000-memory.dmp

      Filesize

      64KB

    • memory/3100-185-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-197-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-155-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-158-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-156-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-160-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-162-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-164-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-166-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-168-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-171-0x0000000007370000-0x0000000007380000-memory.dmp

      Filesize

      64KB

    • memory/3100-170-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-173-0x0000000007370000-0x0000000007380000-memory.dmp

      Filesize

      64KB

    • memory/3100-174-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-175-0x0000000007370000-0x0000000007380000-memory.dmp

      Filesize

      64KB

    • memory/3100-177-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-179-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-181-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-183-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-153-0x0000000002CE0000-0x0000000002D26000-memory.dmp

      Filesize

      280KB

    • memory/3100-187-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-189-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-191-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-193-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-195-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-154-0x0000000007380000-0x0000000007924000-memory.dmp

      Filesize

      5.6MB

    • memory/3100-199-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-201-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-203-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-205-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-207-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-209-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-211-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-213-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-215-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-217-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-219-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-221-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3100-950-0x0000000009DB0000-0x000000000A3C8000-memory.dmp

      Filesize

      6.1MB

    • memory/3100-951-0x000000000A460000-0x000000000A472000-memory.dmp

      Filesize

      72KB

    • memory/3100-952-0x000000000A480000-0x000000000A58A000-memory.dmp

      Filesize

      1.0MB

    • memory/3100-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

      Filesize

      240KB

    • memory/3100-954-0x0000000007370000-0x0000000007380000-memory.dmp

      Filesize

      64KB

    • memory/3100-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

      Filesize

      408KB

    • memory/3100-956-0x000000000AF60000-0x000000000AFF2000-memory.dmp

      Filesize

      584KB

    • memory/3100-957-0x000000000B130000-0x000000000B1A6000-memory.dmp

      Filesize

      472KB

    • memory/3100-958-0x000000000B200000-0x000000000B3C2000-memory.dmp

      Filesize

      1.8MB

    • memory/3100-959-0x000000000B3F0000-0x000000000B91C000-memory.dmp

      Filesize

      5.2MB

    • memory/3100-960-0x000000000BA20000-0x000000000BA3E000-memory.dmp

      Filesize

      120KB

    • memory/3100-961-0x0000000004B10000-0x0000000004B60000-memory.dmp

      Filesize

      320KB