Analysis

  • max time kernel
    99s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 02:32

General

  • Target

    467e8627b9c29838ebaa79480d700c95da8285f0c2407bf33d6aef444f5f338d.exe

  • Size

    703KB

  • MD5

    b51404172e64336c5a4d8bf8dfdb1c22

  • SHA1

    f0d60f1735883ae7d4099f5e111afb63fe8b73b5

  • SHA256

    467e8627b9c29838ebaa79480d700c95da8285f0c2407bf33d6aef444f5f338d

  • SHA512

    9674eeaed73b9b797ede2ae646e71e6f0228fb2593b406f5a98b8e3caf92e637348f560f5c5da76f3d2fdaccc485baa107c8d75c0eb20f246a8ccdf3171b7f1e

  • SSDEEP

    12288:Uy90hWHHiDtmoXkXPt9+sY0bc5bNJaNoHJJ35phJTjFfn1BRudIJj+tx:Uy2MCpJsY0WcNopJ3RL9zq

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\467e8627b9c29838ebaa79480d700c95da8285f0c2407bf33d6aef444f5f338d.exe
    "C:\Users\Admin\AppData\Local\Temp\467e8627b9c29838ebaa79480d700c95da8285f0c2407bf33d6aef444f5f338d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214439.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214439.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr219973.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr219973.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1084
          4⤵
          • Program crash
          PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu001121.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu001121.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1320
          4⤵
          • Program crash
          PID:5072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060275.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060275.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1364
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2140 -ip 2140
    1⤵
      PID:4808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1860 -ip 1860
      1⤵
        PID:4500

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060275.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060275.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214439.exe

        Filesize

        548KB

        MD5

        2e895d27d72d3cd069016c53442eafde

        SHA1

        3b3c0384ff0084d460137ff5802aec48903685af

        SHA256

        e8ffabd4158d0a14743751177da5cb0c7e315ec4e8f532ea16e2cefafba9cb51

        SHA512

        bc90f1ec6e9f28233a7eaf8b119595f28e4db53f73567db689a9269ffeefe6b10b2229cb1fa525ee14b366f3893cb9ac5a83b5b0f3e557a6b52036814f60b017

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214439.exe

        Filesize

        548KB

        MD5

        2e895d27d72d3cd069016c53442eafde

        SHA1

        3b3c0384ff0084d460137ff5802aec48903685af

        SHA256

        e8ffabd4158d0a14743751177da5cb0c7e315ec4e8f532ea16e2cefafba9cb51

        SHA512

        bc90f1ec6e9f28233a7eaf8b119595f28e4db53f73567db689a9269ffeefe6b10b2229cb1fa525ee14b366f3893cb9ac5a83b5b0f3e557a6b52036814f60b017

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr219973.exe

        Filesize

        276KB

        MD5

        4d2a80a4c9b1404d3a1e9b6e7a4f4224

        SHA1

        b2860429c280881eed8236ccdb97b5c864308e30

        SHA256

        d4e4b11cc0573e7e7ebed2b0e9225aa63b4fc48dd62610460193f1ce0fcb5b14

        SHA512

        04c42a0e6b479454b477e2057b975316aabf2f9387dcfd27af556332ae251cafd8cb0e0459aa0c0c6cfea2802adb98d2b40b7c64f6f76097f202683f47ce8bf1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr219973.exe

        Filesize

        276KB

        MD5

        4d2a80a4c9b1404d3a1e9b6e7a4f4224

        SHA1

        b2860429c280881eed8236ccdb97b5c864308e30

        SHA256

        d4e4b11cc0573e7e7ebed2b0e9225aa63b4fc48dd62610460193f1ce0fcb5b14

        SHA512

        04c42a0e6b479454b477e2057b975316aabf2f9387dcfd27af556332ae251cafd8cb0e0459aa0c0c6cfea2802adb98d2b40b7c64f6f76097f202683f47ce8bf1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu001121.exe

        Filesize

        353KB

        MD5

        a51c3a46ca6f53b4f4e68be71048d06c

        SHA1

        bdd1ebf5c49cdfcd95713ba13cc005a29a367549

        SHA256

        54d681c265e2489c6e6dc65816d808c59d351cc60bd108b03eee5b78987c59b6

        SHA512

        5962c83c390de329c67d15add3b6812076829103fe4ea5d7c3bde01628e78a40757658d1d8fc686f285b80170ffdd3a3039802dccc4726cc1a1d5c8a621fc6dc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu001121.exe

        Filesize

        353KB

        MD5

        a51c3a46ca6f53b4f4e68be71048d06c

        SHA1

        bdd1ebf5c49cdfcd95713ba13cc005a29a367549

        SHA256

        54d681c265e2489c6e6dc65816d808c59d351cc60bd108b03eee5b78987c59b6

        SHA512

        5962c83c390de329c67d15add3b6812076829103fe4ea5d7c3bde01628e78a40757658d1d8fc686f285b80170ffdd3a3039802dccc4726cc1a1d5c8a621fc6dc

      • memory/1364-1004-0x0000000007DD0000-0x0000000007DE0000-memory.dmp

        Filesize

        64KB

      • memory/1364-1003-0x0000000000BE0000-0x0000000000C08000-memory.dmp

        Filesize

        160KB

      • memory/1860-227-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-987-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/1860-997-0x0000000004820000-0x0000000004870000-memory.dmp

        Filesize

        320KB

      • memory/1860-996-0x000000000B380000-0x000000000B8AC000-memory.dmp

        Filesize

        5.2MB

      • memory/1860-995-0x000000000B1B0000-0x000000000B372000-memory.dmp

        Filesize

        1.8MB

      • memory/1860-994-0x000000000AF90000-0x000000000AFAE000-memory.dmp

        Filesize

        120KB

      • memory/1860-993-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/1860-992-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/1860-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/1860-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/1860-989-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1860-988-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/1860-986-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

        Filesize

        6.1MB

      • memory/1860-225-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-221-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1860-223-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-220-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1860-218-0x0000000002C00000-0x0000000002C46000-memory.dmp

        Filesize

        280KB

      • memory/1860-219-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-216-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-214-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-191-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-192-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-194-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-196-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-198-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-200-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-202-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-204-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-206-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-208-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-210-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/1860-212-0x00000000071C0000-0x00000000071F5000-memory.dmp

        Filesize

        212KB

      • memory/2140-177-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-183-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-155-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-185-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-175-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-184-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-181-0x0000000000400000-0x0000000002BAE000-memory.dmp

        Filesize

        39.7MB

      • memory/2140-173-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-153-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-179-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-157-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-178-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-186-0x0000000000400000-0x0000000002BAE000-memory.dmp

        Filesize

        39.7MB

      • memory/2140-159-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-180-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/2140-171-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-169-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-167-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-165-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-163-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-161-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-151-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-150-0x00000000076D0000-0x00000000076E2000-memory.dmp

        Filesize

        72KB

      • memory/2140-149-0x0000000007120000-0x00000000076C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2140-148-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

        Filesize

        180KB