Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 03:04

General

  • Target

    4816758b11cf4c1566172edb4f4f26cb387120571ae81fffff82feeb0bd126bb.exe

  • Size

    702KB

  • MD5

    db2c1d02ede8d077301bc2f70579adea

  • SHA1

    32d0d2e91e0eaf6944f4b7f04b70f1ef7a6a9fb4

  • SHA256

    4816758b11cf4c1566172edb4f4f26cb387120571ae81fffff82feeb0bd126bb

  • SHA512

    26d3fdc2d90bf9e2468b7c4ebd640e5e5647ae1868e02c8e1530772927f44110a75b3d4a8cbd34accc90ad8e7744e2353898d552b589b67e37313d3452416dd4

  • SSDEEP

    12288:cy90FLP3GTyHqdM9Ra6DkXfFYoSQKRblZ55GVZph01lFfn1B1udIJZBlOZv7:cyE2Tyra6DEfF4bP8Vxg9XdE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4816758b11cf4c1566172edb4f4f26cb387120571ae81fffff82feeb0bd126bb.exe
    "C:\Users\Admin\AppData\Local\Temp\4816758b11cf4c1566172edb4f4f26cb387120571ae81fffff82feeb0bd126bb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219034.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219034.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr283829.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr283829.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 1080
          4⤵
          • Program crash
          PID:4408
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu758200.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu758200.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 1660
          4⤵
          • Program crash
          PID:3832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076445.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076445.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4120 -ip 4120
    1⤵
      PID:1668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4188 -ip 4188
      1⤵
        PID:4412

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076445.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076445.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219034.exe

              Filesize

              548KB

              MD5

              4ccc32a1c792f9991bd373301d60728b

              SHA1

              f7717029532d431d894620f1a186352e14099f57

              SHA256

              4ecfbeaf9ebd16d2eeadd43c70c653234b29d94a614216825fb4c9d9d042bb64

              SHA512

              40e0e239455349fb61fd72463ac3f63179281dd5516ef319d886c3a283345ea28f2f71478d720b7e07be9fab38e50b40d180fdde67f2b6996eaed2485e1b9adb

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219034.exe

              Filesize

              548KB

              MD5

              4ccc32a1c792f9991bd373301d60728b

              SHA1

              f7717029532d431d894620f1a186352e14099f57

              SHA256

              4ecfbeaf9ebd16d2eeadd43c70c653234b29d94a614216825fb4c9d9d042bb64

              SHA512

              40e0e239455349fb61fd72463ac3f63179281dd5516ef319d886c3a283345ea28f2f71478d720b7e07be9fab38e50b40d180fdde67f2b6996eaed2485e1b9adb

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr283829.exe

              Filesize

              276KB

              MD5

              b991ec45210c7f6b2541c5646bba2e41

              SHA1

              6744b9936c840cca7e0936e36f49667b63102458

              SHA256

              3fc1b09718a9cfe50a031dbae8406e5daa3755ff93fa671427497e949165f80e

              SHA512

              c4018e1bc9d41ada6a566ec0245edf512c27e80b1e3ff63bc3a79f72f9bfc87229c49bcdf8c74cf530150e682f0a4d68ca08ce527d7199574de52d537a47cce6

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr283829.exe

              Filesize

              276KB

              MD5

              b991ec45210c7f6b2541c5646bba2e41

              SHA1

              6744b9936c840cca7e0936e36f49667b63102458

              SHA256

              3fc1b09718a9cfe50a031dbae8406e5daa3755ff93fa671427497e949165f80e

              SHA512

              c4018e1bc9d41ada6a566ec0245edf512c27e80b1e3ff63bc3a79f72f9bfc87229c49bcdf8c74cf530150e682f0a4d68ca08ce527d7199574de52d537a47cce6

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu758200.exe

              Filesize

              353KB

              MD5

              913341aceab3866c93952cbadd182bb4

              SHA1

              f8cfc8ae86d5789f77a1503ba64788d9c2433aae

              SHA256

              97e026348e1ae890509a3f64510e848c15e95f1da83e8ad19e5297ce3f605629

              SHA512

              ce80c247b86d4eadf7d554b5d60c13caf25f9858ae78e2f4b42b68ff725804ab63bce550febb99d2513ddbf975c71be31dfd7fc3fe2c68c4759d44eafdfa84f5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu758200.exe

              Filesize

              353KB

              MD5

              913341aceab3866c93952cbadd182bb4

              SHA1

              f8cfc8ae86d5789f77a1503ba64788d9c2433aae

              SHA256

              97e026348e1ae890509a3f64510e848c15e95f1da83e8ad19e5297ce3f605629

              SHA512

              ce80c247b86d4eadf7d554b5d60c13caf25f9858ae78e2f4b42b68ff725804ab63bce550febb99d2513ddbf975c71be31dfd7fc3fe2c68c4759d44eafdfa84f5

            • memory/4000-1005-0x0000000007BA0000-0x0000000007BB0000-memory.dmp

              Filesize

              64KB

            • memory/4000-1004-0x0000000000E80000-0x0000000000EA8000-memory.dmp

              Filesize

              160KB

            • memory/4120-159-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-173-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-151-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-153-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-155-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-157-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-149-0x00000000073A0000-0x0000000007944000-memory.dmp

              Filesize

              5.6MB

            • memory/4120-161-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-163-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-165-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-167-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-169-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-171-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-150-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-175-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-177-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

              Filesize

              72KB

            • memory/4120-178-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-179-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-180-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-181-0x0000000000400000-0x0000000002BAE000-memory.dmp

              Filesize

              39.7MB

            • memory/4120-183-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-185-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-184-0x0000000007390000-0x00000000073A0000-memory.dmp

              Filesize

              64KB

            • memory/4120-186-0x0000000000400000-0x0000000002BAE000-memory.dmp

              Filesize

              39.7MB

            • memory/4120-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

              Filesize

              180KB

            • memory/4188-191-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-194-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-196-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-198-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-200-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-201-0x0000000002CE0000-0x0000000002D26000-memory.dmp

              Filesize

              280KB

            • memory/4188-204-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/4188-206-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/4188-210-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-208-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/4188-207-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-203-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-212-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-214-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-218-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-220-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-216-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-222-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-224-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-226-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-228-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-987-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

              Filesize

              6.1MB

            • memory/4188-988-0x000000000A320000-0x000000000A332000-memory.dmp

              Filesize

              72KB

            • memory/4188-989-0x000000000A340000-0x000000000A44A000-memory.dmp

              Filesize

              1.0MB

            • memory/4188-990-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/4188-991-0x000000000A460000-0x000000000A49C000-memory.dmp

              Filesize

              240KB

            • memory/4188-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

              Filesize

              408KB

            • memory/4188-993-0x000000000AF60000-0x000000000AFF2000-memory.dmp

              Filesize

              584KB

            • memory/4188-994-0x000000000B030000-0x000000000B0A6000-memory.dmp

              Filesize

              472KB

            • memory/4188-995-0x000000000B110000-0x000000000B2D2000-memory.dmp

              Filesize

              1.8MB

            • memory/4188-192-0x0000000004E30000-0x0000000004E65000-memory.dmp

              Filesize

              212KB

            • memory/4188-996-0x000000000B2E0000-0x000000000B80C000-memory.dmp

              Filesize

              5.2MB

            • memory/4188-997-0x000000000B920000-0x000000000B93E000-memory.dmp

              Filesize

              120KB

            • memory/4188-998-0x0000000004C80000-0x0000000004CD0000-memory.dmp

              Filesize

              320KB