Analysis

  • max time kernel
    86s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/04/2023, 04:34

General

  • Target

    d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe

  • Size

    706KB

  • MD5

    884fdfda3a310db4e265690a8583f5b8

  • SHA1

    5e4d20d83835d4ea7a362cf987c5a4da5d38befc

  • SHA256

    d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83

  • SHA512

    1c380db8820ab521d3dd41deffb1c37edbe6d71385d86f92586d5d2602762b0fc8f60113406e263cd47a0399c5f5d17b67c9f94e90414d4c8701b57904b4db8a

  • SSDEEP

    12288:Yy909q8q8oLqwBuXt4xSpemfvdZyhnEPjmGeUpBpdyFTn1wquFVJ0vbovGVSmdr:YytP8IqwE4YpenMteAaRXpkvGVSm5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe
    "C:\Users\Admin\AppData\Local\Temp\d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exe

    Filesize

    552KB

    MD5

    ec9d8cf1ad79c68df11fd617caac2556

    SHA1

    417bcd9ac76003bff19acdebeadf0697407bcbb3

    SHA256

    7f3349e4446c055776c7be835b2cb6743c2468ec42f5d644355aee141d77d2de

    SHA512

    a1f9ec74dabe5bfc40bb75aa3ea65034f944976e556f9799bf292242f1eb12bb6db0de4b1cebcb4ffd9723945954abe69f297ba585116f8fed57e0d46d723bbe

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exe

    Filesize

    552KB

    MD5

    ec9d8cf1ad79c68df11fd617caac2556

    SHA1

    417bcd9ac76003bff19acdebeadf0697407bcbb3

    SHA256

    7f3349e4446c055776c7be835b2cb6743c2468ec42f5d644355aee141d77d2de

    SHA512

    a1f9ec74dabe5bfc40bb75aa3ea65034f944976e556f9799bf292242f1eb12bb6db0de4b1cebcb4ffd9723945954abe69f297ba585116f8fed57e0d46d723bbe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exe

    Filesize

    283KB

    MD5

    8cc48bf2d5853d38efba532b8b2fb0ad

    SHA1

    028c9d675a881cedc1f4126a752a2b20fe7c2212

    SHA256

    8db41da5db760a7bcfe3dcd115d879db9c955574267e5c6f7fd721c1d31946d8

    SHA512

    a248f482870f8d5820d44528042302117bc34b76cc49ac5af1b502f45bd03a5b93beea99f3181bfc3b554d422ff117d86fa1269fc7424ee7469b849be5a1979a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exe

    Filesize

    283KB

    MD5

    8cc48bf2d5853d38efba532b8b2fb0ad

    SHA1

    028c9d675a881cedc1f4126a752a2b20fe7c2212

    SHA256

    8db41da5db760a7bcfe3dcd115d879db9c955574267e5c6f7fd721c1d31946d8

    SHA512

    a248f482870f8d5820d44528042302117bc34b76cc49ac5af1b502f45bd03a5b93beea99f3181bfc3b554d422ff117d86fa1269fc7424ee7469b849be5a1979a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exe

    Filesize

    353KB

    MD5

    adc792f623fcfe74c806681ffb66b993

    SHA1

    fc53ace7838c1e5f9ecedc23c0b8eb302b4a429c

    SHA256

    b6f8a2e101402c7dbc6650954ff87ed322c9c7dc14a433fe45f95bdefadce191

    SHA512

    2154d9f0338652ddebacf9a971a972e8d07ba2d955bd92e6f01956115c80a9965f0c479368afbe3be5233657a0d0b5954af06a224e2e23b99fd7abeecf16fc75

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exe

    Filesize

    353KB

    MD5

    adc792f623fcfe74c806681ffb66b993

    SHA1

    fc53ace7838c1e5f9ecedc23c0b8eb302b4a429c

    SHA256

    b6f8a2e101402c7dbc6650954ff87ed322c9c7dc14a433fe45f95bdefadce191

    SHA512

    2154d9f0338652ddebacf9a971a972e8d07ba2d955bd92e6f01956115c80a9965f0c479368afbe3be5233657a0d0b5954af06a224e2e23b99fd7abeecf16fc75

  • memory/2128-996-0x0000000000DE0000-0x0000000000E08000-memory.dmp

    Filesize

    160KB

  • memory/2128-997-0x0000000007B60000-0x0000000007BAB000-memory.dmp

    Filesize

    300KB

  • memory/2128-998-0x0000000007BD0000-0x0000000007BE0000-memory.dmp

    Filesize

    64KB

  • memory/2988-146-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-158-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-140-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/2988-141-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/2988-142-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/2988-144-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-143-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-138-0x0000000004870000-0x0000000004888000-memory.dmp

    Filesize

    96KB

  • memory/2988-148-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-150-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-152-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-154-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-156-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2988-160-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-162-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-164-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-166-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-168-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-170-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2988-171-0x0000000000400000-0x0000000002BB0000-memory.dmp

    Filesize

    39.7MB

  • memory/2988-174-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/2988-173-0x0000000000400000-0x0000000002BB0000-memory.dmp

    Filesize

    39.7MB

  • memory/2988-137-0x0000000007390000-0x000000000788E000-memory.dmp

    Filesize

    5.0MB

  • memory/2988-136-0x0000000002F70000-0x0000000002F8A000-memory.dmp

    Filesize

    104KB

  • memory/4708-182-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-220-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/4708-184-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-186-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-188-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-190-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-192-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-194-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-196-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-198-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-200-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-202-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-204-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-206-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-208-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-210-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-212-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-214-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-218-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/4708-181-0x00000000071A0000-0x00000000071D5000-memory.dmp

    Filesize

    212KB

  • memory/4708-222-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/4708-224-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/4708-977-0x000000000A270000-0x000000000A876000-memory.dmp

    Filesize

    6.0MB

  • memory/4708-978-0x0000000007270000-0x0000000007282000-memory.dmp

    Filesize

    72KB

  • memory/4708-979-0x0000000009C60000-0x0000000009D6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4708-980-0x0000000009D70000-0x0000000009DAE000-memory.dmp

    Filesize

    248KB

  • memory/4708-981-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/4708-982-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/4708-983-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/4708-984-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4708-985-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/4708-986-0x000000000AEA0000-0x000000000AEBE000-memory.dmp

    Filesize

    120KB

  • memory/4708-180-0x00000000071A0000-0x00000000071DA000-memory.dmp

    Filesize

    232KB

  • memory/4708-179-0x0000000004BB0000-0x0000000004BEC000-memory.dmp

    Filesize

    240KB

  • memory/4708-988-0x000000000B060000-0x000000000B222000-memory.dmp

    Filesize

    1.8MB

  • memory/4708-989-0x000000000B230000-0x000000000B75C000-memory.dmp

    Filesize

    5.2MB

  • memory/4708-990-0x00000000048B0000-0x0000000004900000-memory.dmp

    Filesize

    320KB