Analysis

  • max time kernel
    88s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 04:56

General

  • Target

    8845a4d0e5accecedfb1c2f9d2b3278dbbf8007b49f39304551f573ef59193e1.exe

  • Size

    707KB

  • MD5

    b17fb1dc2118641c9769074d2b856bab

  • SHA1

    0f08e7f20dceba9601a7f1c4c760f4a4e130ae62

  • SHA256

    8845a4d0e5accecedfb1c2f9d2b3278dbbf8007b49f39304551f573ef59193e1

  • SHA512

    082fc77fbf6f5b726d8e8fa908e46c528c45f5647583025c65ed11816ffc9c5fed31ca2984e92b25810c5ec09e88f1d63e0b16e49ee0cafc64d2ca73d3d75ddd

  • SSDEEP

    12288:Dy90O4mgwveG/4frv/DQdZlDpPcATj/FGEypBONqFTn16quTVJSdwu1lR:DybpvX/ckmMj/IEaXRZX1lR

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8845a4d0e5accecedfb1c2f9d2b3278dbbf8007b49f39304551f573ef59193e1.exe
    "C:\Users\Admin\AppData\Local\Temp\8845a4d0e5accecedfb1c2f9d2b3278dbbf8007b49f39304551f573ef59193e1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896023.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896023.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr740566.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr740566.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 1012
          4⤵
          • Program crash
          PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu711559.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu711559.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 1776
          4⤵
          • Program crash
          PID:1084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si718161.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si718161.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2084 -ip 2084
    1⤵
      PID:4708
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1448 -ip 1448
      1⤵
        PID:3420

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si718161.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si718161.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896023.exe

              Filesize

              552KB

              MD5

              2569da3becf18c65042cfb8d262b976f

              SHA1

              f60f5bf38a41ef8607c44d1247faed1a9509a979

              SHA256

              75454606f19c480ca70fded25c9f0bea5402f212fc67b4e6852448cc78ab0c4b

              SHA512

              681efae47728f4ac9ecbe0b3c9315b1bba0892c17d5ffb8f17090835a069a59b0ab60a109d19cfa380765ca7efa08ac9784ff9c97a9c296dca5b1e535cf4c5cc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896023.exe

              Filesize

              552KB

              MD5

              2569da3becf18c65042cfb8d262b976f

              SHA1

              f60f5bf38a41ef8607c44d1247faed1a9509a979

              SHA256

              75454606f19c480ca70fded25c9f0bea5402f212fc67b4e6852448cc78ab0c4b

              SHA512

              681efae47728f4ac9ecbe0b3c9315b1bba0892c17d5ffb8f17090835a069a59b0ab60a109d19cfa380765ca7efa08ac9784ff9c97a9c296dca5b1e535cf4c5cc

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr740566.exe

              Filesize

              283KB

              MD5

              46370191f30af52558654474f1fea2a9

              SHA1

              5802be383d748ca290cf3fdbb4a3050aa4342661

              SHA256

              2ca0e76459c3b88b2b807573bb1ab285556d82d365e11fa72868d7d507de08e8

              SHA512

              889e5409d8ec93fdd5539326453948fcf8386c758ae355c75e8107a478ba811bfc11369a349a866c4b7a7482141ed977e5c5909ae354b3a1827c844b07f13898

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr740566.exe

              Filesize

              283KB

              MD5

              46370191f30af52558654474f1fea2a9

              SHA1

              5802be383d748ca290cf3fdbb4a3050aa4342661

              SHA256

              2ca0e76459c3b88b2b807573bb1ab285556d82d365e11fa72868d7d507de08e8

              SHA512

              889e5409d8ec93fdd5539326453948fcf8386c758ae355c75e8107a478ba811bfc11369a349a866c4b7a7482141ed977e5c5909ae354b3a1827c844b07f13898

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu711559.exe

              Filesize

              353KB

              MD5

              2ce30c5718a9dcca26476c95725a881e

              SHA1

              6fbedd06f5a0a7c24a2b39ff4f51196471c6e5d9

              SHA256

              0cfd6baeb272e5210816228918f74a56e84d780460068b86af0eab3565366570

              SHA512

              5ff6567eaecb222bd3bd85a7398b336d5169d23f1dcff9931cd3941dfce4fdb7189026a172d03db6e2ae14498f3f435c3e329d03787232cc0ce9b7ac91aceeac

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu711559.exe

              Filesize

              353KB

              MD5

              2ce30c5718a9dcca26476c95725a881e

              SHA1

              6fbedd06f5a0a7c24a2b39ff4f51196471c6e5d9

              SHA256

              0cfd6baeb272e5210816228918f74a56e84d780460068b86af0eab3565366570

              SHA512

              5ff6567eaecb222bd3bd85a7398b336d5169d23f1dcff9931cd3941dfce4fdb7189026a172d03db6e2ae14498f3f435c3e329d03787232cc0ce9b7ac91aceeac

            • memory/1448-227-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-988-0x000000000A340000-0x000000000A44A000-memory.dmp

              Filesize

              1.0MB

            • memory/1448-1002-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-1001-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-1000-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-998-0x000000000BA70000-0x000000000BAC0000-memory.dmp

              Filesize

              320KB

            • memory/1448-997-0x000000000B8E0000-0x000000000B8FE000-memory.dmp

              Filesize

              120KB

            • memory/1448-996-0x000000000B2A0000-0x000000000B7CC000-memory.dmp

              Filesize

              5.2MB

            • memory/1448-995-0x000000000B0D0000-0x000000000B292000-memory.dmp

              Filesize

              1.8MB

            • memory/1448-994-0x000000000AFF0000-0x000000000B066000-memory.dmp

              Filesize

              472KB

            • memory/1448-992-0x000000000AE30000-0x000000000AEC2000-memory.dmp

              Filesize

              584KB

            • memory/1448-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

              Filesize

              408KB

            • memory/1448-990-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-989-0x000000000A460000-0x000000000A49C000-memory.dmp

              Filesize

              240KB

            • memory/1448-987-0x000000000A320000-0x000000000A332000-memory.dmp

              Filesize

              72KB

            • memory/1448-986-0x0000000009C90000-0x000000000A2A8000-memory.dmp

              Filesize

              6.1MB

            • memory/1448-225-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-223-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-221-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-219-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-217-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-214-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-190-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-191-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-193-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-195-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-197-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-199-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-201-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-203-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-205-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-208-0x00000000045C0000-0x0000000004606000-memory.dmp

              Filesize

              280KB

            • memory/1448-210-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-211-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-207-0x0000000004C30000-0x0000000004C65000-memory.dmp

              Filesize

              212KB

            • memory/1448-213-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1448-215-0x0000000007350000-0x0000000007360000-memory.dmp

              Filesize

              64KB

            • memory/1932-1007-0x0000000000DF0000-0x0000000000E18000-memory.dmp

              Filesize

              160KB

            • memory/1932-1008-0x0000000007B20000-0x0000000007B30000-memory.dmp

              Filesize

              64KB

            • memory/2084-174-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-179-0x00000000073F0000-0x0000000007400000-memory.dmp

              Filesize

              64KB

            • memory/2084-182-0x00000000073F0000-0x0000000007400000-memory.dmp

              Filesize

              64KB

            • memory/2084-181-0x0000000000400000-0x0000000002BB0000-memory.dmp

              Filesize

              39.7MB

            • memory/2084-150-0x0000000007400000-0x00000000079A4000-memory.dmp

              Filesize

              5.6MB

            • memory/2084-180-0x00000000073F0000-0x0000000007400000-memory.dmp

              Filesize

              64KB

            • memory/2084-172-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-154-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-178-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-176-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-184-0x00000000073F0000-0x0000000007400000-memory.dmp

              Filesize

              64KB

            • memory/2084-151-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-162-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-168-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-166-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-164-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-170-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-160-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-158-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-156-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB

            • memory/2084-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

              Filesize

              180KB

            • memory/2084-149-0x00000000073F0000-0x0000000007400000-memory.dmp

              Filesize

              64KB

            • memory/2084-185-0x0000000000400000-0x0000000002BB0000-memory.dmp

              Filesize

              39.7MB

            • memory/2084-152-0x0000000007250000-0x0000000007262000-memory.dmp

              Filesize

              72KB