Analysis

  • max time kernel
    60s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/04/2023, 06:11

General

  • Target

    3584de03dd852643eaa4497a6f76ad44058952b48bcb40d529fd8f5fb3fc5a5b.exe

  • Size

    565KB

  • MD5

    919e601a2b6e210eadca13c2a9b995ee

  • SHA1

    5014f6eb23de2a97d2d93632f9aa1fc1364b5209

  • SHA256

    3584de03dd852643eaa4497a6f76ad44058952b48bcb40d529fd8f5fb3fc5a5b

  • SHA512

    91bdfb7a309fa3688ca9342f2aa5614f4a8a896eec6d26439411a24401379d2f7a2ee53530607df5344317ce334299333ef5996a6ffe352ee20519d7e233de0c

  • SSDEEP

    12288:My90g9mq17ZYDyeDjdKhw5fAI9yzubbEoTdj5+:Myf9mq1Nsvqw5fAI9yzmbEoJj8

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3584de03dd852643eaa4497a6f76ad44058952b48bcb40d529fd8f5fb3fc5a5b.exe
    "C:\Users\Admin\AppData\Local\Temp\3584de03dd852643eaa4497a6f76ad44058952b48bcb40d529fd8f5fb3fc5a5b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRJ3600.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRJ3600.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it554803.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it554803.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp001404.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp001404.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594868.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594868.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594868.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRJ3600.exe

    Filesize

    411KB

    MD5

    d59df46282f02718029286dbc54cb8b2

    SHA1

    8f304c490f4268a49af9f630ade4aaeb35cf3c99

    SHA256

    9b34ad661142abdace8e41318db3aa5e033eece02b4c2b896facdfd67c9a9aba

    SHA512

    13846b949fc40aa4eadfb40a3c85b55a592d64d4ae380308c7ef7e056595e63b8ec97099936f95e2176ecbbcfcb518409d956314f70c24ca9f1d2e82873d7f83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRJ3600.exe

    Filesize

    411KB

    MD5

    d59df46282f02718029286dbc54cb8b2

    SHA1

    8f304c490f4268a49af9f630ade4aaeb35cf3c99

    SHA256

    9b34ad661142abdace8e41318db3aa5e033eece02b4c2b896facdfd67c9a9aba

    SHA512

    13846b949fc40aa4eadfb40a3c85b55a592d64d4ae380308c7ef7e056595e63b8ec97099936f95e2176ecbbcfcb518409d956314f70c24ca9f1d2e82873d7f83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it554803.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it554803.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp001404.exe

    Filesize

    365KB

    MD5

    ad84a1df218c142dbff07886f03df413

    SHA1

    574d120a4e08b1531d223742f96038311bd70663

    SHA256

    30e67e75d5c658848cc5bdf73772d4c5d2849ac3ffeee5a1ca20f84eebb3ffc7

    SHA512

    d5ab7ff17e9d83bfdbe1ce74bf69e7c96a9609f4b293983dff0d61b8ec4adc652ac18e8cee9771ef9ee4e73fc4d4c08a93ec67aa4661dd72d315185250d328f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp001404.exe

    Filesize

    365KB

    MD5

    ad84a1df218c142dbff07886f03df413

    SHA1

    574d120a4e08b1531d223742f96038311bd70663

    SHA256

    30e67e75d5c658848cc5bdf73772d4c5d2849ac3ffeee5a1ca20f84eebb3ffc7

    SHA512

    d5ab7ff17e9d83bfdbe1ce74bf69e7c96a9609f4b293983dff0d61b8ec4adc652ac18e8cee9771ef9ee4e73fc4d4c08a93ec67aa4661dd72d315185250d328f9

  • memory/2180-956-0x0000000000ED0000-0x0000000000EF8000-memory.dmp

    Filesize

    160KB

  • memory/2180-957-0x0000000007C70000-0x0000000007C80000-memory.dmp

    Filesize

    64KB

  • memory/2180-958-0x0000000007C80000-0x0000000007CCB000-memory.dmp

    Filesize

    300KB

  • memory/4248-133-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/4888-173-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-187-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-142-0x0000000004C10000-0x0000000004C4A000-memory.dmp

    Filesize

    232KB

  • memory/4888-143-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-144-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-146-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-148-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-150-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-152-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-154-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-157-0x0000000007370000-0x0000000007380000-memory.dmp

    Filesize

    64KB

  • memory/4888-156-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-160-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-159-0x0000000007370000-0x0000000007380000-memory.dmp

    Filesize

    64KB

  • memory/4888-161-0x0000000007370000-0x0000000007380000-memory.dmp

    Filesize

    64KB

  • memory/4888-163-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-165-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-167-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-169-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-171-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-140-0x0000000004B70000-0x0000000004BAC000-memory.dmp

    Filesize

    240KB

  • memory/4888-175-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-177-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-179-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-181-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-183-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-185-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-141-0x0000000007380000-0x000000000787E000-memory.dmp

    Filesize

    5.0MB

  • memory/4888-189-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-191-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-193-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-195-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-197-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-199-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-201-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-203-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-205-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-207-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-209-0x0000000004C10000-0x0000000004C45000-memory.dmp

    Filesize

    212KB

  • memory/4888-938-0x0000000009C00000-0x000000000A206000-memory.dmp

    Filesize

    6.0MB

  • memory/4888-939-0x000000000A210000-0x000000000A222000-memory.dmp

    Filesize

    72KB

  • memory/4888-940-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4888-941-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/4888-942-0x000000000A4E0000-0x000000000A52B000-memory.dmp

    Filesize

    300KB

  • memory/4888-943-0x0000000007370000-0x0000000007380000-memory.dmp

    Filesize

    64KB

  • memory/4888-944-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4888-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4888-946-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/4888-139-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/4888-947-0x000000000AE90000-0x000000000AEAE000-memory.dmp

    Filesize

    120KB

  • memory/4888-948-0x000000000AF40000-0x000000000AF90000-memory.dmp

    Filesize

    320KB

  • memory/4888-949-0x000000000B0B0000-0x000000000B272000-memory.dmp

    Filesize

    1.8MB

  • memory/4888-950-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB