Analysis

  • max time kernel
    103s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 08:02

General

  • Target

    0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe

  • Size

    706KB

  • MD5

    ed24feeef487325b7feef576c160efb6

  • SHA1

    634aaf85967bdf0b996b5122c47cca39e3359dd3

  • SHA256

    0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540

  • SHA512

    fdee13f1fd59f67a164ccae921b49707829668a173ae6cf469c948a9814d57bc8dfcd0eb52784b6ccd5447ce7385eac81f340082914b88a0914c2a07763409ff

  • SSDEEP

    12288:My90SckSOzkFWNqDSNMT2O1EZOZruGDkq0ePfyF9mi1Za7iIiZtcOnMiZ8bvRUE:MyZe7WWlL6GYqlfS9minaeVMkQRUE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe
    "C:\Users\Admin\AppData\Local\Temp\0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 1080
          4⤵
          • Program crash
          PID:2324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 1944
          4⤵
          • Program crash
          PID:4544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3356
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5024 -ip 5024
    1⤵
      PID:5076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3908 -ip 3908
      1⤵
        PID:4012

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exe

        Filesize

        551KB

        MD5

        42958e666ff95ba032b54049c02feea0

        SHA1

        2f9f79ceb9ea697f2dcc71b9fbfdf9f7d0e46330

        SHA256

        676e5b701d331a03903170f17e7d8b880a436a7ce14d097c09aa73e2e6ff1849

        SHA512

        66f649db57d40930c6e5140294b687c4ecf33e9d776edfec9571f327e28896be43fb26b79d0fef1ef18c4d4a701f62238b58a8691c7689c1debace92eb35dd1d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exe

        Filesize

        551KB

        MD5

        42958e666ff95ba032b54049c02feea0

        SHA1

        2f9f79ceb9ea697f2dcc71b9fbfdf9f7d0e46330

        SHA256

        676e5b701d331a03903170f17e7d8b880a436a7ce14d097c09aa73e2e6ff1849

        SHA512

        66f649db57d40930c6e5140294b687c4ecf33e9d776edfec9571f327e28896be43fb26b79d0fef1ef18c4d4a701f62238b58a8691c7689c1debace92eb35dd1d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exe

        Filesize

        286KB

        MD5

        5b9e8290f79367b948cba5a5a7541723

        SHA1

        f27ef606d9a1a08589cefd39bbd35927e4fba746

        SHA256

        91db64fc436fbf9ed1f2761f53a12456409fb6d44fb3288c47426405ab504cf3

        SHA512

        968ab95c50846666937a061029de31d8586b3cd0d4f8d5362d13410e03e90ae7975952395c161b87634f7ed6e84e8139144d28aef860cd449ee0e692c4932a94

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exe

        Filesize

        286KB

        MD5

        5b9e8290f79367b948cba5a5a7541723

        SHA1

        f27ef606d9a1a08589cefd39bbd35927e4fba746

        SHA256

        91db64fc436fbf9ed1f2761f53a12456409fb6d44fb3288c47426405ab504cf3

        SHA512

        968ab95c50846666937a061029de31d8586b3cd0d4f8d5362d13410e03e90ae7975952395c161b87634f7ed6e84e8139144d28aef860cd449ee0e692c4932a94

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exe

        Filesize

        368KB

        MD5

        f275dd9fbd4d58e6f4f6c22a981b229c

        SHA1

        e183472f38bc37f5bc075a38ec992383c0d15a35

        SHA256

        b3f8dd87a1acd37fd841e9e434bb8550b65908b8deb577c566e756960d5347c4

        SHA512

        92b180dff2fd9f2a2a36dee5ba0abedd848b364804862e7b55bd8ba11c3fdc351529d89005c241a02c29df3bea79849d83b6396baa8aeb0910a1cb9dcb4f2af5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exe

        Filesize

        368KB

        MD5

        f275dd9fbd4d58e6f4f6c22a981b229c

        SHA1

        e183472f38bc37f5bc075a38ec992383c0d15a35

        SHA256

        b3f8dd87a1acd37fd841e9e434bb8550b65908b8deb577c566e756960d5347c4

        SHA512

        92b180dff2fd9f2a2a36dee5ba0abedd848b364804862e7b55bd8ba11c3fdc351529d89005c241a02c29df3bea79849d83b6396baa8aeb0910a1cb9dcb4f2af5

      • memory/3356-1003-0x0000000007C80000-0x0000000007C90000-memory.dmp

        Filesize

        64KB

      • memory/3356-1002-0x0000000000BE0000-0x0000000000C08000-memory.dmp

        Filesize

        160KB

      • memory/3908-222-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-987-0x000000000A370000-0x000000000A47A000-memory.dmp

        Filesize

        1.0MB

      • memory/3908-996-0x000000000B3A0000-0x000000000B8CC000-memory.dmp

        Filesize

        5.2MB

      • memory/3908-995-0x000000000B1D0000-0x000000000B392000-memory.dmp

        Filesize

        1.8MB

      • memory/3908-994-0x000000000B0F0000-0x000000000B10E000-memory.dmp

        Filesize

        120KB

      • memory/3908-993-0x000000000B040000-0x000000000B0B6000-memory.dmp

        Filesize

        472KB

      • memory/3908-992-0x000000000AFE0000-0x000000000B030000-memory.dmp

        Filesize

        320KB

      • memory/3908-991-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/3908-990-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/3908-989-0x000000000A480000-0x000000000A4BC000-memory.dmp

        Filesize

        240KB

      • memory/3908-988-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3908-986-0x00000000072C0000-0x00000000072D2000-memory.dmp

        Filesize

        72KB

      • memory/3908-985-0x0000000009D50000-0x000000000A368000-memory.dmp

        Filesize

        6.1MB

      • memory/3908-226-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-224-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-220-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-218-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-216-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-214-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-190-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-191-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/3908-189-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-194-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-195-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3908-193-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3908-197-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3908-200-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-202-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-198-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-204-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-206-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-208-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-210-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/3908-212-0x0000000004D20000-0x0000000004D55000-memory.dmp

        Filesize

        212KB

      • memory/5024-175-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-177-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-184-0x0000000000400000-0x0000000002BB1000-memory.dmp

        Filesize

        39.7MB

      • memory/5024-182-0x0000000004A20000-0x0000000004A30000-memory.dmp

        Filesize

        64KB

      • memory/5024-152-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-181-0x0000000004A20000-0x0000000004A30000-memory.dmp

        Filesize

        64KB

      • memory/5024-180-0x0000000000400000-0x0000000002BB1000-memory.dmp

        Filesize

        39.7MB

      • memory/5024-171-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-173-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-157-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-155-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-153-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-179-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-169-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-167-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-165-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-163-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-161-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-159-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/5024-151-0x0000000004A20000-0x0000000004A30000-memory.dmp

        Filesize

        64KB

      • memory/5024-150-0x0000000007320000-0x00000000078C4000-memory.dmp

        Filesize

        5.6MB

      • memory/5024-149-0x0000000004A20000-0x0000000004A30000-memory.dmp

        Filesize

        64KB

      • memory/5024-148-0x0000000002C90000-0x0000000002CBD000-memory.dmp

        Filesize

        180KB