Analysis

  • max time kernel
    58s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-04-2023 09:15

General

  • Target

    56fe97bd5f9f9a6b5bc96f428fbe5213c113bc6fac991013a663cb7dd871f55f.exe

  • Size

    566KB

  • MD5

    d769846b7c19721dda983cca5610b807

  • SHA1

    274d60f5c64d5b3952cb8d4e7a7b301c077b1466

  • SHA256

    56fe97bd5f9f9a6b5bc96f428fbe5213c113bc6fac991013a663cb7dd871f55f

  • SHA512

    7a05240f22232c57ada54a92d9e5cfcfd6df2691388b67d7af92a232bcd3b2f6bfe701354a5633ceb6f7865742773aaea4c283adcbcd21cee7984d0919054863

  • SSDEEP

    12288:xy90zCVA1SdgDvIaWsMwu78MejCO9l5P:xyrVAXDQa3Mwu7uC63

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56fe97bd5f9f9a6b5bc96f428fbe5213c113bc6fac991013a663cb7dd871f55f.exe
    "C:\Users\Admin\AppData\Local\Temp\56fe97bd5f9f9a6b5bc96f428fbe5213c113bc6fac991013a663cb7dd871f55f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixO4635.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixO4635.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it276966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it276966.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp396804.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp396804.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769658.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769658.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769658.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769658.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixO4635.exe

    Filesize

    412KB

    MD5

    d91c2db113e315abbd10aae720b34b5f

    SHA1

    143f0a39ce3fc3f929500bca96a4cf266a7ce5cc

    SHA256

    6faa4ea4deb0b54154bf494935c78908f5b372545c920eb0c5ea3597cf1176b6

    SHA512

    cf1fe6580529cbd2279445792af9a5e0b2e2f6c48a1417d16bebe91bcfbbbe9fdfcd02354d8c63865eafd5fcaca9ae5d9c50d9bcf0d71421e6b0b6202e99563c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixO4635.exe

    Filesize

    412KB

    MD5

    d91c2db113e315abbd10aae720b34b5f

    SHA1

    143f0a39ce3fc3f929500bca96a4cf266a7ce5cc

    SHA256

    6faa4ea4deb0b54154bf494935c78908f5b372545c920eb0c5ea3597cf1176b6

    SHA512

    cf1fe6580529cbd2279445792af9a5e0b2e2f6c48a1417d16bebe91bcfbbbe9fdfcd02354d8c63865eafd5fcaca9ae5d9c50d9bcf0d71421e6b0b6202e99563c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it276966.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it276966.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp396804.exe

    Filesize

    368KB

    MD5

    1d46f67ccd0cdf2aa163f27186096c7c

    SHA1

    204b8826668fcf97be9b2330ad7923c3dfe47b5b

    SHA256

    3b0bdc226a727301bcf24b57eba76918f4a93a470669161dd59e5badd3ff5454

    SHA512

    834c562610b2dc7e52ba31e6aa7402a78d2338a25d1c406c1464ec3181a734a7567308cc5296e03c71ef90bacaec5401d7b872063b113626b139082b0460f7a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp396804.exe

    Filesize

    368KB

    MD5

    1d46f67ccd0cdf2aa163f27186096c7c

    SHA1

    204b8826668fcf97be9b2330ad7923c3dfe47b5b

    SHA256

    3b0bdc226a727301bcf24b57eba76918f4a93a470669161dd59e5badd3ff5454

    SHA512

    834c562610b2dc7e52ba31e6aa7402a78d2338a25d1c406c1464ec3181a734a7567308cc5296e03c71ef90bacaec5401d7b872063b113626b139082b0460f7a7

  • memory/2056-956-0x00000000009F0000-0x0000000000A18000-memory.dmp

    Filesize

    160KB

  • memory/2056-957-0x0000000007790000-0x00000000077DB000-memory.dmp

    Filesize

    300KB

  • memory/2056-958-0x0000000007740000-0x0000000007750000-memory.dmp

    Filesize

    64KB

  • memory/2076-172-0x0000000007360000-0x0000000007370000-memory.dmp

    Filesize

    64KB

  • memory/2076-187-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-142-0x0000000004C20000-0x0000000004C5A000-memory.dmp

    Filesize

    232KB

  • memory/2076-143-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-144-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-150-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-148-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-146-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-152-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-154-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-156-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-158-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-160-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-162-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-164-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-166-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-168-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-171-0x0000000007360000-0x0000000007370000-memory.dmp

    Filesize

    64KB

  • memory/2076-170-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-175-0x0000000007360000-0x0000000007370000-memory.dmp

    Filesize

    64KB

  • memory/2076-174-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-140-0x0000000004BA0000-0x0000000004BDC000-memory.dmp

    Filesize

    240KB

  • memory/2076-177-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-179-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-181-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-183-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-185-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-141-0x0000000007370000-0x000000000786E000-memory.dmp

    Filesize

    5.0MB

  • memory/2076-189-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-191-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-193-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-195-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-197-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-199-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-201-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-203-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-205-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-207-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-209-0x0000000004C20000-0x0000000004C55000-memory.dmp

    Filesize

    212KB

  • memory/2076-938-0x000000000A200000-0x000000000A806000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-939-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/2076-940-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/2076-941-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/2076-942-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/2076-943-0x0000000007360000-0x0000000007370000-memory.dmp

    Filesize

    64KB

  • memory/2076-944-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/2076-945-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/2076-946-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/2076-139-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/2076-947-0x000000000AE90000-0x000000000AEAE000-memory.dmp

    Filesize

    120KB

  • memory/2076-948-0x000000000B050000-0x000000000B0A0000-memory.dmp

    Filesize

    320KB

  • memory/2076-949-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/2076-950-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4904-133-0x00000000008D0000-0x00000000008DA000-memory.dmp

    Filesize

    40KB