Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/04/2023, 12:46

General

  • Target

    21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe

  • Size

    706KB

  • MD5

    0d26a12053709510b164f4f10ee23f3c

  • SHA1

    8444b649626db4761c4018b9c41c5c1b0ebf6318

  • SHA256

    21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d

  • SHA512

    30b256c1528fd9a80e2c3e088de3358d350d4ef9bb8cbed5478b6396418c6fff611bbc5e92adcfbb2a4bd8b49ab640f2881d72b2b67eb0d3b5c2ee49266fc0e4

  • SSDEEP

    12288:cy900KUJQuGO/lhC3FgwiYZsuanpZc2zEdg2VoyzPmUSYOMjY2CMKDyt:cyzKpClheFg4sfzT4Z6yzSv2+et

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe
    "C:\Users\Admin\AppData\Local\Temp\21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exe

    Filesize

    551KB

    MD5

    2331f61a16b5eb5e3c7c4042991fdfa4

    SHA1

    0632d3ab9c5f1b381db9a3fe349e24ba2e4f1366

    SHA256

    43796cc1a33a604f0ed97e5836621ffa7fa01291cc24248848b2cc94fe2e76ba

    SHA512

    a78ad09a4cda75780a0c90cc6dcb26ae1d67cd9e1169ee017561b78ebe5071ea6f27cc0365cb484f20f98aba3a82cb7c0828ee585e0d89aa5b1de82c2449c71a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exe

    Filesize

    551KB

    MD5

    2331f61a16b5eb5e3c7c4042991fdfa4

    SHA1

    0632d3ab9c5f1b381db9a3fe349e24ba2e4f1366

    SHA256

    43796cc1a33a604f0ed97e5836621ffa7fa01291cc24248848b2cc94fe2e76ba

    SHA512

    a78ad09a4cda75780a0c90cc6dcb26ae1d67cd9e1169ee017561b78ebe5071ea6f27cc0365cb484f20f98aba3a82cb7c0828ee585e0d89aa5b1de82c2449c71a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exe

    Filesize

    286KB

    MD5

    a59f438d05a327b05c852aa8982b69e9

    SHA1

    6a27c25846902450a7d687556c9f272b425e344d

    SHA256

    021d96fac8dee351d7966414c9d9bf5368ab70266b2c3fb27c8ec60a5411239e

    SHA512

    fc00821e4a9d60128e8cb1b50924a699bc6c00f7263e3a507526c73452538bf7fdae5678223d39c0d9b84fe0ceee939d734dd74215affd4a51c4357bd4df2711

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exe

    Filesize

    286KB

    MD5

    a59f438d05a327b05c852aa8982b69e9

    SHA1

    6a27c25846902450a7d687556c9f272b425e344d

    SHA256

    021d96fac8dee351d7966414c9d9bf5368ab70266b2c3fb27c8ec60a5411239e

    SHA512

    fc00821e4a9d60128e8cb1b50924a699bc6c00f7263e3a507526c73452538bf7fdae5678223d39c0d9b84fe0ceee939d734dd74215affd4a51c4357bd4df2711

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exe

    Filesize

    369KB

    MD5

    ab5b7d34ad808af588b420ffe9c85534

    SHA1

    4497dcb003cfe36f2e53c1ebdf08dc5105ad7ca6

    SHA256

    f3e810a23af7c05a19e8a604f796c4f64b208abe8cc9281b1fc405c43a2b218a

    SHA512

    d30c696f445ad8f8247b9bd691f2c09694be830ab773ad3d17f034bbde3ff3fcd88f5807701958a696d3168ee21894944afdabcee9518da550a761d8e4ca0ac5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exe

    Filesize

    369KB

    MD5

    ab5b7d34ad808af588b420ffe9c85534

    SHA1

    4497dcb003cfe36f2e53c1ebdf08dc5105ad7ca6

    SHA256

    f3e810a23af7c05a19e8a604f796c4f64b208abe8cc9281b1fc405c43a2b218a

    SHA512

    d30c696f445ad8f8247b9bd691f2c09694be830ab773ad3d17f034bbde3ff3fcd88f5807701958a696d3168ee21894944afdabcee9518da550a761d8e4ca0ac5

  • memory/2068-221-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/2068-212-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-991-0x000000000B740000-0x000000000B75E000-memory.dmp

    Filesize

    120KB

  • memory/2068-990-0x000000000B0E0000-0x000000000B60C000-memory.dmp

    Filesize

    5.2MB

  • memory/2068-989-0x000000000AF10000-0x000000000B0D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2068-988-0x000000000AE40000-0x000000000AEB6000-memory.dmp

    Filesize

    472KB

  • memory/2068-987-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/2068-986-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/2068-985-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/2068-984-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/2068-983-0x000000000A4E0000-0x000000000A52B000-memory.dmp

    Filesize

    300KB

  • memory/2068-982-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/2068-981-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/2068-980-0x000000000A210000-0x000000000A222000-memory.dmp

    Filesize

    72KB

  • memory/2068-979-0x0000000009BD0000-0x000000000A1D6000-memory.dmp

    Filesize

    6.0MB

  • memory/2068-218-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-192-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-194-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-219-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/2068-202-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-216-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/2068-215-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-214-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/2068-210-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-208-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-181-0x0000000004930000-0x000000000496C000-memory.dmp

    Filesize

    240KB

  • memory/2068-182-0x00000000049D0000-0x0000000004A0A000-memory.dmp

    Filesize

    232KB

  • memory/2068-183-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-184-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-186-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-188-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-190-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-206-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-196-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-204-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-198-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2068-200-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/2604-168-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-170-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-142-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-140-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-139-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-175-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-173-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/2604-176-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-174-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-138-0x00000000070E0000-0x00000000070F8000-memory.dmp

    Filesize

    96KB

  • memory/2604-171-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/2604-166-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-164-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-162-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-160-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-155-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-157-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-158-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-154-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-152-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2604-150-0x0000000002CC0000-0x0000000002CED000-memory.dmp

    Filesize

    180KB

  • memory/2604-151-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-148-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-146-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-144-0x00000000070E0000-0x00000000070F2000-memory.dmp

    Filesize

    72KB

  • memory/2604-137-0x0000000007230000-0x000000000772E000-memory.dmp

    Filesize

    5.0MB

  • memory/2604-136-0x00000000047B0000-0x00000000047CA000-memory.dmp

    Filesize

    104KB

  • memory/4000-998-0x0000000000D30000-0x0000000000D58000-memory.dmp

    Filesize

    160KB

  • memory/4000-999-0x0000000007AC0000-0x0000000007B0B000-memory.dmp

    Filesize

    300KB

  • memory/4000-1000-0x0000000007DB0000-0x0000000007DC0000-memory.dmp

    Filesize

    64KB