Analysis

  • max time kernel
    118s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 14:21

General

  • Target

    bd84636945da524a119ef353a4c07faf89fb8516ee142cf50fae41a41a596fa1.exe

  • Size

    563KB

  • MD5

    131df6a9c8da0b6c4283632a5ba03270

  • SHA1

    196aa22f91219ff3949f250cb314fb4a29e55c6f

  • SHA256

    bd84636945da524a119ef353a4c07faf89fb8516ee142cf50fae41a41a596fa1

  • SHA512

    9aaad9f4c6e795b3b47e5de443760cf84f5196ef56411ad9b1e0a9f3c890ce9836f9ffa7a54a171047657c64e5ec9610d27824c181c2eb85c99c21c1abf12e4b

  • SSDEEP

    12288:My90YiKN+rA4m2Iy+jL+uiMnzbIVIrLQGUKLE49e:My/z+rAT2Iy+3+IfnQGUKLEn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd84636945da524a119ef353a4c07faf89fb8516ee142cf50fae41a41a596fa1.exe
    "C:\Users\Admin\AppData\Local\Temp\bd84636945da524a119ef353a4c07faf89fb8516ee142cf50fae41a41a596fa1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwp7114.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwp7114.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it863626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it863626.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp821740.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp821740.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1924
          4⤵
          • Program crash
          PID:3968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062217.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2204 -ip 2204
    1⤵
      PID:1436

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062217.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062217.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwp7114.exe

      Filesize

      409KB

      MD5

      c3bd30fbb7169d154787291674b406ca

      SHA1

      51a196f9f5e6a7ae3fac1d40fb6a5c9951e6a85a

      SHA256

      dd33285b13c18052fed0fb0f2a1d54fceacb53785762afe17f3d200224ed1658

      SHA512

      04dd3870ad85b9ec680e3f066dcf5f5e0f16d1020da41243ed161de2678a848fd7c8b5e61451d8327b047602908529a7018b7be391303dfc07251dd5893adc43

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwp7114.exe

      Filesize

      409KB

      MD5

      c3bd30fbb7169d154787291674b406ca

      SHA1

      51a196f9f5e6a7ae3fac1d40fb6a5c9951e6a85a

      SHA256

      dd33285b13c18052fed0fb0f2a1d54fceacb53785762afe17f3d200224ed1658

      SHA512

      04dd3870ad85b9ec680e3f066dcf5f5e0f16d1020da41243ed161de2678a848fd7c8b5e61451d8327b047602908529a7018b7be391303dfc07251dd5893adc43

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it863626.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it863626.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp821740.exe

      Filesize

      359KB

      MD5

      c36293d385fc752efecdd7e6cfee9637

      SHA1

      d946585476dc69e06365ba9965f9b52825e0f834

      SHA256

      26e13ced5bed793ffdf28cb32920ac94a725ab0ed057d01e80241321c0d14f25

      SHA512

      edeafad996a32733951e23e455c2d4edc42149ef412ec5da34f00b75de197f35aec6e2d4227e92762becfb74ec2daeda31d9deb3b0b4984380cfddeb4ce7dc65

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp821740.exe

      Filesize

      359KB

      MD5

      c36293d385fc752efecdd7e6cfee9637

      SHA1

      d946585476dc69e06365ba9965f9b52825e0f834

      SHA256

      26e13ced5bed793ffdf28cb32920ac94a725ab0ed057d01e80241321c0d14f25

      SHA512

      edeafad996a32733951e23e455c2d4edc42149ef412ec5da34f00b75de197f35aec6e2d4227e92762becfb74ec2daeda31d9deb3b0b4984380cfddeb4ce7dc65

    • memory/532-976-0x0000000000180000-0x00000000001A8000-memory.dmp

      Filesize

      160KB

    • memory/532-977-0x0000000006FD0000-0x0000000006FE0000-memory.dmp

      Filesize

      64KB

    • memory/1948-147-0x0000000000A60000-0x0000000000A6A000-memory.dmp

      Filesize

      40KB

    • memory/2204-192-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-204-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-156-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-157-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-158-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-160-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-162-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-164-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-166-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-168-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-170-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-172-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-174-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-176-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-178-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-180-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-182-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-184-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-186-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-188-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-190-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-154-0x00000000072B0000-0x0000000007854000-memory.dmp

      Filesize

      5.6MB

    • memory/2204-194-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-196-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-198-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-200-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-202-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-155-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-206-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-208-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-210-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-212-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-214-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-216-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-218-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-220-0x00000000071A0000-0x00000000071D5000-memory.dmp

      Filesize

      212KB

    • memory/2204-950-0x0000000009CE0000-0x000000000A2F8000-memory.dmp

      Filesize

      6.1MB

    • memory/2204-951-0x000000000A320000-0x000000000A332000-memory.dmp

      Filesize

      72KB

    • memory/2204-952-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/2204-953-0x000000000A460000-0x000000000A49C000-memory.dmp

      Filesize

      240KB

    • memory/2204-954-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-955-0x0000000002CC0000-0x0000000002D06000-memory.dmp

      Filesize

      280KB

    • memory/2204-956-0x000000000A760000-0x000000000A7C6000-memory.dmp

      Filesize

      408KB

    • memory/2204-957-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-958-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-959-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-961-0x000000000AE30000-0x000000000AEC2000-memory.dmp

      Filesize

      584KB

    • memory/2204-962-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/2204-963-0x000000000AEF0000-0x000000000AF40000-memory.dmp

      Filesize

      320KB

    • memory/2204-964-0x000000000AF40000-0x000000000AFB6000-memory.dmp

      Filesize

      472KB

    • memory/2204-153-0x0000000002CC0000-0x0000000002D06000-memory.dmp

      Filesize

      280KB

    • memory/2204-965-0x000000000B110000-0x000000000B2D2000-memory.dmp

      Filesize

      1.8MB

    • memory/2204-966-0x000000000B300000-0x000000000B82C000-memory.dmp

      Filesize

      5.2MB

    • memory/2204-967-0x000000000B930000-0x000000000B94E000-memory.dmp

      Filesize

      120KB