Analysis

  • max time kernel
    59s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 15:48

General

  • Target

    577f2fea598b893ab136e0de28e544c4c8845bfa8b6952caf44e194f2445ab0a.exe

  • Size

    563KB

  • MD5

    9128ffb395070decb3e722956b8ee01c

  • SHA1

    4142dac3dd2fc7d6c5005cb00f7f03c3071649ed

  • SHA256

    577f2fea598b893ab136e0de28e544c4c8845bfa8b6952caf44e194f2445ab0a

  • SHA512

    b2d1310ad719a03988d1e77459e2c468dfebe62c5f96a2e93909455a9c719a71554a5657ae670a765738ad0000a6717fa0ef65ffbdd8bcf766ddfc67db13e8d2

  • SSDEEP

    12288:Iy90YWExBHNpQKGc02ZIlKjLkukMbzbrzBmLQfzjR:IyNjtKvLyIlK3k6B8QfzjR

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\577f2fea598b893ab136e0de28e544c4c8845bfa8b6952caf44e194f2445ab0a.exe
    "C:\Users\Admin\AppData\Local\Temp\577f2fea598b893ab136e0de28e544c4c8845bfa8b6952caf44e194f2445ab0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPl1855.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPl1855.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it848916.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it848916.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876158.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876158.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 1584
          4⤵
          • Program crash
          PID:4612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499092.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3760 -ip 3760
    1⤵
      PID:4520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499092.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499092.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPl1855.exe

      Filesize

      408KB

      MD5

      aa3c1ef4a5f4c34fee346ed711dc2e73

      SHA1

      5407f0eeca0342e506e8fb81579a6d0f55de5fab

      SHA256

      7419e84ffcc8894e610f0ce4cd1fc08a45d8da994b59a995abb4882f76b95dbc

      SHA512

      90f15aedb897985be2f4469b7ad2fbdc2be8340d9e07e9775f04dc64d8ef4c7ced97d58687f7b29d9782fefcf53b2ff5e8054f3795885a8e43b54e02d41530c4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPl1855.exe

      Filesize

      408KB

      MD5

      aa3c1ef4a5f4c34fee346ed711dc2e73

      SHA1

      5407f0eeca0342e506e8fb81579a6d0f55de5fab

      SHA256

      7419e84ffcc8894e610f0ce4cd1fc08a45d8da994b59a995abb4882f76b95dbc

      SHA512

      90f15aedb897985be2f4469b7ad2fbdc2be8340d9e07e9775f04dc64d8ef4c7ced97d58687f7b29d9782fefcf53b2ff5e8054f3795885a8e43b54e02d41530c4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it848916.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it848916.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876158.exe

      Filesize

      359KB

      MD5

      eac4c5708f4ca766fc6c016c419d4cd3

      SHA1

      120bffe10269d0ef00ba4492ea4ac55e51f9224e

      SHA256

      67085a8c832d34094aafb884efa76fce0fb9fdc1df00ce70976a9862a680e8bc

      SHA512

      956075e0cc2874174b748137a9c671151c03d9f10d358d02e935d182fc066f01aaa14a5cf96943b7a4ce431829b0ca7a383976c27e208ea08f0aa92ddee50f33

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876158.exe

      Filesize

      359KB

      MD5

      eac4c5708f4ca766fc6c016c419d4cd3

      SHA1

      120bffe10269d0ef00ba4492ea4ac55e51f9224e

      SHA256

      67085a8c832d34094aafb884efa76fce0fb9fdc1df00ce70976a9862a680e8bc

      SHA512

      956075e0cc2874174b748137a9c671151c03d9f10d358d02e935d182fc066f01aaa14a5cf96943b7a4ce431829b0ca7a383976c27e208ea08f0aa92ddee50f33

    • memory/3760-153-0x0000000007310000-0x00000000078B4000-memory.dmp

      Filesize

      5.6MB

    • memory/3760-155-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3760-156-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3760-157-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3760-154-0x0000000002BD0000-0x0000000002C16000-memory.dmp

      Filesize

      280KB

    • memory/3760-158-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-159-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-161-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-163-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-165-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-167-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-169-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-171-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-173-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-175-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-177-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-179-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-181-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-183-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-185-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-187-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-189-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-191-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-193-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-195-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-197-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-199-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-201-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-203-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-205-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-207-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-209-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-211-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-213-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-215-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-217-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-219-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-221-0x00000000072B0000-0x00000000072E5000-memory.dmp

      Filesize

      212KB

    • memory/3760-950-0x0000000009DA0000-0x000000000A3B8000-memory.dmp

      Filesize

      6.1MB

    • memory/3760-951-0x000000000A460000-0x000000000A472000-memory.dmp

      Filesize

      72KB

    • memory/3760-952-0x000000000A480000-0x000000000A58A000-memory.dmp

      Filesize

      1.0MB

    • memory/3760-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

      Filesize

      240KB

    • memory/3760-954-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3760-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

      Filesize

      408KB

    • memory/3760-956-0x000000000AF60000-0x000000000AFF2000-memory.dmp

      Filesize

      584KB

    • memory/3760-957-0x000000000B260000-0x000000000B2B0000-memory.dmp

      Filesize

      320KB

    • memory/3760-958-0x000000000B2C0000-0x000000000B336000-memory.dmp

      Filesize

      472KB

    • memory/3760-959-0x000000000B370000-0x000000000B38E000-memory.dmp

      Filesize

      120KB

    • memory/3760-960-0x000000000B450000-0x000000000B612000-memory.dmp

      Filesize

      1.8MB

    • memory/3760-961-0x000000000B620000-0x000000000BB4C000-memory.dmp

      Filesize

      5.2MB

    • memory/4140-147-0x0000000000840000-0x000000000084A000-memory.dmp

      Filesize

      40KB

    • memory/5004-968-0x00000000000C0000-0x00000000000E8000-memory.dmp

      Filesize

      160KB

    • memory/5004-969-0x0000000006F40000-0x0000000006F50000-memory.dmp

      Filesize

      64KB