Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 16:15

General

  • Target

    c6fd4bb4adf2d1a9868795c1a68399b0c38f3bf267c384ad0f023e64a29611f2.exe

  • Size

    704KB

  • MD5

    bcadd94f4f288a6ecb67dc247c0ad8d6

  • SHA1

    32ab1974c7ea644a5766d04bcb73b632d9443031

  • SHA256

    c6fd4bb4adf2d1a9868795c1a68399b0c38f3bf267c384ad0f023e64a29611f2

  • SHA512

    9fa87067ac74488ec56912283cd7bedacf12279ec21f419ba8133252abe5b20769543c4fc0c54d7b1cf1d8ad17e45002b7be9ebfb99f0da01e00e5bc6d94e09f

  • SSDEEP

    12288:5y90GYSLCGjql/kDqpuWvte1i3MKhEcmiX5ivQ8IeZH:5ylYkCUO/8gcIMKqcTXoQ8IeZH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6fd4bb4adf2d1a9868795c1a68399b0c38f3bf267c384ad0f023e64a29611f2.exe
    "C:\Users\Admin\AppData\Local\Temp\c6fd4bb4adf2d1a9868795c1a68399b0c38f3bf267c384ad0f023e64a29611f2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402702.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr154441.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr154441.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 1088
          4⤵
          • Program crash
          PID:1824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu875246.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu875246.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 2064
          4⤵
          • Program crash
          PID:1544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si216537.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si216537.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2512 -ip 2512
    1⤵
      PID:4464
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3432 -ip 3432
      1⤵
        PID:3168
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4832

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si216537.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si216537.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402702.exe

        Filesize

        550KB

        MD5

        8cad9578e7ee2d9f8a16d0c1316d1e9b

        SHA1

        ec57938e6153080627dec5b7be453aeabc82cbf9

        SHA256

        278f5578a904b0666bde2d4ecc24c1488ee24f4f3f6aa7c32679e764041167c1

        SHA512

        24e2c6b741cb905f395c8b8e1d306ce24fa58eb9a6f247b27d6133ef6e6ab5e1a641a7d77f8e5f774b0c52f11018a0028b9feb61ded41c212ecbbe55617428c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402702.exe

        Filesize

        550KB

        MD5

        8cad9578e7ee2d9f8a16d0c1316d1e9b

        SHA1

        ec57938e6153080627dec5b7be453aeabc82cbf9

        SHA256

        278f5578a904b0666bde2d4ecc24c1488ee24f4f3f6aa7c32679e764041167c1

        SHA512

        24e2c6b741cb905f395c8b8e1d306ce24fa58eb9a6f247b27d6133ef6e6ab5e1a641a7d77f8e5f774b0c52f11018a0028b9feb61ded41c212ecbbe55617428c5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr154441.exe

        Filesize

        278KB

        MD5

        9058db50ad41f3b52eb1e3e7b1a298a5

        SHA1

        bfa943a90d26fb8caae50db8bf3bb85ee3f21115

        SHA256

        8deecfbe6a9926b43c817b6289be5fcb9f9c8e56f61d6097919c431d72c6268e

        SHA512

        58c71afd78b4e374e91ab7f9d9dd594ee082ebbba0d7563ef1fba42b7640da2dcdcc89761fedf11bfbd67aa492e2fedb6625db9436f62d5bfbabe0724996d464

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr154441.exe

        Filesize

        278KB

        MD5

        9058db50ad41f3b52eb1e3e7b1a298a5

        SHA1

        bfa943a90d26fb8caae50db8bf3bb85ee3f21115

        SHA256

        8deecfbe6a9926b43c817b6289be5fcb9f9c8e56f61d6097919c431d72c6268e

        SHA512

        58c71afd78b4e374e91ab7f9d9dd594ee082ebbba0d7563ef1fba42b7640da2dcdcc89761fedf11bfbd67aa492e2fedb6625db9436f62d5bfbabe0724996d464

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu875246.exe

        Filesize

        359KB

        MD5

        0efdfef5517a5b8742c6a23481f296b4

        SHA1

        bee20afc83308bcb9fd5c5239e7852f32c1217d3

        SHA256

        274439939ce51f11f515010cf22be5e9533dacbaf347573b86676d6cd53e9ece

        SHA512

        1f2587d8af94c0f64152e12d695f008f63e7061f0681abe94b374484bfbc6bfa6a450670c327d92418a2214abde678742961b231b398f69d2105d373e4571627

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu875246.exe

        Filesize

        359KB

        MD5

        0efdfef5517a5b8742c6a23481f296b4

        SHA1

        bee20afc83308bcb9fd5c5239e7852f32c1217d3

        SHA256

        274439939ce51f11f515010cf22be5e9533dacbaf347573b86676d6cd53e9ece

        SHA512

        1f2587d8af94c0f64152e12d695f008f63e7061f0681abe94b374484bfbc6bfa6a450670c327d92418a2214abde678742961b231b398f69d2105d373e4571627

      • memory/2512-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/2512-149-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/2512-150-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/2512-151-0x00000000072B0000-0x0000000007854000-memory.dmp

        Filesize

        5.6MB

      • memory/2512-152-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-153-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-155-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-157-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-159-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-161-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-163-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-165-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-167-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-169-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-171-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-173-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-175-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-177-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-179-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/2512-180-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/2512-181-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/2512-182-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/2512-183-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/2512-185-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/3432-191-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-190-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-193-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-195-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-197-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-199-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-201-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-203-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-205-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-207-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-208-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

        Filesize

        280KB

      • memory/3432-211-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-212-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-213-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-210-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-215-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-217-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-219-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-221-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-223-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-225-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-227-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/3432-986-0x0000000009D10000-0x000000000A328000-memory.dmp

        Filesize

        6.1MB

      • memory/3432-987-0x000000000A330000-0x000000000A342000-memory.dmp

        Filesize

        72KB

      • memory/3432-988-0x000000000A350000-0x000000000A45A000-memory.dmp

        Filesize

        1.0MB

      • memory/3432-989-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/3432-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/3432-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

        Filesize

        584KB

      • memory/3432-994-0x000000000AED0000-0x000000000AF20000-memory.dmp

        Filesize

        320KB

      • memory/3432-995-0x000000000AF40000-0x000000000AFB6000-memory.dmp

        Filesize

        472KB

      • memory/3432-996-0x000000000B000000-0x000000000B01E000-memory.dmp

        Filesize

        120KB

      • memory/3432-997-0x000000000B410000-0x000000000B5D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3432-998-0x000000000B5E0000-0x000000000BB0C000-memory.dmp

        Filesize

        5.2MB

      • memory/3688-1004-0x00000000007F0000-0x0000000000818000-memory.dmp

        Filesize

        160KB

      • memory/3688-1005-0x00000000075D0000-0x00000000075E0000-memory.dmp

        Filesize

        64KB