Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 16:20

General

  • Target

    f42ecfb82a13539ed2d6d1017b0885f03f544986da3133f92369e4e9800662fd.exe

  • Size

    704KB

  • MD5

    ed6ef4beab143ce30821771511321c65

  • SHA1

    614ada702ad18b3be33c439afda76a55492d1112

  • SHA256

    f42ecfb82a13539ed2d6d1017b0885f03f544986da3133f92369e4e9800662fd

  • SHA512

    cb46ac4992c1667e54a67d0becee7fe3e402599f36b5d14c987953c829e22974c544ef50db2ebdd23ee84ff3d09adb1fa3ba24e8a3b0544d456802605ebb392d

  • SSDEEP

    12288:Ty90MEJtehqbG2pdwuj/DIN9gWF07RvWM3MKFwcmBl5wEOQDP3yi:Tyji9fwgbgXF04kMKucglKEOQD/yi

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f42ecfb82a13539ed2d6d1017b0885f03f544986da3133f92369e4e9800662fd.exe
    "C:\Users\Admin\AppData\Local\Temp\f42ecfb82a13539ed2d6d1017b0885f03f544986da3133f92369e4e9800662fd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229952.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229952.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr016437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr016437.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 1080
          4⤵
          • Program crash
          PID:388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu828024.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu828024.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1316
          4⤵
          • Program crash
          PID:3860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050968.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050968.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2348
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4676 -ip 4676
    1⤵
      PID:4596
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4804 -ip 4804
      1⤵
        PID:1956
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:2868

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050968.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050968.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229952.exe

        Filesize

        551KB

        MD5

        cb9da9367cfc9e0003e864e199ae84f5

        SHA1

        c4975737205d955a979d8c0b143cd9f122c94513

        SHA256

        ce905084cf1e90d68b3196038ce64beb6900af6e6f3a07b4d3c68c5505fcdc14

        SHA512

        b5bbe1c555bb159c7f747646ef2686c5300e6dfba6fb99103b3848bf60cbbdf96342cd39bfbab2cdde6a40a53511f455d243c778f61a326bcd9923cbfd5890cb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229952.exe

        Filesize

        551KB

        MD5

        cb9da9367cfc9e0003e864e199ae84f5

        SHA1

        c4975737205d955a979d8c0b143cd9f122c94513

        SHA256

        ce905084cf1e90d68b3196038ce64beb6900af6e6f3a07b4d3c68c5505fcdc14

        SHA512

        b5bbe1c555bb159c7f747646ef2686c5300e6dfba6fb99103b3848bf60cbbdf96342cd39bfbab2cdde6a40a53511f455d243c778f61a326bcd9923cbfd5890cb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr016437.exe

        Filesize

        278KB

        MD5

        987a04c6658f6c1c01d9c4a22bf6135f

        SHA1

        07ee388e4531bda248d06af670358c551758d4a7

        SHA256

        5a9e975f173ef96615fdab5254bc1e8e2f3a6b13c6c44a26dca047eed388b5ac

        SHA512

        baf3743b23f46b35babdff2d8d32ca259550455115398be3bc2a0fb6bf6acf3264d66113ee98a2b2617c4bcf7d09ff7ae057c4c956521294569144ec5268f12d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr016437.exe

        Filesize

        278KB

        MD5

        987a04c6658f6c1c01d9c4a22bf6135f

        SHA1

        07ee388e4531bda248d06af670358c551758d4a7

        SHA256

        5a9e975f173ef96615fdab5254bc1e8e2f3a6b13c6c44a26dca047eed388b5ac

        SHA512

        baf3743b23f46b35babdff2d8d32ca259550455115398be3bc2a0fb6bf6acf3264d66113ee98a2b2617c4bcf7d09ff7ae057c4c956521294569144ec5268f12d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu828024.exe

        Filesize

        359KB

        MD5

        3139f76fa62a868f102d5232f5c916d4

        SHA1

        e8906fd6839fcbe4da88ea5738e02495c35fa286

        SHA256

        3f43cf21cce10c5045fb40914896ed114905ccd9f563ae565528cf64dcee0f45

        SHA512

        4eda2a7ff912fbfe001519f36bdd771dfda43049984f419998e298644691c52f3e0c2adeb09240f6d5e1626c391b14a67000a6a1e3d1c3709435e9de3ea04d94

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu828024.exe

        Filesize

        359KB

        MD5

        3139f76fa62a868f102d5232f5c916d4

        SHA1

        e8906fd6839fcbe4da88ea5738e02495c35fa286

        SHA256

        3f43cf21cce10c5045fb40914896ed114905ccd9f563ae565528cf64dcee0f45

        SHA512

        4eda2a7ff912fbfe001519f36bdd771dfda43049984f419998e298644691c52f3e0c2adeb09240f6d5e1626c391b14a67000a6a1e3d1c3709435e9de3ea04d94

      • memory/2348-1008-0x0000000000460000-0x0000000000488000-memory.dmp

        Filesize

        160KB

      • memory/2348-1009-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/4676-158-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-172-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-151-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-152-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-154-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-156-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-149-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-160-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-162-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-164-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-166-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-168-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-170-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-150-0x0000000007510000-0x0000000007AB4000-memory.dmp

        Filesize

        5.6MB

      • memory/4676-174-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-176-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-178-0x0000000004CF0000-0x0000000004D02000-memory.dmp

        Filesize

        72KB

      • memory/4676-179-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-180-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/4676-182-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-184-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-185-0x0000000007500000-0x0000000007510000-memory.dmp

        Filesize

        64KB

      • memory/4676-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/4676-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

        Filesize

        180KB

      • memory/4804-194-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-270-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-196-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-198-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-200-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-202-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-204-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-206-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-208-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-210-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-212-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-214-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-216-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-218-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-220-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-222-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-224-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-266-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/4804-269-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-192-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-267-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-987-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/4804-988-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/4804-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/4804-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/4804-991-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/4804-993-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/4804-995-0x000000000AFF0000-0x000000000B040000-memory.dmp

        Filesize

        320KB

      • memory/4804-996-0x000000000B040000-0x000000000B0B6000-memory.dmp

        Filesize

        472KB

      • memory/4804-997-0x000000000B0F0000-0x000000000B10E000-memory.dmp

        Filesize

        120KB

      • memory/4804-998-0x000000000B210000-0x000000000B3D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4804-999-0x000000000B5E0000-0x000000000BB0C000-memory.dmp

        Filesize

        5.2MB

      • memory/4804-191-0x00000000071B0000-0x00000000071E5000-memory.dmp

        Filesize

        212KB

      • memory/4804-1002-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-1001-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/4804-1003-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB