Analysis

  • max time kernel
    59s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 17:39

General

  • Target

    3a1b74fdd8f69019a5ab09b1690855ee3d66aeb848c09300920a02cb1e232e7a.exe

  • Size

    702KB

  • MD5

    e6c415012dbf23e239da8ce94ce93968

  • SHA1

    f2a0745ae7eb6ec53fdd5aae9f65b5b637515086

  • SHA256

    3a1b74fdd8f69019a5ab09b1690855ee3d66aeb848c09300920a02cb1e232e7a

  • SHA512

    ea81ce04960eb266ce41b7d42daeddfc149f2927a1e1c38c02908f8f126f796f28cb474c201470d5d1c4ee34735f2074ed14e70f3542684003ac77cb837f5ee8

  • SSDEEP

    12288:dy90IDPv2UPf0Mxwq/Ocr/DT17lwCYQa2x/sEPXU+7D0r1eaeikpVHgR6:dyTDuUn0qwq/vrbRlXYb2x/sEPk+2sMS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a1b74fdd8f69019a5ab09b1690855ee3d66aeb848c09300920a02cb1e232e7a.exe
    "C:\Users\Admin\AppData\Local\Temp\3a1b74fdd8f69019a5ab09b1690855ee3d66aeb848c09300920a02cb1e232e7a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163769.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163769.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr795370.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr795370.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 1012
          4⤵
          • Program crash
          PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu937299.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu937299.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1320
          4⤵
          • Program crash
          PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540188.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540188.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3788
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3276 -ip 3276
    1⤵
      PID:4444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5112 -ip 5112
      1⤵
        PID:4232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540188.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540188.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163769.exe

        Filesize

        549KB

        MD5

        a247cc482d4cd01fb8f34e7512c69871

        SHA1

        60292db82e0315f2422f6beb524143abd75282c6

        SHA256

        338700102da0e8aacab70c48bcf44fb6eeeeb77121f7a2b54adfc0cb62a5452e

        SHA512

        9fb3ef9e1e7dc5d298f1febd47c0073f79b1e049f5cb12411b20ddd3e2e2419f17c735763e5f45aba7eeddd5533aae2e917b366a4ba8561c01797d434bdb0fa7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163769.exe

        Filesize

        549KB

        MD5

        a247cc482d4cd01fb8f34e7512c69871

        SHA1

        60292db82e0315f2422f6beb524143abd75282c6

        SHA256

        338700102da0e8aacab70c48bcf44fb6eeeeb77121f7a2b54adfc0cb62a5452e

        SHA512

        9fb3ef9e1e7dc5d298f1febd47c0073f79b1e049f5cb12411b20ddd3e2e2419f17c735763e5f45aba7eeddd5533aae2e917b366a4ba8561c01797d434bdb0fa7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr795370.exe

        Filesize

        278KB

        MD5

        62c0aca9662fed8961c1aa946ee7f911

        SHA1

        ebcee78031099ec6792f80913a347fe557ab6279

        SHA256

        86e470d091c067f5db06eaea2fdefc31541976a3c05b39f4ca61bca03190459e

        SHA512

        7161484bb017de3e084d2a47ed3570daf8a8fa1463cd5c71ce756dc560d1050705a76c28da5ea89142d526a5fec5c30dcdb180132c1daadb0fe9e89362c40b7e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr795370.exe

        Filesize

        278KB

        MD5

        62c0aca9662fed8961c1aa946ee7f911

        SHA1

        ebcee78031099ec6792f80913a347fe557ab6279

        SHA256

        86e470d091c067f5db06eaea2fdefc31541976a3c05b39f4ca61bca03190459e

        SHA512

        7161484bb017de3e084d2a47ed3570daf8a8fa1463cd5c71ce756dc560d1050705a76c28da5ea89142d526a5fec5c30dcdb180132c1daadb0fe9e89362c40b7e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu937299.exe

        Filesize

        360KB

        MD5

        362e22dec7eb1041547e400b8df39af9

        SHA1

        35f12890df08b9e60e5d1b0b20cba0bf9de0942b

        SHA256

        d58bcb77fb90b28e919eebfa313f60790587c15b07f519a14d8a176836434d52

        SHA512

        c60f230b685e42ad4802a3271881781507b9ee100ef824a3e0eb3ca848f674cc11bcae872c045b1b9a83c5286d49bd77be8cc69338a1bcf14be7fc2c06c5699a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu937299.exe

        Filesize

        360KB

        MD5

        362e22dec7eb1041547e400b8df39af9

        SHA1

        35f12890df08b9e60e5d1b0b20cba0bf9de0942b

        SHA256

        d58bcb77fb90b28e919eebfa313f60790587c15b07f519a14d8a176836434d52

        SHA512

        c60f230b685e42ad4802a3271881781507b9ee100ef824a3e0eb3ca848f674cc11bcae872c045b1b9a83c5286d49bd77be8cc69338a1bcf14be7fc2c06c5699a

      • memory/3276-160-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-170-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-150-0x0000000007400000-0x00000000079A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3276-151-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-152-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-154-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-156-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-158-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/3276-164-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-162-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-166-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-168-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-149-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-172-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-174-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-176-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-178-0x0000000004940000-0x0000000004952000-memory.dmp

        Filesize

        72KB

      • memory/3276-179-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-180-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/3276-182-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-184-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-185-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/3276-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/3788-1006-0x0000000000730000-0x0000000000758000-memory.dmp

        Filesize

        160KB

      • memory/3788-1007-0x00000000074C0000-0x00000000074D0000-memory.dmp

        Filesize

        64KB

      • memory/5112-191-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/5112-193-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/5112-194-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-197-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-195-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-199-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-201-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-203-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-205-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-207-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-209-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-211-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-213-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-215-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-217-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-219-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-221-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-223-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-225-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-227-0x00000000070D0000-0x0000000007105000-memory.dmp

        Filesize

        212KB

      • memory/5112-251-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/5112-987-0x0000000009C90000-0x000000000A2A8000-memory.dmp

        Filesize

        6.1MB

      • memory/5112-988-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/5112-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/5112-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/5112-991-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/5112-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/5112-993-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/5112-994-0x000000000AEE0000-0x000000000AF56000-memory.dmp

        Filesize

        472KB

      • memory/5112-995-0x000000000AF90000-0x000000000AFAE000-memory.dmp

        Filesize

        120KB

      • memory/5112-192-0x0000000007110000-0x0000000007120000-memory.dmp

        Filesize

        64KB

      • memory/5112-996-0x000000000B030000-0x000000000B080000-memory.dmp

        Filesize

        320KB

      • memory/5112-997-0x000000000B0B0000-0x000000000B272000-memory.dmp

        Filesize

        1.8MB

      • memory/5112-998-0x000000000B290000-0x000000000B7BC000-memory.dmp

        Filesize

        5.2MB