Analysis

  • max time kernel
    47s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/04/2023, 19:05

General

  • Target

    c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe

  • Size

    563KB

  • MD5

    30ba6cd45a22d5bac01718e5020710ba

  • SHA1

    6dc13bd036e6a0aa65fb46dd8d7a4f4e9feaccdb

  • SHA256

    c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d

  • SHA512

    fb894f3c466bfaeae6a72bed04e66a18a3bce566606724049df948b84a28e0939d74ad7c82830b0de9dfed19db9c0c8d8396068097104d6700074934468efabd

  • SSDEEP

    12288:+y90inssr5tnKC6ePJFPEfypzzB0r+eaUGD2eQQYc:+yD5rjb3Efcz8RTGD2eQTc

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe
    "C:\Users\Admin\AppData\Local\Temp\c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:720

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exe

          Filesize

          136KB

          MD5

          8c80b06d843bd6a7599a5be2075d9a55

          SHA1

          caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

          SHA256

          e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

          SHA512

          cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exe

          Filesize

          136KB

          MD5

          8c80b06d843bd6a7599a5be2075d9a55

          SHA1

          caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

          SHA256

          e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

          SHA512

          cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exe

          Filesize

          409KB

          MD5

          85f39c860fbec32b1806612e456e7d9e

          SHA1

          4df3c6c1c4d834d4aab8970236b1ac6d8b59007e

          SHA256

          5e84d1038a8d0164223da3736e32886050853a41ed24be955d88c32ff4080dd0

          SHA512

          ea7b908bf55bceb15f5605893ed3cb9e9ca291d2f957acefa7ea199f962c7dcb9718b0c4a643200a3f99c7a714f894cd4c16b25a5e99516d16705da710745e61

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exe

          Filesize

          409KB

          MD5

          85f39c860fbec32b1806612e456e7d9e

          SHA1

          4df3c6c1c4d834d4aab8970236b1ac6d8b59007e

          SHA256

          5e84d1038a8d0164223da3736e32886050853a41ed24be955d88c32ff4080dd0

          SHA512

          ea7b908bf55bceb15f5605893ed3cb9e9ca291d2f957acefa7ea199f962c7dcb9718b0c4a643200a3f99c7a714f894cd4c16b25a5e99516d16705da710745e61

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exe

          Filesize

          360KB

          MD5

          6a2c60b60f9211d2182551f90d86b507

          SHA1

          aaf678cac24b70049ac9f55cd046dcfc00fc7d5e

          SHA256

          edeb5136c400a149b32afeeaed26eff22e14a3ae71d960df98f785925d624f5f

          SHA512

          11d4e285a4c5c77fb266ef6b8fcb6188993861195d50b93cda1f3bfa9d785061268444ad48d920566f71248da2cd783bdb05da1350893432e5ec0fc8b0af9621

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exe

          Filesize

          360KB

          MD5

          6a2c60b60f9211d2182551f90d86b507

          SHA1

          aaf678cac24b70049ac9f55cd046dcfc00fc7d5e

          SHA256

          edeb5136c400a149b32afeeaed26eff22e14a3ae71d960df98f785925d624f5f

          SHA512

          11d4e285a4c5c77fb266ef6b8fcb6188993861195d50b93cda1f3bfa9d785061268444ad48d920566f71248da2cd783bdb05da1350893432e5ec0fc8b0af9621

        • memory/720-956-0x00000000009C0000-0x00000000009E8000-memory.dmp

          Filesize

          160KB

        • memory/720-957-0x0000000007760000-0x00000000077AB000-memory.dmp

          Filesize

          300KB

        • memory/720-958-0x0000000007750000-0x0000000007760000-memory.dmp

          Filesize

          64KB

        • memory/3988-133-0x00000000007A0000-0x00000000007AA000-memory.dmp

          Filesize

          40KB

        • memory/4596-173-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-187-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-143-0x0000000007160000-0x0000000007170000-memory.dmp

          Filesize

          64KB

        • memory/4596-142-0x0000000002CD0000-0x0000000002D16000-memory.dmp

          Filesize

          280KB

        • memory/4596-144-0x0000000007160000-0x0000000007170000-memory.dmp

          Filesize

          64KB

        • memory/4596-145-0x0000000007160000-0x0000000007170000-memory.dmp

          Filesize

          64KB

        • memory/4596-146-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-147-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-149-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-151-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-153-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-155-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-157-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-159-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-161-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-163-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-165-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-167-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-169-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-171-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-140-0x0000000007170000-0x000000000766E000-memory.dmp

          Filesize

          5.0MB

        • memory/4596-175-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-177-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-179-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-181-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-183-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-185-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-141-0x0000000007670000-0x00000000076AA000-memory.dmp

          Filesize

          232KB

        • memory/4596-189-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-191-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-193-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-195-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-197-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-199-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-201-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-203-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-205-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-207-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-209-0x0000000007670000-0x00000000076A5000-memory.dmp

          Filesize

          212KB

        • memory/4596-938-0x000000000A180000-0x000000000A786000-memory.dmp

          Filesize

          6.0MB

        • memory/4596-939-0x0000000009C00000-0x0000000009C12000-memory.dmp

          Filesize

          72KB

        • memory/4596-940-0x0000000009C30000-0x0000000009D3A000-memory.dmp

          Filesize

          1.0MB

        • memory/4596-941-0x0000000009D50000-0x0000000009D8E000-memory.dmp

          Filesize

          248KB

        • memory/4596-942-0x0000000007160000-0x0000000007170000-memory.dmp

          Filesize

          64KB

        • memory/4596-943-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

          Filesize

          300KB

        • memory/4596-944-0x000000000A060000-0x000000000A0C6000-memory.dmp

          Filesize

          408KB

        • memory/4596-945-0x000000000AD20000-0x000000000ADB2000-memory.dmp

          Filesize

          584KB

        • memory/4596-946-0x000000000ADD0000-0x000000000AE20000-memory.dmp

          Filesize

          320KB

        • memory/4596-139-0x00000000070D0000-0x000000000710C000-memory.dmp

          Filesize

          240KB

        • memory/4596-947-0x000000000AE40000-0x000000000AEB6000-memory.dmp

          Filesize

          472KB

        • memory/4596-948-0x000000000AEE0000-0x000000000AEFE000-memory.dmp

          Filesize

          120KB

        • memory/4596-949-0x000000000B0B0000-0x000000000B272000-memory.dmp

          Filesize

          1.8MB

        • memory/4596-950-0x000000000B280000-0x000000000B7AC000-memory.dmp

          Filesize

          5.2MB