Analysis

  • max time kernel
    59s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 19:44

General

  • Target

    62cdf42bba9df4e7832816af66430d20368fe08bcfa2a955d8cdbcb3ce2fefa2.exe

  • Size

    702KB

  • MD5

    9156339447ecc84c78a2c9920083104c

  • SHA1

    79a8dae6743d5a0c67dbd55dc68fabe644377aa3

  • SHA256

    62cdf42bba9df4e7832816af66430d20368fe08bcfa2a955d8cdbcb3ce2fefa2

  • SHA512

    59267e7fb75f4be809a07167e65aefd9f4bbe4859be867d7b580d3993d12d7458697c0f6beb15c670c2d3f94075367513d03fb980fee8c8e4659945303a7015d

  • SSDEEP

    12288:4y90yWSI6BRvips6h0+bfDEw9etH2x/NWX/+9r0reeamiy4z3:4ypc6BRghh0+b7itH2x/NWP+Ix2dz3

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62cdf42bba9df4e7832816af66430d20368fe08bcfa2a955d8cdbcb3ce2fefa2.exe
    "C:\Users\Admin\AppData\Local\Temp\62cdf42bba9df4e7832816af66430d20368fe08bcfa2a955d8cdbcb3ce2fefa2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226891.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226891.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr006460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr006460.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 1084
          4⤵
          • Program crash
          PID:4032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu053474.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu053474.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 1692
          4⤵
          • Program crash
          PID:3988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959839.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3160
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4704 -ip 4704
    1⤵
      PID:4508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1484 -ip 1484
      1⤵
        PID:4508

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959839.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959839.exe

              Filesize

              136KB

              MD5

              8c80b06d843bd6a7599a5be2075d9a55

              SHA1

              caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

              SHA256

              e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

              SHA512

              cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226891.exe

              Filesize

              548KB

              MD5

              a7dbc805fb39c62036e58844856406c7

              SHA1

              f27d4422b5043797664353d1ea531c184ce3d959

              SHA256

              4c1c68208f1f882a35c879785bf9f70270cdc571dd2b1b6e427e72d8ccc90601

              SHA512

              fa1011f449411ec5f52ee9d227d84c18dd7eb99380dfa30e3690d43baa77b7f452deb6ea4b61159b81c848d6cbe7d846e646dc9a72cc62d56968ce26ec872eff

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226891.exe

              Filesize

              548KB

              MD5

              a7dbc805fb39c62036e58844856406c7

              SHA1

              f27d4422b5043797664353d1ea531c184ce3d959

              SHA256

              4c1c68208f1f882a35c879785bf9f70270cdc571dd2b1b6e427e72d8ccc90601

              SHA512

              fa1011f449411ec5f52ee9d227d84c18dd7eb99380dfa30e3690d43baa77b7f452deb6ea4b61159b81c848d6cbe7d846e646dc9a72cc62d56968ce26ec872eff

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr006460.exe

              Filesize

              278KB

              MD5

              0ee934c978e1cef022dd902aff4ebd1d

              SHA1

              7a9a7c04526c7f5a0df63fb77dcbf205d78fc57b

              SHA256

              918060d3ccac659a982e02c2ff76f2f7e3aceb105a56659c213d3f70c8753520

              SHA512

              2f340fa4a03a201d07f54696d7b529b9a1129921913df18ab846d0a8fc0068c51076d6a731ada64f0d709581009c2b7092a84d646b67f6c6f5e0cdeec39e6f91

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr006460.exe

              Filesize

              278KB

              MD5

              0ee934c978e1cef022dd902aff4ebd1d

              SHA1

              7a9a7c04526c7f5a0df63fb77dcbf205d78fc57b

              SHA256

              918060d3ccac659a982e02c2ff76f2f7e3aceb105a56659c213d3f70c8753520

              SHA512

              2f340fa4a03a201d07f54696d7b529b9a1129921913df18ab846d0a8fc0068c51076d6a731ada64f0d709581009c2b7092a84d646b67f6c6f5e0cdeec39e6f91

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu053474.exe

              Filesize

              360KB

              MD5

              4821cf50d2007b3105d73c6d604fbdd1

              SHA1

              2923ad9d8ffb65198b09f9f7c135da4ddd8e631d

              SHA256

              bf880d3e4755d9b356d4618b87a49a454b39f6070b227978a28bcb1f1c88aa2b

              SHA512

              89231b95d314727d00e3eb8f3a4e496409b57e12f82f0a97f5527187d2d394a65dafa17d2a68bf5f370a8cdf878c5c7ccf1012cfbd33ae893737df4a083e41b2

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu053474.exe

              Filesize

              360KB

              MD5

              4821cf50d2007b3105d73c6d604fbdd1

              SHA1

              2923ad9d8ffb65198b09f9f7c135da4ddd8e631d

              SHA256

              bf880d3e4755d9b356d4618b87a49a454b39f6070b227978a28bcb1f1c88aa2b

              SHA512

              89231b95d314727d00e3eb8f3a4e496409b57e12f82f0a97f5527187d2d394a65dafa17d2a68bf5f370a8cdf878c5c7ccf1012cfbd33ae893737df4a083e41b2

            • memory/1484-258-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/1484-988-0x000000000A320000-0x000000000A332000-memory.dmp

              Filesize

              72KB

            • memory/1484-998-0x0000000006C50000-0x0000000006CA0000-memory.dmp

              Filesize

              320KB

            • memory/1484-997-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

              Filesize

              120KB

            • memory/1484-996-0x000000000B1A0000-0x000000000B6CC000-memory.dmp

              Filesize

              5.2MB

            • memory/1484-995-0x000000000AFD0000-0x000000000B192000-memory.dmp

              Filesize

              1.8MB

            • memory/1484-994-0x000000000AEF0000-0x000000000AF66000-memory.dmp

              Filesize

              472KB

            • memory/1484-993-0x000000000AE30000-0x000000000AEC2000-memory.dmp

              Filesize

              584KB

            • memory/1484-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

              Filesize

              408KB

            • memory/1484-991-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/1484-990-0x000000000A460000-0x000000000A49C000-memory.dmp

              Filesize

              240KB

            • memory/1484-989-0x000000000A340000-0x000000000A44A000-memory.dmp

              Filesize

              1.0MB

            • memory/1484-987-0x0000000009C60000-0x000000000A278000-memory.dmp

              Filesize

              6.1MB

            • memory/1484-254-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/1484-257-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

              Filesize

              64KB

            • memory/1484-253-0x0000000002CE0000-0x0000000002D26000-memory.dmp

              Filesize

              280KB

            • memory/1484-224-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-222-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-220-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-218-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-216-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-212-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-214-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-191-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-192-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-194-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-196-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-198-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-200-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-202-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-204-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-206-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-208-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/1484-210-0x0000000007760000-0x0000000007795000-memory.dmp

              Filesize

              212KB

            • memory/3160-1004-0x0000000000340000-0x0000000000368000-memory.dmp

              Filesize

              160KB

            • memory/3160-1005-0x0000000007400000-0x0000000007410000-memory.dmp

              Filesize

              64KB

            • memory/4704-154-0x0000000002C80000-0x0000000002CAD000-memory.dmp

              Filesize

              180KB

            • memory/4704-149-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-184-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-183-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

              Filesize

              39.7MB

            • memory/4704-180-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-178-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-150-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-176-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-174-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-152-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-172-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-185-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-166-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-170-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-164-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-160-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-162-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-157-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-159-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-156-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4704-168-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB

            • memory/4704-148-0x0000000007250000-0x00000000077F4000-memory.dmp

              Filesize

              5.6MB

            • memory/4704-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

              Filesize

              39.7MB

            • memory/4704-155-0x0000000007810000-0x0000000007822000-memory.dmp

              Filesize

              72KB