Analysis

  • max time kernel
    54s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-04-2023 20:31

General

  • Target

    cc416e61ab8266fb5d02795b8fbfdc2dff7c5acc6313c233f7fe4d3b39882b63.exe

  • Size

    563KB

  • MD5

    779148436f637e829165f3417d7f9a01

  • SHA1

    f13a9ae4a0a24353e478e084018a6805ce236f99

  • SHA256

    cc416e61ab8266fb5d02795b8fbfdc2dff7c5acc6313c233f7fe4d3b39882b63

  • SHA512

    098d814c7edbc0a1e823631ae51d9c6fa687bc030dec528600e8e304b75b22a16ee365291e777ad71f47f79a8e43cd0eee0546aade31a6ab100bef3d99b4f2a9

  • SSDEEP

    12288:Ey90jlQtR+wK+FecBrzDI16JhYH2ENCeiMKLMMiOsyN:EyZtRxF9RDIUb+28IMKYMkyN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc416e61ab8266fb5d02795b8fbfdc2dff7c5acc6313c233f7fe4d3b39882b63.exe
    "C:\Users\Admin\AppData\Local\Temp\cc416e61ab8266fb5d02795b8fbfdc2dff7c5acc6313c233f7fe4d3b39882b63.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM5872.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM5872.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it156466.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it156466.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770063.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770063.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr980015.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr980015.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr980015.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr980015.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM5872.exe

    Filesize

    409KB

    MD5

    5212a09bc140f749c75a5bf505ec0735

    SHA1

    7e322f40c0e640083d1c26e3334a3dc4c0dc4dfc

    SHA256

    b0f8c2b86c259e60a253c9496599c8d9caf2ef8ae28324d3068457db11a3eb8b

    SHA512

    31dd952f174ea9002496feb4da3dbef2ccd588ba6ce765182e140aee6058303484c6c9451100e572d44407b06742f64ef46117a1f0b763573ba56bd0f0bfca1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM5872.exe

    Filesize

    409KB

    MD5

    5212a09bc140f749c75a5bf505ec0735

    SHA1

    7e322f40c0e640083d1c26e3334a3dc4c0dc4dfc

    SHA256

    b0f8c2b86c259e60a253c9496599c8d9caf2ef8ae28324d3068457db11a3eb8b

    SHA512

    31dd952f174ea9002496feb4da3dbef2ccd588ba6ce765182e140aee6058303484c6c9451100e572d44407b06742f64ef46117a1f0b763573ba56bd0f0bfca1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it156466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it156466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770063.exe

    Filesize

    361KB

    MD5

    ccf4fd0dee2d4b45b3f1ae0756621967

    SHA1

    d9066862ef3cfcbe9186ea2f9d7e25f4dd6c1511

    SHA256

    b5adceb902671a4371eebea4bdee7fd7810aa011e01a30eb5f59e614bf3b4839

    SHA512

    68a90489fe8008e613a5c0e56cf0f9da326915b5a09164ce209a91dac7aa67de222c93b3fe978f2efcfd5ae965497ef93a7a360f20d89eb6f7d687c34f0c82b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770063.exe

    Filesize

    361KB

    MD5

    ccf4fd0dee2d4b45b3f1ae0756621967

    SHA1

    d9066862ef3cfcbe9186ea2f9d7e25f4dd6c1511

    SHA256

    b5adceb902671a4371eebea4bdee7fd7810aa011e01a30eb5f59e614bf3b4839

    SHA512

    68a90489fe8008e613a5c0e56cf0f9da326915b5a09164ce209a91dac7aa67de222c93b3fe978f2efcfd5ae965497ef93a7a360f20d89eb6f7d687c34f0c82b6

  • memory/1732-957-0x0000000000950000-0x0000000000978000-memory.dmp

    Filesize

    160KB

  • memory/1732-958-0x00000000076D0000-0x000000000771B000-memory.dmp

    Filesize

    300KB

  • memory/1732-959-0x00000000079F0000-0x0000000007A00000-memory.dmp

    Filesize

    64KB

  • memory/4128-134-0x00000000005B0000-0x00000000005BA000-memory.dmp

    Filesize

    40KB

  • memory/4508-174-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-188-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-143-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4508-144-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4508-145-0x0000000007330000-0x000000000782E000-memory.dmp

    Filesize

    5.0MB

  • memory/4508-146-0x0000000004A50000-0x0000000004A8A000-memory.dmp

    Filesize

    232KB

  • memory/4508-147-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-148-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-152-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-150-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-154-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-156-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-158-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-160-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-162-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-164-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-166-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-168-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-170-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-172-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-141-0x0000000002CC0000-0x0000000002D06000-memory.dmp

    Filesize

    280KB

  • memory/4508-176-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-178-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-180-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-182-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-184-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-186-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-142-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4508-190-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-192-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-194-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-196-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-198-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-200-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-202-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-204-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-206-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-208-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-210-0x0000000004A50000-0x0000000004A85000-memory.dmp

    Filesize

    212KB

  • memory/4508-939-0x0000000009CB0000-0x000000000A2B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4508-940-0x0000000007280000-0x0000000007292000-memory.dmp

    Filesize

    72KB

  • memory/4508-941-0x000000000A2C0000-0x000000000A3CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4508-942-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4508-943-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4508-944-0x000000000A4E0000-0x000000000A52B000-memory.dmp

    Filesize

    300KB

  • memory/4508-945-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/4508-946-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4508-947-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/4508-140-0x0000000004870000-0x00000000048AC000-memory.dmp

    Filesize

    240KB

  • memory/4508-948-0x000000000AE90000-0x000000000AEAE000-memory.dmp

    Filesize

    120KB

  • memory/4508-949-0x000000000B060000-0x000000000B222000-memory.dmp

    Filesize

    1.8MB

  • memory/4508-950-0x000000000B230000-0x000000000B75C000-memory.dmp

    Filesize

    5.2MB

  • memory/4508-951-0x0000000004BD0000-0x0000000004C20000-memory.dmp

    Filesize

    320KB