Malware Analysis Report

2025-08-10 23:11

Sample ID 230423-ztplrahd9z
Target 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b
SHA256 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b
Tags
discovery evasion persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b

Threat Level: Known bad

The file 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b was found to be: Known bad.

Malicious Activity Summary

discovery evasion persistence spyware stealer trojan

Modifies Windows Defender Real-time Protection settings

Windows security modification

Executes dropped EXE

Reads user/profile data of web browsers

Adds Run key to start application

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Program crash

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-04-23 21:00

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-23 21:00

Reported

2023-04-23 21:03

Platform

win10v2004-20230220-en

Max time kernel

135s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe"

Signatures

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe N/A

Checks installed software on the system

discovery

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 820 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe
PID 820 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe
PID 820 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe
PID 2776 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe
PID 2776 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe
PID 2776 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe
PID 2776 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe
PID 2776 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe
PID 2776 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe
PID 820 wrote to memory of 5020 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe
PID 820 wrote to memory of 5020 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe
PID 820 wrote to memory of 5020 N/A C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe

"C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2200 -ip 2200

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 1088

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3144 -ip 3144

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 1336

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe

Network

Country Destination Domain Proto
NL 8.238.179.126:80 tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 93.184.220.29:80 tcp
N/A 185.161.248.142:38452 tcp
US 8.8.8.8:53 142.248.161.185.in-addr.arpa udp
N/A 185.161.248.142:38452 tcp
US 52.152.110.14:443 tcp
US 52.182.141.63:443 tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
NL 8.238.179.126:80 tcp
NL 8.238.179.126:80 tcp
US 52.152.110.14:443 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 131.253.33.203:80 tcp
US 8.8.8.8:53 73.254.224.20.in-addr.arpa udp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe

MD5 050d9060860d2e8e7a4eb289b627479e
SHA1 757e45fb08cd03dae96cff055d79f6e6fdf14c6b
SHA256 a24dcf0c4d18f67292b65c9b65cabc1796d6c1205fa7c52891c856e9ff0bb53d
SHA512 76ea86ff8b9ee1f4320c14816d111c69ee9d9c3c949142b54be893d18fe22d59d1c2e38c3f8f1a5e4a4479eb4f1ff9f116c18efc6dc1679f6dd07198666f6f85

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe

MD5 050d9060860d2e8e7a4eb289b627479e
SHA1 757e45fb08cd03dae96cff055d79f6e6fdf14c6b
SHA256 a24dcf0c4d18f67292b65c9b65cabc1796d6c1205fa7c52891c856e9ff0bb53d
SHA512 76ea86ff8b9ee1f4320c14816d111c69ee9d9c3c949142b54be893d18fe22d59d1c2e38c3f8f1a5e4a4479eb4f1ff9f116c18efc6dc1679f6dd07198666f6f85

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe

MD5 74053d1416690bccb7a7f1be6dad5d3c
SHA1 e2573a12a39c24c2ddcf917d7ce055f7c9fb17f7
SHA256 58a840dab9859dcc875aeabd42defc0a3c4bdb95c80ef65b4be4f4b068a46c71
SHA512 b13100dcc9584b965e7c4d8b6e811bca128919908246f4195bda63fc9a66948e22ad618579579fe20c797acf1423e3ad1453ed7909434b2c0f72000cc169529d

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe

MD5 74053d1416690bccb7a7f1be6dad5d3c
SHA1 e2573a12a39c24c2ddcf917d7ce055f7c9fb17f7
SHA256 58a840dab9859dcc875aeabd42defc0a3c4bdb95c80ef65b4be4f4b068a46c71
SHA512 b13100dcc9584b965e7c4d8b6e811bca128919908246f4195bda63fc9a66948e22ad618579579fe20c797acf1423e3ad1453ed7909434b2c0f72000cc169529d

memory/2200-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

memory/2200-149-0x0000000007220000-0x00000000077C4000-memory.dmp

memory/2200-150-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-151-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-153-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-155-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-157-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-159-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-161-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-163-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-165-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-167-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-169-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-171-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-173-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-175-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-177-0x00000000049C0000-0x00000000049D2000-memory.dmp

memory/2200-178-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-179-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-180-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-181-0x0000000000400000-0x0000000002BAE000-memory.dmp

memory/2200-183-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-184-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-185-0x0000000007210000-0x0000000007220000-memory.dmp

memory/2200-186-0x0000000000400000-0x0000000002BAE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe

MD5 14d33f6609b1257a63dc1ae0b34f6a25
SHA1 568fec38983bd7697a139cd609cc8a2e029760ad
SHA256 417603778236b838a2daf5e1f17caf829f0d0e5894b9d18f3e2e8b1584d96973
SHA512 8fffd02cd608218e9b327db1eaf3de19467873741ca13296ef6cd49819b6e73bd605d2c3708a50a20727c2f9a3dc279d9e03849fa08a79daa4e32d05919c2c23

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe

MD5 14d33f6609b1257a63dc1ae0b34f6a25
SHA1 568fec38983bd7697a139cd609cc8a2e029760ad
SHA256 417603778236b838a2daf5e1f17caf829f0d0e5894b9d18f3e2e8b1584d96973
SHA512 8fffd02cd608218e9b327db1eaf3de19467873741ca13296ef6cd49819b6e73bd605d2c3708a50a20727c2f9a3dc279d9e03849fa08a79daa4e32d05919c2c23

memory/3144-192-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-191-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-194-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-196-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-198-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-200-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-202-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-204-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-208-0x00000000073A0000-0x00000000073B0000-memory.dmp

memory/3144-207-0x0000000002BD0000-0x0000000002C16000-memory.dmp

memory/3144-210-0x00000000073A0000-0x00000000073B0000-memory.dmp

memory/3144-212-0x00000000073A0000-0x00000000073B0000-memory.dmp

memory/3144-211-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-214-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-206-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-216-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-218-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-220-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-222-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-224-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-226-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-228-0x0000000004C00000-0x0000000004C35000-memory.dmp

memory/3144-987-0x0000000009CE0000-0x000000000A2F8000-memory.dmp

memory/3144-988-0x000000000A320000-0x000000000A332000-memory.dmp

memory/3144-989-0x000000000A340000-0x000000000A44A000-memory.dmp

memory/3144-990-0x00000000073A0000-0x00000000073B0000-memory.dmp

memory/3144-991-0x000000000A460000-0x000000000A49C000-memory.dmp

memory/3144-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

memory/3144-993-0x000000000AE20000-0x000000000AEB2000-memory.dmp

memory/3144-994-0x000000000AED0000-0x000000000AF46000-memory.dmp

memory/3144-995-0x000000000AFA0000-0x000000000AFBE000-memory.dmp

memory/3144-996-0x000000000B0B0000-0x000000000B272000-memory.dmp

memory/3144-997-0x000000000B280000-0x000000000B7AC000-memory.dmp

memory/3144-998-0x0000000002F80000-0x0000000002FD0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe

MD5 8c80b06d843bd6a7599a5be2075d9a55
SHA1 caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256 e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512 cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563523.exe

MD5 8c80b06d843bd6a7599a5be2075d9a55
SHA1 caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256 e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512 cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

memory/5020-1004-0x0000000000C60000-0x0000000000C88000-memory.dmp

memory/5020-1005-0x0000000007A20000-0x0000000007A30000-memory.dmp