Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 21:10

General

  • Target

    27748c3ef12cf3ab561eb7cec3600cc1738c41a53243de7537edb2f6ac4f7604.exe

  • Size

    704KB

  • MD5

    271ebf72b21dcd500c915de741180878

  • SHA1

    a77e841b78a692dae73c957b5ee123996a76a75d

  • SHA256

    27748c3ef12cf3ab561eb7cec3600cc1738c41a53243de7537edb2f6ac4f7604

  • SHA512

    3c47ab13dbbf74faec535066e83fa206e640380ec533674ed79ea5b02c38e832e3256b59d6d0ba0522aa8f67500d38aab85f7411fb7bd1b2073022d6b67cee25

  • SSDEEP

    12288:/y90yI+bZF11qXq/I4t2966rVxVhwJB9bqhA1tRRst3I19zC7nIzNMTV/K/hW+vU:/y8yba4tArVDKJvbqhA1HR8CFCnIpA/r

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27748c3ef12cf3ab561eb7cec3600cc1738c41a53243de7537edb2f6ac4f7604.exe
    "C:\Users\Admin\AppData\Local\Temp\27748c3ef12cf3ab561eb7cec3600cc1738c41a53243de7537edb2f6ac4f7604.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318562.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318562.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr659163.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr659163.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 1092
          4⤵
          • Program crash
          PID:3800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675641.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675641.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 1320
          4⤵
          • Program crash
          PID:3976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653020.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653020.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2156 -ip 2156
    1⤵
      PID:4052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4164 -ip 4164
      1⤵
        PID:1800

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653020.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653020.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318562.exe

        Filesize

        550KB

        MD5

        059fc5457c0f72cc4ff166a04d4fc883

        SHA1

        fc8af1988652dd6bcfd231ec7d5b1a6fe930fa21

        SHA256

        4ef3aa31fbb5107d14863fdd6fbd6b90b3cdd12c2efc690b68a6cc03f0cb2ea5

        SHA512

        276c4f25be4c929f72649b241b0e02fdf2f0aedf9928e7a9c5849876916461e432a37bebd04ae44096cfaf8b2e42ea4a4c4a9c161a4b8f13633ddc80626a16c0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318562.exe

        Filesize

        550KB

        MD5

        059fc5457c0f72cc4ff166a04d4fc883

        SHA1

        fc8af1988652dd6bcfd231ec7d5b1a6fe930fa21

        SHA256

        4ef3aa31fbb5107d14863fdd6fbd6b90b3cdd12c2efc690b68a6cc03f0cb2ea5

        SHA512

        276c4f25be4c929f72649b241b0e02fdf2f0aedf9928e7a9c5849876916461e432a37bebd04ae44096cfaf8b2e42ea4a4c4a9c161a4b8f13633ddc80626a16c0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr659163.exe

        Filesize

        278KB

        MD5

        11e72c2a4887cd2e6f90623db124f4dc

        SHA1

        68b89e8ad8859959ffe8c9f06134b623d340f9cb

        SHA256

        2bd8922b86b99725d39f2b0c9411656306a0589f534000b6c663cb719480d96f

        SHA512

        3baffcc65815baaaa24c0444406111f6a4f4e55b2eb626254485083e804980a33c3582017b2124136d5212214d67ef51edd4c015ff6b98b65ae05931b431a7e3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr659163.exe

        Filesize

        278KB

        MD5

        11e72c2a4887cd2e6f90623db124f4dc

        SHA1

        68b89e8ad8859959ffe8c9f06134b623d340f9cb

        SHA256

        2bd8922b86b99725d39f2b0c9411656306a0589f534000b6c663cb719480d96f

        SHA512

        3baffcc65815baaaa24c0444406111f6a4f4e55b2eb626254485083e804980a33c3582017b2124136d5212214d67ef51edd4c015ff6b98b65ae05931b431a7e3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675641.exe

        Filesize

        361KB

        MD5

        9484b781e02a78ddbf1a97fab38ef754

        SHA1

        c1355fe0775551787ccb9fea9a5cd3b844b62ca6

        SHA256

        e18ab01bb68aa32305f6d8865b0bce5f222c28be4d089ea4d44df9e4810c3056

        SHA512

        dfd6f45929531c805c74f23783390523338b8588990dbe70798f52ae5fe2e5054540d38012889a82eb22aa9cc7a703e6b72e7d3473d7e12536d77926e671cc0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675641.exe

        Filesize

        361KB

        MD5

        9484b781e02a78ddbf1a97fab38ef754

        SHA1

        c1355fe0775551787ccb9fea9a5cd3b844b62ca6

        SHA256

        e18ab01bb68aa32305f6d8865b0bce5f222c28be4d089ea4d44df9e4810c3056

        SHA512

        dfd6f45929531c805c74f23783390523338b8588990dbe70798f52ae5fe2e5054540d38012889a82eb22aa9cc7a703e6b72e7d3473d7e12536d77926e671cc0a

      • memory/992-1006-0x0000000008060000-0x0000000008070000-memory.dmp

        Filesize

        64KB

      • memory/992-1005-0x0000000000FD0000-0x0000000000FF8000-memory.dmp

        Filesize

        160KB

      • memory/2156-156-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-170-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-149-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/2156-152-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-153-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-154-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-151-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-158-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-160-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-162-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-164-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-166-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-168-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-150-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-172-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-174-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-176-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-178-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-180-0x0000000004D30000-0x0000000004D42000-memory.dmp

        Filesize

        72KB

      • memory/2156-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/2156-183-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-185-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-184-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2156-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/2156-148-0x0000000007250000-0x00000000077F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4164-191-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-194-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-196-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-200-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-198-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-202-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-204-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-206-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-208-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-210-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-212-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-214-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-216-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-218-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-220-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-222-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-224-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-226-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/4164-228-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4164-230-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4164-232-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4164-987-0x0000000009D20000-0x000000000A338000-memory.dmp

        Filesize

        6.1MB

      • memory/4164-988-0x00000000072C0000-0x00000000072D2000-memory.dmp

        Filesize

        72KB

      • memory/4164-989-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/4164-990-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/4164-991-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4164-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/4164-993-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/4164-994-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/4164-995-0x000000000AFA0000-0x000000000AFBE000-memory.dmp

        Filesize

        120KB

      • memory/4164-192-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/4164-996-0x000000000B0B0000-0x000000000B272000-memory.dmp

        Filesize

        1.8MB

      • memory/4164-997-0x000000000B280000-0x000000000B7AC000-memory.dmp

        Filesize

        5.2MB

      • memory/4164-998-0x0000000006CF0000-0x0000000006D40000-memory.dmp

        Filesize

        320KB