Analysis

  • max time kernel
    86s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 22:18

General

  • Target

    f15e7aa8acf42ab8806ff29048d6c834fb9ea7c4eaf5b5f6663fb489fd2fa05a.exe

  • Size

    746KB

  • MD5

    5818c8db8cd4e24af201890da5cd0770

  • SHA1

    bbfb251e947783c756a02fe05801d9cd064004ce

  • SHA256

    f15e7aa8acf42ab8806ff29048d6c834fb9ea7c4eaf5b5f6663fb489fd2fa05a

  • SHA512

    7f2b3739cc8d18f735e6335f555645fdb1507022b5de735dc14729bd97edea81754ba67c78fad135ddfde2c0cf572667adb0919c2129a1d0746783c2a613337c

  • SSDEEP

    12288:Ly90VVvUF8Cc50f1HGLOKAC8loOAjawH8Hrdn9E8Yl1nX9FFWR5Pbs4wL4EGAGKt:LyqvnChdmLFcuIwcHZ9EFb9nipbsZLhD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f15e7aa8acf42ab8806ff29048d6c834fb9ea7c4eaf5b5f6663fb489fd2fa05a.exe
    "C:\Users\Admin\AppData\Local\Temp\f15e7aa8acf42ab8806ff29048d6c834fb9ea7c4eaf5b5f6663fb489fd2fa05a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un448000.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un448000.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41314594.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41314594.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk698424.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk698424.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si791349.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si791349.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si791349.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si791349.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un448000.exe

    Filesize

    592KB

    MD5

    c5066bbc808023d8b105dd2746e4f9c8

    SHA1

    d10db064a8a7e41550df5cd4568e72b44b2c9770

    SHA256

    7c186809449c2ef3492e69675df87026cd57de9ab5ab52ea3c29bd7524c2383c

    SHA512

    0a9d5eb6b047fda4af186b5027ac3af01b64ed1fecde722b355c385749a66698af1983a7598e810bdf734238779d6e13d1e1acd31b58b3421413dbea4df00fba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un448000.exe

    Filesize

    592KB

    MD5

    c5066bbc808023d8b105dd2746e4f9c8

    SHA1

    d10db064a8a7e41550df5cd4568e72b44b2c9770

    SHA256

    7c186809449c2ef3492e69675df87026cd57de9ab5ab52ea3c29bd7524c2383c

    SHA512

    0a9d5eb6b047fda4af186b5027ac3af01b64ed1fecde722b355c385749a66698af1983a7598e810bdf734238779d6e13d1e1acd31b58b3421413dbea4df00fba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41314594.exe

    Filesize

    377KB

    MD5

    baa257d02839dd27b06308914237d4e6

    SHA1

    5f8587c0dfda683733825620ea59ffa7c4c5e235

    SHA256

    f7839448110887817ca77964e91fc374ee968e8aebee084e7e4aeb0e88c20fc7

    SHA512

    e6ce0fb708c6e2cbbd76efe271f18795ee9985cab58346874bd50725d1629c74bc0fc3e0ed90c5320dec466cac19691a2476497988d210c6e51f1f390228e6ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41314594.exe

    Filesize

    377KB

    MD5

    baa257d02839dd27b06308914237d4e6

    SHA1

    5f8587c0dfda683733825620ea59ffa7c4c5e235

    SHA256

    f7839448110887817ca77964e91fc374ee968e8aebee084e7e4aeb0e88c20fc7

    SHA512

    e6ce0fb708c6e2cbbd76efe271f18795ee9985cab58346874bd50725d1629c74bc0fc3e0ed90c5320dec466cac19691a2476497988d210c6e51f1f390228e6ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk698424.exe

    Filesize

    459KB

    MD5

    388ee03e27f4533505002b9374ba9db4

    SHA1

    2d16cd8e276b7c65e351bc77e36342682c689de0

    SHA256

    3a8a50052cbdaf62a62bf66d7f8346b50a92234f95d6f6a6bc3537ed70879a97

    SHA512

    fc52581a21e5cec95eacc13ada46a68649440b3c409ef587e29c97154d1615d1a66ec8fd357ef2a046f7365603e78c4195282bbae9b39e13a461826c8466a29f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk698424.exe

    Filesize

    459KB

    MD5

    388ee03e27f4533505002b9374ba9db4

    SHA1

    2d16cd8e276b7c65e351bc77e36342682c689de0

    SHA256

    3a8a50052cbdaf62a62bf66d7f8346b50a92234f95d6f6a6bc3537ed70879a97

    SHA512

    fc52581a21e5cec95eacc13ada46a68649440b3c409ef587e29c97154d1615d1a66ec8fd357ef2a046f7365603e78c4195282bbae9b39e13a461826c8466a29f

  • memory/4532-148-0x0000000004ED0000-0x0000000005474000-memory.dmp

    Filesize

    5.6MB

  • memory/4532-149-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/4532-150-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/4532-151-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/4532-152-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/4532-153-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-154-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-156-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-158-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-160-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-162-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-164-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-166-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-168-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-170-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-172-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-174-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-176-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-178-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-180-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4532-181-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4532-182-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/4532-183-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/4532-185-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/5004-191-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-193-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-190-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-195-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-197-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-199-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-201-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-203-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-205-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-207-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-209-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-211-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-213-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-215-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-217-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-219-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-221-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-223-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5004-455-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/5004-457-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/5004-459-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/5004-462-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/5004-986-0x00000000078F0000-0x0000000007F08000-memory.dmp

    Filesize

    6.1MB

  • memory/5004-987-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/5004-988-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/5004-989-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/5004-990-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/5004-991-0x00000000083B0000-0x0000000008416000-memory.dmp

    Filesize

    408KB

  • memory/5004-992-0x0000000008A70000-0x0000000008B02000-memory.dmp

    Filesize

    584KB

  • memory/5004-993-0x0000000008C30000-0x0000000008CA6000-memory.dmp

    Filesize

    472KB

  • memory/5004-994-0x0000000008CF0000-0x0000000008D0E000-memory.dmp

    Filesize

    120KB

  • memory/5004-995-0x0000000008DB0000-0x0000000008E00000-memory.dmp

    Filesize

    320KB

  • memory/5004-996-0x0000000009010000-0x00000000091D2000-memory.dmp

    Filesize

    1.8MB

  • memory/5004-997-0x00000000091E0000-0x000000000970C000-memory.dmp

    Filesize

    5.2MB

  • memory/5108-1003-0x0000000000650000-0x0000000000678000-memory.dmp

    Filesize

    160KB

  • memory/5108-1004-0x00000000076E0000-0x00000000076F0000-memory.dmp

    Filesize

    64KB