Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 21:43

General

  • Target

    ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13.exe

  • Size

    747KB

  • MD5

    10c8c50b725c5e010ec8ea285f8c2b0b

  • SHA1

    8657da84cc3aefeaf01cca7550e72d6c672d0eaf

  • SHA256

    ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13

  • SHA512

    d071fd48e5a5b4f9fa71c162bb2e19ff78c8d220e0db4fabd7101655fe46516ffdc203d9f219a56c72bbe13d368c0af19f6356f7af83c3f506c30407fdb86393

  • SSDEEP

    12288:1y90YFTYMyxGrzWJ4SLMrnhtkrjeq39hQ0TbB4whrF2Av984va0Vzf:1yZgAChMrnhuHJG8bBZNW4v3zf

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13.exe
    "C:\Users\Admin\AppData\Local\Temp\ac354971e92ba6f5361984e2e4012e8f53dfecd98f2bc2ad699724b4fde44d13.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687931.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687931.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52633981.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52633981.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011576.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011576.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242589.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242589.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4980
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3444

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242589.exe

          Filesize

          136KB

          MD5

          b9f17cc95395f13838ba119abc3f742f

          SHA1

          ecdbc7ef78234c1c7009fdbc6f744c511067767d

          SHA256

          2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

          SHA512

          bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242589.exe

          Filesize

          136KB

          MD5

          b9f17cc95395f13838ba119abc3f742f

          SHA1

          ecdbc7ef78234c1c7009fdbc6f744c511067767d

          SHA256

          2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

          SHA512

          bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687931.exe

          Filesize

          592KB

          MD5

          9316a9492f87dc66c28ad520f93e1f86

          SHA1

          7bf88e43adc6919744804fa9fb448c65ad172c4f

          SHA256

          f4e2bde3bb8daf44035631ae4737f2e7b271e4e5c52c70eecec3903c59778e0e

          SHA512

          21f749ba049e5d8fab0918e9a3d30a9ae069b97f335e28a59432395458afc3b76029468ec0dbd1b449046886bf67cf566b2cd0a068a091c8beaf975d1843b8c2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687931.exe

          Filesize

          592KB

          MD5

          9316a9492f87dc66c28ad520f93e1f86

          SHA1

          7bf88e43adc6919744804fa9fb448c65ad172c4f

          SHA256

          f4e2bde3bb8daf44035631ae4737f2e7b271e4e5c52c70eecec3903c59778e0e

          SHA512

          21f749ba049e5d8fab0918e9a3d30a9ae069b97f335e28a59432395458afc3b76029468ec0dbd1b449046886bf67cf566b2cd0a068a091c8beaf975d1843b8c2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52633981.exe

          Filesize

          377KB

          MD5

          60bf833b3dcf22c21cf0ebcb1c623d7a

          SHA1

          6133c9ee0067d3cd96912878f338b92ed1053c7e

          SHA256

          295b2f117aa0405ed8cb0be099b1ec407482fcf363acdc57680d01f6df78be38

          SHA512

          47e1327a89a0244e003c1796a8fee3c15a3a68a1e7eb43fa8399d6ca1abb393a17e4064b785d45127b93338a7646d55082b939a49511811fb2ff7d7fdc71dea0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52633981.exe

          Filesize

          377KB

          MD5

          60bf833b3dcf22c21cf0ebcb1c623d7a

          SHA1

          6133c9ee0067d3cd96912878f338b92ed1053c7e

          SHA256

          295b2f117aa0405ed8cb0be099b1ec407482fcf363acdc57680d01f6df78be38

          SHA512

          47e1327a89a0244e003c1796a8fee3c15a3a68a1e7eb43fa8399d6ca1abb393a17e4064b785d45127b93338a7646d55082b939a49511811fb2ff7d7fdc71dea0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011576.exe

          Filesize

          459KB

          MD5

          6d154e2335526dc9bfded95f4bec2212

          SHA1

          5e2d69c4978a6a05c78687bddd0a7e4c259434cd

          SHA256

          fa274ad8097dceda7c116e45a9bff33a8cf0d0e2ebb6ad760262e63eaae7a7b5

          SHA512

          78a83c247c9e7bd022e8c58a482bfb5cad0a670de94fa144eccbc043e24d1b600c9fddac4a92519783725bf89fb8b75d4eed3139877dcf22439bea8fe8224358

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011576.exe

          Filesize

          459KB

          MD5

          6d154e2335526dc9bfded95f4bec2212

          SHA1

          5e2d69c4978a6a05c78687bddd0a7e4c259434cd

          SHA256

          fa274ad8097dceda7c116e45a9bff33a8cf0d0e2ebb6ad760262e63eaae7a7b5

          SHA512

          78a83c247c9e7bd022e8c58a482bfb5cad0a670de94fa144eccbc043e24d1b600c9fddac4a92519783725bf89fb8b75d4eed3139877dcf22439bea8fe8224358

        • memory/3656-234-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-996-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/3656-1006-0x0000000009030000-0x000000000955C000-memory.dmp

          Filesize

          5.2MB

        • memory/3656-1005-0x0000000008E60000-0x0000000009022000-memory.dmp

          Filesize

          1.8MB

        • memory/3656-1004-0x0000000008D40000-0x0000000008D5E000-memory.dmp

          Filesize

          120KB

        • memory/3656-1003-0x0000000008C90000-0x0000000008D06000-memory.dmp

          Filesize

          472KB

        • memory/3656-1002-0x0000000008C30000-0x0000000008C80000-memory.dmp

          Filesize

          320KB

        • memory/3656-1001-0x0000000008A80000-0x0000000008B12000-memory.dmp

          Filesize

          584KB

        • memory/3656-1000-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/3656-999-0x00000000080B0000-0x00000000080EC000-memory.dmp

          Filesize

          240KB

        • memory/3656-998-0x0000000000B20000-0x0000000000B30000-memory.dmp

          Filesize

          64KB

        • memory/3656-997-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/3656-995-0x00000000078C0000-0x0000000007ED8000-memory.dmp

          Filesize

          6.1MB

        • memory/3656-236-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-232-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-230-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-228-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-226-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-224-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-222-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-220-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-218-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-216-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-199-0x00000000008F0000-0x0000000000936000-memory.dmp

          Filesize

          280KB

        • memory/3656-200-0x0000000000B20000-0x0000000000B30000-memory.dmp

          Filesize

          64KB

        • memory/3656-202-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-201-0x0000000000B20000-0x0000000000B30000-memory.dmp

          Filesize

          64KB

        • memory/3656-204-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-203-0x0000000000B20000-0x0000000000B30000-memory.dmp

          Filesize

          64KB

        • memory/3656-206-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-208-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-210-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-212-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/3656-214-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4640-155-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-150-0x00000000008E0000-0x000000000090D000-memory.dmp

          Filesize

          180KB

        • memory/4640-194-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/4640-192-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-191-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-190-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-189-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/4640-182-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-180-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-152-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-178-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-170-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-154-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-153-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4640-174-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-172-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-168-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-166-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-164-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-160-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-162-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-158-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-156-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4640-151-0x0000000005090000-0x0000000005634000-memory.dmp

          Filesize

          5.6MB

        • memory/4640-176-0x00000000026F0000-0x0000000002702000-memory.dmp

          Filesize

          72KB

        • memory/4980-1013-0x00000000006F0000-0x0000000000718000-memory.dmp

          Filesize

          160KB

        • memory/4980-1014-0x0000000007830000-0x0000000007840000-memory.dmp

          Filesize

          64KB