Analysis

  • max time kernel
    94s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 22:55

General

  • Target

    74cb900edc37220d74dce6b454f74282dc07df9869be0c0c8bcec37496922685.exe

  • Size

    747KB

  • MD5

    1b6f307f13854e1abe2d2535ed283145

  • SHA1

    c012d7e874006a63dfcadf1c9b9762579d4edd2c

  • SHA256

    74cb900edc37220d74dce6b454f74282dc07df9869be0c0c8bcec37496922685

  • SHA512

    9ca115bd959796f5825750cdfbb5f8e16f86823b3df5fd32751807ddd873d81fab9da593a20e32c42696b550e08e239f45e1140389ff61e1e867ad38122ad0d1

  • SSDEEP

    12288:iy90I2+QYjW/nfraproGzW50+naUgm+smZzUh+2QEb54wD2B1e:iyFy/nfurx43nMm+smxUs27b5Z6I

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74cb900edc37220d74dce6b454f74282dc07df9869be0c0c8bcec37496922685.exe
    "C:\Users\Admin\AppData\Local\Temp\74cb900edc37220d74dce6b454f74282dc07df9869be0c0c8bcec37496922685.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un324334.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un324334.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33626786.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33626786.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk110707.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk110707.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860580.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860580.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860580.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860580.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un324334.exe

    Filesize

    593KB

    MD5

    67ca7f9ce19960ea6c450e1b527ba851

    SHA1

    e9fc7a5f20b3d55768c9f2a823faeba6586fa810

    SHA256

    eeb6db596d8ba5fb6beb5c3fa9be89367fe2499fcb84718a384575d3f8779c7d

    SHA512

    eeafaf106c1392d3aadfc066fad7273a7fe2ddf969cfb9a55bf8961b9c857207bd21190f46d1aa3de9320ca527c7a5f8796e39ef0381f2d90d37b3f4d75718fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un324334.exe

    Filesize

    593KB

    MD5

    67ca7f9ce19960ea6c450e1b527ba851

    SHA1

    e9fc7a5f20b3d55768c9f2a823faeba6586fa810

    SHA256

    eeb6db596d8ba5fb6beb5c3fa9be89367fe2499fcb84718a384575d3f8779c7d

    SHA512

    eeafaf106c1392d3aadfc066fad7273a7fe2ddf969cfb9a55bf8961b9c857207bd21190f46d1aa3de9320ca527c7a5f8796e39ef0381f2d90d37b3f4d75718fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33626786.exe

    Filesize

    377KB

    MD5

    1143721b3c25158d465e6d89ee5fc96f

    SHA1

    8fbb7d9649d54087d84b2abe34f5572da90bbda7

    SHA256

    ed3cfca2f0f76b16ea9c3b2862cca30153afca67b2d2333ef23cf929a06c1b3f

    SHA512

    201d748af180114aa6b124037f9bacbe2e082a48a187319680a6e9d68859010b590dc9422feb1e9ff71b2a5267dd6e3653ac90d01e8e60d12320a857be10dbbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33626786.exe

    Filesize

    377KB

    MD5

    1143721b3c25158d465e6d89ee5fc96f

    SHA1

    8fbb7d9649d54087d84b2abe34f5572da90bbda7

    SHA256

    ed3cfca2f0f76b16ea9c3b2862cca30153afca67b2d2333ef23cf929a06c1b3f

    SHA512

    201d748af180114aa6b124037f9bacbe2e082a48a187319680a6e9d68859010b590dc9422feb1e9ff71b2a5267dd6e3653ac90d01e8e60d12320a857be10dbbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk110707.exe

    Filesize

    459KB

    MD5

    182b388e46205e4e102920d370de878a

    SHA1

    331edf373ac9656eab1166186b89f2017cbb7373

    SHA256

    e0980b62f94b6604a8668890c872a6bff3dc6eee50ef0652f64df4f17184eb91

    SHA512

    3cef03bac6701811b546b1cb56503fdcb6eb6485e392e8d608005aee1ea54e8234f2bd928c01395aa91405ac1d834a01e5acdfd7d57718f871f997da80d4b503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk110707.exe

    Filesize

    459KB

    MD5

    182b388e46205e4e102920d370de878a

    SHA1

    331edf373ac9656eab1166186b89f2017cbb7373

    SHA256

    e0980b62f94b6604a8668890c872a6bff3dc6eee50ef0652f64df4f17184eb91

    SHA512

    3cef03bac6701811b546b1cb56503fdcb6eb6485e392e8d608005aee1ea54e8234f2bd928c01395aa91405ac1d834a01e5acdfd7d57718f871f997da80d4b503

  • memory/2004-1001-0x00000000005B0000-0x00000000005D8000-memory.dmp

    Filesize

    160KB

  • memory/2004-1002-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3884-159-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-169-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-151-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-153-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-155-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-157-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-149-0x0000000004F30000-0x00000000054D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3884-161-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-163-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-165-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-167-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-150-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-171-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-173-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-175-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-177-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

    Filesize

    72KB

  • memory/3884-178-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3884-179-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3884-180-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3884-181-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3884-183-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3884-148-0x00000000021F0000-0x000000000221D000-memory.dmp

    Filesize

    180KB

  • memory/4348-188-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-226-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4348-195-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-193-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-197-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-199-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-201-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-203-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-205-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-207-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-209-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-211-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-213-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-215-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-217-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-219-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-221-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-191-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-227-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/4348-232-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/4348-230-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/4348-984-0x0000000007930000-0x0000000007F48000-memory.dmp

    Filesize

    6.1MB

  • memory/4348-985-0x00000000029D0000-0x00000000029E2000-memory.dmp

    Filesize

    72KB

  • memory/4348-986-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/4348-987-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/4348-988-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/4348-989-0x00000000083B0000-0x0000000008416000-memory.dmp

    Filesize

    408KB

  • memory/4348-990-0x0000000008A80000-0x0000000008B12000-memory.dmp

    Filesize

    584KB

  • memory/4348-991-0x0000000008C30000-0x0000000008CA6000-memory.dmp

    Filesize

    472KB

  • memory/4348-992-0x0000000008CE0000-0x0000000008CFE000-memory.dmp

    Filesize

    120KB

  • memory/4348-189-0x0000000005430000-0x0000000005465000-memory.dmp

    Filesize

    212KB

  • memory/4348-993-0x0000000008DA0000-0x0000000008DF0000-memory.dmp

    Filesize

    320KB

  • memory/4348-994-0x0000000009000000-0x00000000091C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4348-995-0x00000000091E0000-0x000000000970C000-memory.dmp

    Filesize

    5.2MB