Analysis

  • max time kernel
    109s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 01:43

General

  • Target

    924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe

  • Size

    706KB

  • MD5

    6f9e62d0b6c4578041bb7e5f260a3af2

  • SHA1

    99a757be872960e28dda4cb2fe97a4b606065158

  • SHA256

    924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414

  • SHA512

    dff51890031e5dbc8f1f9432ea3e737654269b53f5718319326c9889ac2fbe32b172e55453986c223f7efdeef009649f5a4ce26f920ca20c28e4b18ea01bf543

  • SSDEEP

    12288:cy90EHGH019kpTfCWI9r/tgg12QwRvXZtRhvTNc+CPPmr9:cyTTAdaW8rXWFhyPk

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe
    "C:\Users\Admin\AppData\Local\Temp\924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1092
          4⤵
          • Program crash
          PID:1300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 1328
          4⤵
          • Program crash
          PID:3016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1736 -ip 1736
    1⤵
      PID:1652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1692 -ip 1692
      1⤵
        PID:2000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exe

        Filesize

        136KB

        MD5

        49650cdcdc358bb2770f0062abeef88c

        SHA1

        d6f7ec7758e9a80700b81bc7a549838ba99aacac

        SHA256

        79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

        SHA512

        7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exe

        Filesize

        552KB

        MD5

        19f9632982792a5a11ddeb88f14a9226

        SHA1

        4811d69fe59a8c0151e832ac2fe9aeb61a7c6ed8

        SHA256

        ed5feb17fdb848d3efca4ae34acf797e4b4b358f19ab9302cf4630443dd4d46f

        SHA512

        455925e5b2e994720379494bed231992b17c76ae0163483a595c85594e469135a5f883cfbe6d90be09517c687183c2be7f88b922b3f25037db47c1f469e2e704

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exe

        Filesize

        552KB

        MD5

        19f9632982792a5a11ddeb88f14a9226

        SHA1

        4811d69fe59a8c0151e832ac2fe9aeb61a7c6ed8

        SHA256

        ed5feb17fdb848d3efca4ae34acf797e4b4b358f19ab9302cf4630443dd4d46f

        SHA512

        455925e5b2e994720379494bed231992b17c76ae0163483a595c85594e469135a5f883cfbe6d90be09517c687183c2be7f88b922b3f25037db47c1f469e2e704

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exe

        Filesize

        260KB

        MD5

        f1963e78fe2ed50b885de8f90c72c49e

        SHA1

        e919a309e874b3eb4d08588a062e1a9c4ce479fe

        SHA256

        ba1de04b6e806a488b2da64d3dce7d8ad43e1d7fed1274208e00e052688a2371

        SHA512

        e06e5cf6373097c349b38ed8d6ecb0930c14c71bd703c0b2a147d75dc3e12fa669a3d1077bbcdc2b8a30dac7f2eae7d6ce96d50471838c48214fc2d34e7a8d8c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exe

        Filesize

        260KB

        MD5

        f1963e78fe2ed50b885de8f90c72c49e

        SHA1

        e919a309e874b3eb4d08588a062e1a9c4ce479fe

        SHA256

        ba1de04b6e806a488b2da64d3dce7d8ad43e1d7fed1274208e00e052688a2371

        SHA512

        e06e5cf6373097c349b38ed8d6ecb0930c14c71bd703c0b2a147d75dc3e12fa669a3d1077bbcdc2b8a30dac7f2eae7d6ce96d50471838c48214fc2d34e7a8d8c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exe

        Filesize

        343KB

        MD5

        1b5e3c5baaa3bd05e9377cef8c239331

        SHA1

        a838a559c7c002fc6abf5bb4fd9f2f8640941f47

        SHA256

        f2a7ddacab5133c79faa0747418a56511e2c6eed4a1c213ba5d4740c596de786

        SHA512

        909bdafcb9792bc0450a4f3063cdc8942d8039cc2f9b398b7a9ccfc08171f75fde22ba31376bc58fa68973186fc737c0ef7746c373e174c36a6726f9bc343016

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exe

        Filesize

        343KB

        MD5

        1b5e3c5baaa3bd05e9377cef8c239331

        SHA1

        a838a559c7c002fc6abf5bb4fd9f2f8640941f47

        SHA256

        f2a7ddacab5133c79faa0747418a56511e2c6eed4a1c213ba5d4740c596de786

        SHA512

        909bdafcb9792bc0450a4f3063cdc8942d8039cc2f9b398b7a9ccfc08171f75fde22ba31376bc58fa68973186fc737c0ef7746c373e174c36a6726f9bc343016

      • memory/1692-237-0x0000000004A60000-0x0000000004A70000-memory.dmp

        Filesize

        64KB

      • memory/1692-988-0x0000000007C30000-0x0000000007C42000-memory.dmp

        Filesize

        72KB

      • memory/1692-998-0x0000000002520000-0x0000000002570000-memory.dmp

        Filesize

        320KB

      • memory/1692-997-0x0000000008CA0000-0x00000000091CC000-memory.dmp

        Filesize

        5.2MB

      • memory/1692-996-0x0000000008AD0000-0x0000000008C92000-memory.dmp

        Filesize

        1.8MB

      • memory/1692-995-0x00000000089B0000-0x00000000089CE000-memory.dmp

        Filesize

        120KB

      • memory/1692-994-0x0000000008900000-0x0000000008976000-memory.dmp

        Filesize

        472KB

      • memory/1692-993-0x0000000008840000-0x00000000088D2000-memory.dmp

        Filesize

        584KB

      • memory/1692-992-0x0000000008070000-0x00000000080D6000-memory.dmp

        Filesize

        408KB

      • memory/1692-991-0x0000000007D80000-0x0000000007DBC000-memory.dmp

        Filesize

        240KB

      • memory/1692-990-0x0000000004A60000-0x0000000004A70000-memory.dmp

        Filesize

        64KB

      • memory/1692-989-0x0000000007C50000-0x0000000007D5A000-memory.dmp

        Filesize

        1.0MB

      • memory/1692-987-0x0000000007570000-0x0000000007B88000-memory.dmp

        Filesize

        6.1MB

      • memory/1692-235-0x0000000004A60000-0x0000000004A70000-memory.dmp

        Filesize

        64KB

      • memory/1692-231-0x00000000004E0000-0x0000000000526000-memory.dmp

        Filesize

        280KB

      • memory/1692-233-0x0000000004A60000-0x0000000004A70000-memory.dmp

        Filesize

        64KB

      • memory/1692-224-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-222-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-220-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-218-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-216-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-214-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-210-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-191-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-192-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-194-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-196-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-198-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-200-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-202-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-204-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-206-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-208-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1692-212-0x0000000005060000-0x0000000005095000-memory.dmp

        Filesize

        212KB

      • memory/1736-153-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-148-0x00000000004C0000-0x00000000004ED000-memory.dmp

        Filesize

        180KB

      • memory/1736-186-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/1736-184-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-183-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-182-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-181-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/1736-180-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-178-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-150-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-176-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-170-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-152-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-151-0x0000000004B90000-0x0000000005134000-memory.dmp

        Filesize

        5.6MB

      • memory/1736-174-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-168-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-166-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-164-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-162-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-160-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-158-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-156-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-154-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/1736-149-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/1736-172-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/3632-1005-0x0000000000270000-0x0000000000298000-memory.dmp

        Filesize

        160KB

      • memory/3632-1006-0x00000000073A0000-0x00000000073B0000-memory.dmp

        Filesize

        64KB