Analysis

  • max time kernel
    111s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 00:58

General

  • Target

    799c753afc25c52452ebb20a93aee59063f188440a6ff0383bdf14c3c344ed44.exe

  • Size

    563KB

  • MD5

    3fba57cb8370cab0b5db9e9f03615b0d

  • SHA1

    4355589f1572e39ff630b6a74d17a8476a7bfc6b

  • SHA256

    799c753afc25c52452ebb20a93aee59063f188440a6ff0383bdf14c3c344ed44

  • SHA512

    4a1fa1356eca2f82b801229d9a2568e2bd283534822222547ef6f12d78cc4e3da444c00d48f0d96f73d65d57500ec909556cd5cadc551cd4ce18f5fad13a28c7

  • SSDEEP

    12288:Dy90CVGr7xbAu28RBnr3h5I1Qz20vTTnMRPqDa9D7X:Dy7VGr7JVfrx0cBvTD2i293X

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\799c753afc25c52452ebb20a93aee59063f188440a6ff0383bdf14c3c344ed44.exe
    "C:\Users\Admin\AppData\Local\Temp\799c753afc25c52452ebb20a93aee59063f188440a6ff0383bdf14c3c344ed44.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st614114.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st614114.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32861089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32861089.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp984271.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp984271.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 2072
          4⤵
          • Program crash
          PID:4712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr387788.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr387788.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3180
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 220 -ip 220
    1⤵
      PID:4588

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr387788.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr387788.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st614114.exe

      Filesize

      409KB

      MD5

      b499515ff1d5355692caa8e966806a84

      SHA1

      86cb3a787836b555e99d9618a3c562358c77ac9e

      SHA256

      ac04db5dc64deba852cd0bb9ff5a7a41dd9701557d0d938c1d19f72a898d5bc3

      SHA512

      f7bf231f0265796fa4dec8014a4a818850fe0d91e064d2d2507114418f5e867148a9246fb7579ae81e601dfaa57b28c035d81708bae2a788a1463d8bf30e4003

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st614114.exe

      Filesize

      409KB

      MD5

      b499515ff1d5355692caa8e966806a84

      SHA1

      86cb3a787836b555e99d9618a3c562358c77ac9e

      SHA256

      ac04db5dc64deba852cd0bb9ff5a7a41dd9701557d0d938c1d19f72a898d5bc3

      SHA512

      f7bf231f0265796fa4dec8014a4a818850fe0d91e064d2d2507114418f5e867148a9246fb7579ae81e601dfaa57b28c035d81708bae2a788a1463d8bf30e4003

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32861089.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32861089.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp984271.exe

      Filesize

      361KB

      MD5

      f4d661376ce50eeaf9ceac00fa480af0

      SHA1

      f073c8c9eac9af4247539bda92a517626db52078

      SHA256

      880aab960a44dd5de0392196991a6048d7ccea326d0b90290a1ab2bcb4f44852

      SHA512

      309ff90ac992d8fa913da0ff16e20953a6b3ea0fd726f2be1a92fc00b97cadece4dc7077061d7b87627b286864e6defc154fd2d28191869fe32f2b3ac32bee46

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp984271.exe

      Filesize

      361KB

      MD5

      f4d661376ce50eeaf9ceac00fa480af0

      SHA1

      f073c8c9eac9af4247539bda92a517626db52078

      SHA256

      880aab960a44dd5de0392196991a6048d7ccea326d0b90290a1ab2bcb4f44852

      SHA512

      309ff90ac992d8fa913da0ff16e20953a6b3ea0fd726f2be1a92fc00b97cadece4dc7077061d7b87627b286864e6defc154fd2d28191869fe32f2b3ac32bee46

    • memory/220-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

      Filesize

      280KB

    • memory/220-154-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/220-155-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/220-156-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/220-157-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/220-158-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-161-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-163-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-159-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-165-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-167-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-169-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-171-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-173-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-175-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-177-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-179-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-181-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-183-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-185-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-187-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-189-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-191-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-193-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-195-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-197-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-199-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-201-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-203-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-205-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-207-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-209-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-211-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-213-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-215-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-217-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-219-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-221-0x0000000007880000-0x00000000078B5000-memory.dmp

      Filesize

      212KB

    • memory/220-950-0x0000000009DA0000-0x000000000A3B8000-memory.dmp

      Filesize

      6.1MB

    • memory/220-951-0x000000000A460000-0x000000000A472000-memory.dmp

      Filesize

      72KB

    • memory/220-952-0x000000000A480000-0x000000000A58A000-memory.dmp

      Filesize

      1.0MB

    • memory/220-953-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

      Filesize

      240KB

    • memory/220-954-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/220-955-0x000000000A8A0000-0x000000000A906000-memory.dmp

      Filesize

      408KB

    • memory/220-956-0x000000000AF70000-0x000000000B002000-memory.dmp

      Filesize

      584KB

    • memory/220-957-0x000000000B120000-0x000000000B196000-memory.dmp

      Filesize

      472KB

    • memory/220-958-0x000000000B1E0000-0x000000000B1FE000-memory.dmp

      Filesize

      120KB

    • memory/220-959-0x000000000B290000-0x000000000B2E0000-memory.dmp

      Filesize

      320KB

    • memory/220-960-0x000000000B2F0000-0x000000000B4B2000-memory.dmp

      Filesize

      1.8MB

    • memory/220-961-0x000000000B6D0000-0x000000000BBFC000-memory.dmp

      Filesize

      5.2MB

    • memory/448-147-0x0000000000680000-0x000000000068A000-memory.dmp

      Filesize

      40KB

    • memory/3180-968-0x0000000000EE0000-0x0000000000F08000-memory.dmp

      Filesize

      160KB

    • memory/3180-969-0x0000000008000000-0x0000000008010000-memory.dmp

      Filesize

      64KB