Analysis

  • max time kernel
    86s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 07:47

General

  • Target

    863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe

  • Size

    618KB

  • MD5

    149452a7e79abcbb5c78cb4ae19406ef

  • SHA1

    e8c69450cb05333986df130c3f188a034501a637

  • SHA256

    863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8

  • SHA512

    6338b4d67fc0d2074cf07722141b6a6e60bc73fd255f24fc03c433f206bae42dfabc1da36984fbb0401d7801a258b33510c8f220d8020090db0f3fae8b8a9366

  • SSDEEP

    12288:9y90qDoYznLQWv5D3FY/kEroeRCc2NPYRJpsqY0HMD:9yxcYj7tSkEk5sJ6EY

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe
    "C:\Users\Admin\AppData\Local\Temp\863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 1892
          4⤵
          • Program crash
          PID:3952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4740 -ip 4740
    1⤵
      PID:3748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exe

      Filesize

      464KB

      MD5

      7d26f78f8bff6a42e2514a51f7718b9f

      SHA1

      b7aae96faf82904451cfb569040c37760b052743

      SHA256

      289f3eb70ec48e98ca7f134d19db129ef2d3bfc273315323ba214d350eb6291c

      SHA512

      8f6b3bb54912e8fca3a91a840512ee7515fbbd2965a400134e2c28c353e8a017ec62b842e101500b79f75ff470e3706b40f587a293df82b0dccd9497439a5a8c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exe

      Filesize

      464KB

      MD5

      7d26f78f8bff6a42e2514a51f7718b9f

      SHA1

      b7aae96faf82904451cfb569040c37760b052743

      SHA256

      289f3eb70ec48e98ca7f134d19db129ef2d3bfc273315323ba214d350eb6291c

      SHA512

      8f6b3bb54912e8fca3a91a840512ee7515fbbd2965a400134e2c28c353e8a017ec62b842e101500b79f75ff470e3706b40f587a293df82b0dccd9497439a5a8c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exe

      Filesize

      478KB

      MD5

      550f75285675558dc07ea63335a6ba16

      SHA1

      18d9bdf3a9519cbf061c82a9817852ab8e8088d8

      SHA256

      a022aee5c1454e0e830529bad754aeb2ec99b8f9a9e9d713e831afc4a5e28895

      SHA512

      2da53a17e5086e08853f1dfff358d05a6a7bb79f818d43c4c7d38916ac2567f203c2a0e299138be3f3312cdf6a86b0bdb93fd9a53bf9bce7466f8e68643f2e2c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exe

      Filesize

      478KB

      MD5

      550f75285675558dc07ea63335a6ba16

      SHA1

      18d9bdf3a9519cbf061c82a9817852ab8e8088d8

      SHA256

      a022aee5c1454e0e830529bad754aeb2ec99b8f9a9e9d713e831afc4a5e28895

      SHA512

      2da53a17e5086e08853f1dfff358d05a6a7bb79f818d43c4c7d38916ac2567f203c2a0e299138be3f3312cdf6a86b0bdb93fd9a53bf9bce7466f8e68643f2e2c

    • memory/1920-969-0x0000000000C80000-0x0000000000CA8000-memory.dmp

      Filesize

      160KB

    • memory/1920-970-0x00000000079F0000-0x0000000007A00000-memory.dmp

      Filesize

      64KB

    • memory/4152-147-0x0000000000610000-0x000000000061A000-memory.dmp

      Filesize

      40KB

    • memory/4740-186-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-198-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-155-0x0000000004E80000-0x0000000005424000-memory.dmp

      Filesize

      5.6MB

    • memory/4740-156-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/4740-157-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-160-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-158-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-162-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-164-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-166-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-168-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-170-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-172-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-174-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-176-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-178-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-180-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-182-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-184-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-153-0x0000000002460000-0x00000000024A6000-memory.dmp

      Filesize

      280KB

    • memory/4740-192-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-194-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-190-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-188-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-196-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-154-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/4740-200-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-202-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-204-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-206-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-208-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-212-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-210-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-214-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-216-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-218-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-220-0x0000000002AB0000-0x0000000002AE5000-memory.dmp

      Filesize

      212KB

    • memory/4740-949-0x00000000078B0000-0x0000000007EC8000-memory.dmp

      Filesize

      6.1MB

    • memory/4740-950-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/4740-951-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/4740-952-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/4740-953-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/4740-954-0x00000000083B0000-0x0000000008416000-memory.dmp

      Filesize

      408KB

    • memory/4740-955-0x0000000008A70000-0x0000000008B02000-memory.dmp

      Filesize

      584KB

    • memory/4740-956-0x0000000008C40000-0x0000000008CB6000-memory.dmp

      Filesize

      472KB

    • memory/4740-957-0x0000000008CF0000-0x0000000008D0E000-memory.dmp

      Filesize

      120KB

    • memory/4740-958-0x0000000008DA0000-0x0000000008DF0000-memory.dmp

      Filesize

      320KB

    • memory/4740-959-0x0000000008E10000-0x0000000008FD2000-memory.dmp

      Filesize

      1.8MB

    • memory/4740-960-0x0000000008FE0000-0x000000000950C000-memory.dmp

      Filesize

      5.2MB

    • memory/4740-963-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/4740-964-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB