Analysis

  • max time kernel
    99s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 08:53

General

  • Target

    6ac1ba9ca0c59ad3bd9655eae0c1b112b836cbfb8c4574c3b9d78a7173c023c4.exe

  • Size

    618KB

  • MD5

    648add0222a7965230580cf5daa5ded3

  • SHA1

    7d5fd8378cbe1601396d5fea71cfcea9df73d647

  • SHA256

    6ac1ba9ca0c59ad3bd9655eae0c1b112b836cbfb8c4574c3b9d78a7173c023c4

  • SHA512

    9312b179eb79987c07f732775bb7f3815ff70af51b4bd79fdf6d00eb071d6bfd48c45f5c6bb0ad69e79608e001eee9a38281240ae26e7bc33c45ad6b330b038d

  • SSDEEP

    12288:sy90LO+/G2KqsuTX+MC1MdxXvI0ZpXKeR5chNPjTlwuY7NPkNNyvs2Fv:syrlqHTX+MCSdxXA0ZpaTnlI7KNyEU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac1ba9ca0c59ad3bd9655eae0c1b112b836cbfb8c4574c3b9d78a7173c023c4.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac1ba9ca0c59ad3bd9655eae0c1b112b836cbfb8c4574c3b9d78a7173c023c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st823334.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st823334.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02242504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02242504.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002421.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002421.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 1896
          4⤵
          • Program crash
          PID:2176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923942.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923942.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:668
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 900 -ip 900
    1⤵
      PID:3308

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923942.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923942.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st823334.exe

      Filesize

      464KB

      MD5

      807914e3927e7d1d4ee2c61c1f294fe7

      SHA1

      b88b189521772f3309bedf50af2e429b9c44510d

      SHA256

      ee648c360e914171d6ea349bbca4978526e3d0d91b1821779ccf42f11d2b3290

      SHA512

      16fcabdf766cf6c7106c94a239a67a74fb24bf435db1d9f64f58a644ed932f686e0450f4707b944bd44e30601b5a48bc4b287f1cfb0a380ad071b73358116d9b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st823334.exe

      Filesize

      464KB

      MD5

      807914e3927e7d1d4ee2c61c1f294fe7

      SHA1

      b88b189521772f3309bedf50af2e429b9c44510d

      SHA256

      ee648c360e914171d6ea349bbca4978526e3d0d91b1821779ccf42f11d2b3290

      SHA512

      16fcabdf766cf6c7106c94a239a67a74fb24bf435db1d9f64f58a644ed932f686e0450f4707b944bd44e30601b5a48bc4b287f1cfb0a380ad071b73358116d9b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02242504.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02242504.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002421.exe

      Filesize

      478KB

      MD5

      cdead08a9dca4b55f03e1227bd399f1f

      SHA1

      ba911aa46a293e0fbbe58786f33fcac2a56f9704

      SHA256

      e137cbad7e320d99348d04ebffb8608153dc7e5ce1c3861af42f749cee32bbec

      SHA512

      89cd476a5f27a58b836899afb9763c628d32f962ca499ba0dd2076ed8f88d316af6972b359bf617741121eef4b60a11c2c07a3a7c4888694929bbca417f9187a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002421.exe

      Filesize

      478KB

      MD5

      cdead08a9dca4b55f03e1227bd399f1f

      SHA1

      ba911aa46a293e0fbbe58786f33fcac2a56f9704

      SHA256

      e137cbad7e320d99348d04ebffb8608153dc7e5ce1c3861af42f749cee32bbec

      SHA512

      89cd476a5f27a58b836899afb9763c628d32f962ca499ba0dd2076ed8f88d316af6972b359bf617741121eef4b60a11c2c07a3a7c4888694929bbca417f9187a

    • memory/668-968-0x0000000000FF0000-0x0000000001018000-memory.dmp

      Filesize

      160KB

    • memory/668-969-0x0000000007D80000-0x0000000007D90000-memory.dmp

      Filesize

      64KB

    • memory/900-187-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-197-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-154-0x0000000002370000-0x00000000023B6000-memory.dmp

      Filesize

      280KB

    • memory/900-157-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/900-156-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/900-158-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-159-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-161-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-163-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-165-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-167-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-169-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-171-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-173-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-175-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-177-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-179-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-181-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-183-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-185-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-153-0x0000000004F90000-0x0000000005534000-memory.dmp

      Filesize

      5.6MB

    • memory/900-189-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-191-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-193-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-195-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-155-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/900-199-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-201-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-205-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-203-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-207-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-209-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-211-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-213-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-215-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-217-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-219-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-221-0x0000000002970000-0x00000000029A5000-memory.dmp

      Filesize

      212KB

    • memory/900-950-0x00000000078C0000-0x0000000007ED8000-memory.dmp

      Filesize

      6.1MB

    • memory/900-951-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/900-952-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/900-953-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/900-954-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/900-955-0x00000000083B0000-0x0000000008416000-memory.dmp

      Filesize

      408KB

    • memory/900-956-0x0000000008A70000-0x0000000008B02000-memory.dmp

      Filesize

      584KB

    • memory/900-957-0x0000000008B20000-0x0000000008B96000-memory.dmp

      Filesize

      472KB

    • memory/900-958-0x0000000008BE0000-0x0000000008BFE000-memory.dmp

      Filesize

      120KB

    • memory/900-959-0x0000000008E00000-0x0000000008FC2000-memory.dmp

      Filesize

      1.8MB

    • memory/900-960-0x0000000008FD0000-0x00000000094FC000-memory.dmp

      Filesize

      5.2MB

    • memory/900-961-0x00000000026E0000-0x0000000002730000-memory.dmp

      Filesize

      320KB

    • memory/1648-147-0x0000000000490000-0x000000000049A000-memory.dmp

      Filesize

      40KB