Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-04-2023 11:59

General

  • Target

    978c9d920fbfb518845d504d97b74f7b7a9d27a219e0c0d56de4e587bce0c00b.exe

  • Size

    752KB

  • MD5

    2e8172fc6b5ddedcb5f9a74ed34d6a8a

  • SHA1

    62850374370720081109c54af0cc8c0353ecdb3d

  • SHA256

    978c9d920fbfb518845d504d97b74f7b7a9d27a219e0c0d56de4e587bce0c00b

  • SHA512

    87176f4e97a6dd7290045215ea5796ff4b8743c0502c1321c32f752b1ddebea95aefd153cd54d25e387c2aa914870b283c09d48b2e82034d704ffbf4436264a1

  • SSDEEP

    12288:cy90xIa+OnyZWqPMLIxm3ZQTuAZ4qnVUjf8Wzr1xdp8dW/6VZAsOny:cy3ccEsWAZZV68Wzrnz8ACZ7Uy

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\978c9d920fbfb518845d504d97b74f7b7a9d27a219e0c0d56de4e587bce0c00b.exe
    "C:\Users\Admin\AppData\Local\Temp\978c9d920fbfb518845d504d97b74f7b7a9d27a219e0c0d56de4e587bce0c00b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376509.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376509.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58270341.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58270341.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk503295.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk503295.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625568.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625568.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625568.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625568.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376509.exe

    Filesize

    598KB

    MD5

    781e3e0d7f1185d0cb23261959261951

    SHA1

    814e09f4f50dce99c73af9f06aae07b57b867202

    SHA256

    da9749551d3d7621662194c715b2fbf4bc7be4c350448d23780fdc11b5d052de

    SHA512

    94eb04c71da8bc2d51e5e43246e2b2fbfc45476196114acb7358ac7742086fa971e1c4d6f1b16ef650bc1cf6d39bebf5f8db4831cb5bffba7c8639b37617307d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376509.exe

    Filesize

    598KB

    MD5

    781e3e0d7f1185d0cb23261959261951

    SHA1

    814e09f4f50dce99c73af9f06aae07b57b867202

    SHA256

    da9749551d3d7621662194c715b2fbf4bc7be4c350448d23780fdc11b5d052de

    SHA512

    94eb04c71da8bc2d51e5e43246e2b2fbfc45476196114acb7358ac7742086fa971e1c4d6f1b16ef650bc1cf6d39bebf5f8db4831cb5bffba7c8639b37617307d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58270341.exe

    Filesize

    390KB

    MD5

    765a43e197f214d5025b3bbc8ac56c39

    SHA1

    2446f1de7dd84806bcb6b2a2e1320f68a45fe9ea

    SHA256

    20a379d7cdc57c8ae57e6d505b05e57816cc785a5ac05cdde71363bdf4a6485f

    SHA512

    e8a2259961de1a5a8730f39c22d596104500ece174682f36626d0749148e0502a8c5b688a0604149c60080d16efb68e91d41e3054bf8e406f4497379f69f6001

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58270341.exe

    Filesize

    390KB

    MD5

    765a43e197f214d5025b3bbc8ac56c39

    SHA1

    2446f1de7dd84806bcb6b2a2e1320f68a45fe9ea

    SHA256

    20a379d7cdc57c8ae57e6d505b05e57816cc785a5ac05cdde71363bdf4a6485f

    SHA512

    e8a2259961de1a5a8730f39c22d596104500ece174682f36626d0749148e0502a8c5b688a0604149c60080d16efb68e91d41e3054bf8e406f4497379f69f6001

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk503295.exe

    Filesize

    473KB

    MD5

    cb36ef73e9e50bc15bbb5cc6f71d1086

    SHA1

    d7f04f250398adce04693f0e26d8b6686eb14e2a

    SHA256

    a4eb6ebb4c6470ede631d359ab8ed296976cde463f1ac39af7c75cef8169ad3b

    SHA512

    f24117cec0c8007784248ad014624b6c0519999f940c393ca154005c8185b2e08a19534556042cf33723be8522c8f98ba5eb444c59e0ce2ec14b521487c63bd8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk503295.exe

    Filesize

    473KB

    MD5

    cb36ef73e9e50bc15bbb5cc6f71d1086

    SHA1

    d7f04f250398adce04693f0e26d8b6686eb14e2a

    SHA256

    a4eb6ebb4c6470ede631d359ab8ed296976cde463f1ac39af7c75cef8169ad3b

    SHA512

    f24117cec0c8007784248ad014624b6c0519999f940c393ca154005c8185b2e08a19534556042cf33723be8522c8f98ba5eb444c59e0ce2ec14b521487c63bd8

  • memory/3980-975-0x00000000078A0000-0x0000000007EA6000-memory.dmp

    Filesize

    6.0MB

  • memory/3980-216-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-204-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-202-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-183-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/3980-182-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-987-0x0000000002550000-0x00000000025A0000-memory.dmp

    Filesize

    320KB

  • memory/3980-986-0x0000000009320000-0x000000000933E000-memory.dmp

    Filesize

    120KB

  • memory/3980-985-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/3980-984-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/3980-190-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-983-0x0000000008A30000-0x0000000008AA6000-memory.dmp

    Filesize

    472KB

  • memory/3980-982-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/3980-981-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/3980-980-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/3980-979-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/3980-978-0x0000000007FC0000-0x0000000007FFE000-memory.dmp

    Filesize

    248KB

  • memory/3980-977-0x0000000007EB0000-0x0000000007FBA000-memory.dmp

    Filesize

    1.0MB

  • memory/3980-976-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

    Filesize

    72KB

  • memory/3980-206-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-214-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-212-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-177-0x00000000023A0000-0x00000000023DC000-memory.dmp

    Filesize

    240KB

  • memory/3980-178-0x0000000002860000-0x000000000289A000-memory.dmp

    Filesize

    232KB

  • memory/3980-179-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/3980-181-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/3980-180-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-186-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-185-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/3980-188-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-200-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-210-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-208-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-192-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-194-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-196-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/3980-198-0x0000000002860000-0x0000000002895000-memory.dmp

    Filesize

    212KB

  • memory/4108-993-0x0000000000E00000-0x0000000000E28000-memory.dmp

    Filesize

    160KB

  • memory/4108-994-0x0000000007B80000-0x0000000007BCB000-memory.dmp

    Filesize

    300KB

  • memory/4108-995-0x0000000007C00000-0x0000000007C10000-memory.dmp

    Filesize

    64KB

  • memory/4128-168-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/4128-158-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-136-0x0000000000A40000-0x0000000000A5A000-memory.dmp

    Filesize

    104KB

  • memory/4128-138-0x0000000002870000-0x0000000002888000-memory.dmp

    Filesize

    96KB

  • memory/4128-139-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-172-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4128-137-0x0000000004E50000-0x000000000534E000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-170-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4128-169-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/4128-140-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-167-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/4128-166-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-164-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-162-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-160-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-156-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-154-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-152-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-150-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-148-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4128-146-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-144-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB

  • memory/4128-142-0x0000000002870000-0x0000000002882000-memory.dmp

    Filesize

    72KB