Analysis

  • max time kernel
    82s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 12:35

General

  • Target

    c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe

  • Size

    752KB

  • MD5

    41ba94944b619d14810e8bb046f3fbc0

  • SHA1

    9cdaa9ee435ed6a5d50c2c560dadf11082400de1

  • SHA256

    c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db

  • SHA512

    144cf275d3847f7ff3c3cbb310bcb6632f238201933823c2c7eea9ec23fc6997387b779778f35ceb251e6cc1220b10cedc710d2c26aa2ee9620420cd1f5b42e4

  • SSDEEP

    12288:Ay90TDaobuQtAf4jZyilC3urW/K7Ye+KhTXnOCgOQM2:Ay62KuQWf6FW/K7YxKhTXOCGj

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe
    "C:\Users\Admin\AppData\Local\Temp\c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe

          Filesize

          136KB

          MD5

          ace73b2b1f835de11594ea9a243a9f5c

          SHA1

          2f929d1f69784fbe499a95b064679a16947bdd84

          SHA256

          7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

          SHA512

          024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe

          Filesize

          136KB

          MD5

          ace73b2b1f835de11594ea9a243a9f5c

          SHA1

          2f929d1f69784fbe499a95b064679a16947bdd84

          SHA256

          7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

          SHA512

          024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe

          Filesize

          598KB

          MD5

          e50b22c8b3dbf63d4241e17b81d117f7

          SHA1

          ca4eefdd271b182321ab437dc4c942f724607b3c

          SHA256

          9b72cb758b38b4da57efef2b11d0123ef4def543d534a0b871298c5a2d772942

          SHA512

          40c46bdbedd248456359dcf0dc10d2ea9664860324b91e052ac9df87c64c20911232a5a2a54b42b6dbcd0052bc012a8aa194c9f44fb66876701837240516b8c3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe

          Filesize

          598KB

          MD5

          e50b22c8b3dbf63d4241e17b81d117f7

          SHA1

          ca4eefdd271b182321ab437dc4c942f724607b3c

          SHA256

          9b72cb758b38b4da57efef2b11d0123ef4def543d534a0b871298c5a2d772942

          SHA512

          40c46bdbedd248456359dcf0dc10d2ea9664860324b91e052ac9df87c64c20911232a5a2a54b42b6dbcd0052bc012a8aa194c9f44fb66876701837240516b8c3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe

          Filesize

          390KB

          MD5

          659f79f368d29a5795791aea808626e6

          SHA1

          9bad21d6fcad43ec9028d7f6354ea2f491060011

          SHA256

          50ed633d56f32cb8f594629649b34dbf314133d21cf0c22757064ecf7fe55f33

          SHA512

          b7bc46ded9bfc80d19b2a1e3e0cf0e4626c614f71fbad6437efc0c266459337531e178fe98c5b0a518f2843e5f53cb368f6c45c3af750426e0430e478547ca52

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe

          Filesize

          390KB

          MD5

          659f79f368d29a5795791aea808626e6

          SHA1

          9bad21d6fcad43ec9028d7f6354ea2f491060011

          SHA256

          50ed633d56f32cb8f594629649b34dbf314133d21cf0c22757064ecf7fe55f33

          SHA512

          b7bc46ded9bfc80d19b2a1e3e0cf0e4626c614f71fbad6437efc0c266459337531e178fe98c5b0a518f2843e5f53cb368f6c45c3af750426e0430e478547ca52

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe

          Filesize

          473KB

          MD5

          70f17e6779ec33c346e1210bf8438f4c

          SHA1

          83a1d10a124e757e054bd46c15864cec0908b34c

          SHA256

          a9565a1de27d3534a94d98e7a7a31af976f2a4f3f7be94553b489448e0174f08

          SHA512

          9727a201a6dcb7d54ec8a7a7895e63ec40cabfd82c30aefd379332a7b5905aa8cb4d4b0dac6950905f116dfce9aacec1f10f8f93766152459e626318617d4b69

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe

          Filesize

          473KB

          MD5

          70f17e6779ec33c346e1210bf8438f4c

          SHA1

          83a1d10a124e757e054bd46c15864cec0908b34c

          SHA256

          a9565a1de27d3534a94d98e7a7a31af976f2a4f3f7be94553b489448e0174f08

          SHA512

          9727a201a6dcb7d54ec8a7a7895e63ec40cabfd82c30aefd379332a7b5905aa8cb4d4b0dac6950905f116dfce9aacec1f10f8f93766152459e626318617d4b69

        • memory/616-158-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-168-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-150-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-151-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-152-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-153-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-154-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-156-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-148-0x0000000005010000-0x00000000055B4000-memory.dmp

          Filesize

          5.6MB

        • memory/616-160-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-162-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-164-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-166-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-149-0x0000000000930000-0x000000000095D000-memory.dmp

          Filesize

          180KB

        • memory/616-170-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-172-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-174-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-176-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-178-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-180-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/616-181-0x0000000000400000-0x0000000000807000-memory.dmp

          Filesize

          4.0MB

        • memory/616-182-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-183-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-184-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/616-186-0x0000000000400000-0x0000000000807000-memory.dmp

          Filesize

          4.0MB

        • memory/1424-1004-0x0000000000520000-0x0000000000548000-memory.dmp

          Filesize

          160KB

        • memory/1424-1005-0x00000000075E0000-0x00000000075F0000-memory.dmp

          Filesize

          64KB

        • memory/3964-191-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-194-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-195-0x0000000002430000-0x0000000002476000-memory.dmp

          Filesize

          280KB

        • memory/3964-197-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/3964-199-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/3964-198-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-202-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-200-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/3964-204-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-206-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-208-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-210-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-212-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-214-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-216-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-218-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-220-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-222-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-224-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-226-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-228-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-987-0x0000000007920000-0x0000000007F38000-memory.dmp

          Filesize

          6.1MB

        • memory/3964-988-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/3964-989-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/3964-990-0x00000000080B0000-0x00000000080EC000-memory.dmp

          Filesize

          240KB

        • memory/3964-991-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/3964-992-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/3964-993-0x0000000008A80000-0x0000000008B12000-memory.dmp

          Filesize

          584KB

        • memory/3964-994-0x0000000008C40000-0x0000000008CB6000-memory.dmp

          Filesize

          472KB

        • memory/3964-995-0x0000000008D10000-0x0000000008ED2000-memory.dmp

          Filesize

          1.8MB

        • memory/3964-192-0x0000000004DF0000-0x0000000004E25000-memory.dmp

          Filesize

          212KB

        • memory/3964-996-0x0000000008EF0000-0x000000000941C000-memory.dmp

          Filesize

          5.2MB

        • memory/3964-997-0x00000000094A0000-0x00000000094BE000-memory.dmp

          Filesize

          120KB

        • memory/3964-998-0x00000000026F0000-0x0000000002740000-memory.dmp

          Filesize

          320KB