Analysis

  • max time kernel
    49s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/04/2023, 13:51

General

  • Target

    18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe

  • Size

    747KB

  • MD5

    046bcaa1454c927e6343e2b18ad6d8b3

  • SHA1

    d3c0f3fd65dd2306138e07eb853520d28f605bca

  • SHA256

    18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659

  • SHA512

    dcd238187f3bb6dd4fe9643b82815639a2d69735a690fb4584a65527861c30457b18a30a430fc763c7e69159d6bc0e9d1d1e34953c8b078573b62235964f4bd4

  • SSDEEP

    12288:py90swXftqNrhIZ/F3mTmeiVTpTg/TAtMAyLN75/HfOiyhN29BmuGubYwmp:pyV0fQNrQF8NiVT6MCAYdvfOnS7ml0JM

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe
    "C:\Users\Admin\AppData\Local\Temp\18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exe

    Filesize

    593KB

    MD5

    3794e7fd4c287eb43ede9cda982699ba

    SHA1

    d16534eafa4d3b1725815166a61d33b44baf7816

    SHA256

    9e40d4f957a1d5bfb4a41b746cca8ce570a4f6bd7871f622822c879097021e46

    SHA512

    2856b691ddb99e1b77999bf5149f996a84d9f8ce81943dfeb3c94313882d537e38bdc7a763fb44fbac9c1551392606fbce6de2859c7bc32fab00ef60c40e393d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exe

    Filesize

    593KB

    MD5

    3794e7fd4c287eb43ede9cda982699ba

    SHA1

    d16534eafa4d3b1725815166a61d33b44baf7816

    SHA256

    9e40d4f957a1d5bfb4a41b746cca8ce570a4f6bd7871f622822c879097021e46

    SHA512

    2856b691ddb99e1b77999bf5149f996a84d9f8ce81943dfeb3c94313882d537e38bdc7a763fb44fbac9c1551392606fbce6de2859c7bc32fab00ef60c40e393d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exe

    Filesize

    378KB

    MD5

    defd4a12d7e427c133df6c6e2437ab92

    SHA1

    01744fa5145386f3c81366e2eb0d3c9522843816

    SHA256

    c780b7dbbeeadcd83040991058bb9db4c3e31d450c7ac47b6a0708bf33bac4c0

    SHA512

    0243fcf767440d6f6ae5b5358756efa8f839a7e95721036514ac007947d8a12983b6da62545e9e80a244c1889a46e0dd8072109b6ac102fe30eeb03be89f3400

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exe

    Filesize

    378KB

    MD5

    defd4a12d7e427c133df6c6e2437ab92

    SHA1

    01744fa5145386f3c81366e2eb0d3c9522843816

    SHA256

    c780b7dbbeeadcd83040991058bb9db4c3e31d450c7ac47b6a0708bf33bac4c0

    SHA512

    0243fcf767440d6f6ae5b5358756efa8f839a7e95721036514ac007947d8a12983b6da62545e9e80a244c1889a46e0dd8072109b6ac102fe30eeb03be89f3400

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exe

    Filesize

    460KB

    MD5

    f6f05bb9bfc229c6cd1407b8fd90b22c

    SHA1

    a6134bc98eba208e766dd41415d6a3e79b20b76f

    SHA256

    74a135c3c7ab2de3482067411f88abcd9f947f5d284a75dc2d06be7443bf8f4d

    SHA512

    2ad90a3e6a6bcabc04caa0e8b249c93ceb0fdb14755ea14a0784e4e43d8339df19839cfba1c7b868cedcc674b36e51f83767001cd75ad298389067a50da6a804

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exe

    Filesize

    460KB

    MD5

    f6f05bb9bfc229c6cd1407b8fd90b22c

    SHA1

    a6134bc98eba208e766dd41415d6a3e79b20b76f

    SHA256

    74a135c3c7ab2de3482067411f88abcd9f947f5d284a75dc2d06be7443bf8f4d

    SHA512

    2ad90a3e6a6bcabc04caa0e8b249c93ceb0fdb14755ea14a0784e4e43d8339df19839cfba1c7b868cedcc674b36e51f83767001cd75ad298389067a50da6a804

  • memory/3712-976-0x0000000007850000-0x0000000007E56000-memory.dmp

    Filesize

    6.0MB

  • memory/3712-243-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-992-0x0000000002380000-0x00000000023D0000-memory.dmp

    Filesize

    320KB

  • memory/3712-991-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-990-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-989-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-193-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-987-0x0000000009340000-0x000000000935E000-memory.dmp

    Filesize

    120KB

  • memory/3712-986-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/3712-197-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-985-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/3712-984-0x0000000008A30000-0x0000000008AA6000-memory.dmp

    Filesize

    472KB

  • memory/3712-983-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/3712-982-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/3712-981-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/3712-980-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/3712-979-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-978-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3712-977-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/3712-195-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-239-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-242-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/3712-238-0x0000000000A10000-0x0000000000A56000-memory.dmp

    Filesize

    280KB

  • memory/3712-213-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-211-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-178-0x00000000026B0000-0x00000000026EC000-memory.dmp

    Filesize

    240KB

  • memory/3712-179-0x0000000002870000-0x00000000028AA000-memory.dmp

    Filesize

    232KB

  • memory/3712-180-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-181-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-183-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-185-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-187-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-189-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-191-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-209-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-203-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-207-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-199-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-201-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/3712-205-0x0000000002870000-0x00000000028A5000-memory.dmp

    Filesize

    212KB

  • memory/4116-168-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/4116-151-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-145-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-136-0x0000000004DF0000-0x00000000052EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4116-137-0x00000000023D0000-0x00000000023E8000-memory.dmp

    Filesize

    96KB

  • memory/4116-173-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/4116-171-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-170-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-169-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-135-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-138-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-167-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-165-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-163-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-161-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-159-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-157-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-155-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-153-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-149-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-147-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-143-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-141-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-140-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-139-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4116-134-0x00000000022C0000-0x00000000022DA000-memory.dmp

    Filesize

    104KB

  • memory/4116-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4488-998-0x0000000000070000-0x0000000000098000-memory.dmp

    Filesize

    160KB

  • memory/4488-999-0x0000000006DF0000-0x0000000006E3B000-memory.dmp

    Filesize

    300KB

  • memory/4488-1000-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB