Analysis

  • max time kernel
    50s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/04/2023, 16:32

General

  • Target

    0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe

  • Size

    611KB

  • MD5

    9ac65334a29cc26f6b4b4abb3010076a

  • SHA1

    b5778b67dad098021f5c238438b1ae4d565181b5

  • SHA256

    0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76

  • SHA512

    aa9012a8b5b3692103582a2cd1890db51c551639cfc1a313a533e7404e6eff8d63eaff63953052fe6b645da171da29d3a28869a1d07de1242558989b7682c6fc

  • SSDEEP

    12288:6y90C+Y4fKc9hZ0LHeu+RiWdRHLW6ZXfSL8Nhy/WLM7Z3qIWZFG:6y5+YkzhEY9RrWCXfMF7ZgfG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe
    "C:\Users\Admin\AppData\Local\Temp\0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exe

    Filesize

    457KB

    MD5

    7a33949c5daf34443fb19fc6296ee0de

    SHA1

    c6dd035649f51cbce2453c6cadeb55187b7b4e8d

    SHA256

    9ef7a7d71b5e4bdf97822cf740ae29f13cefa1a992eb872c9513bf9e42377547

    SHA512

    d0cacae6592603276fdb8058778476511a5616d7c07c3ee5f3e2a4f36b5e5389568cf5d5a865c645216872dfe71dc522c7caa4f70e4e078805abdcb1c4a16227

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exe

    Filesize

    457KB

    MD5

    7a33949c5daf34443fb19fc6296ee0de

    SHA1

    c6dd035649f51cbce2453c6cadeb55187b7b4e8d

    SHA256

    9ef7a7d71b5e4bdf97822cf740ae29f13cefa1a992eb872c9513bf9e42377547

    SHA512

    d0cacae6592603276fdb8058778476511a5616d7c07c3ee5f3e2a4f36b5e5389568cf5d5a865c645216872dfe71dc522c7caa4f70e4e078805abdcb1c4a16227

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exe

    Filesize

    459KB

    MD5

    6368d32fa64520c1f26f19541758ebb7

    SHA1

    b77db6989e077d8677a5c9c0c02c60a709617dc9

    SHA256

    b98903e62d9320280589a07739dd26e96abf62e5c4d85d86c58c4257e477981a

    SHA512

    e74beaab58c15879079a5007ea499d7ee6688849e653455d0876b9c9c6dc42dffaadab61806cd1239751284bebe77c4e61775a8c78b6d50cb266f6206c3054fc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exe

    Filesize

    459KB

    MD5

    6368d32fa64520c1f26f19541758ebb7

    SHA1

    b77db6989e077d8677a5c9c0c02c60a709617dc9

    SHA256

    b98903e62d9320280589a07739dd26e96abf62e5c4d85d86c58c4257e477981a

    SHA512

    e74beaab58c15879079a5007ea499d7ee6688849e653455d0876b9c9c6dc42dffaadab61806cd1239751284bebe77c4e61775a8c78b6d50cb266f6206c3054fc

  • memory/336-956-0x0000000000BB0000-0x0000000000BD8000-memory.dmp

    Filesize

    160KB

  • memory/336-957-0x0000000007930000-0x000000000797B000-memory.dmp

    Filesize

    300KB

  • memory/336-958-0x0000000007990000-0x00000000079A0000-memory.dmp

    Filesize

    64KB

  • memory/1924-135-0x0000000000010000-0x000000000001A000-memory.dmp

    Filesize

    40KB

  • memory/2548-177-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-187-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-144-0x0000000004FF0000-0x00000000054EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2548-145-0x0000000002730000-0x000000000276A000-memory.dmp

    Filesize

    232KB

  • memory/2548-146-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-147-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-149-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-151-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-153-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-155-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-157-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-159-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-161-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-163-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-165-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-167-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-169-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-171-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-142-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/2548-179-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-181-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-175-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-185-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-183-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-173-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-143-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2548-189-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-191-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-193-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-203-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-201-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-199-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-207-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-209-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-205-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-197-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-195-0x0000000002730000-0x0000000002765000-memory.dmp

    Filesize

    212KB

  • memory/2548-938-0x0000000007870000-0x0000000007E76000-memory.dmp

    Filesize

    6.0MB

  • memory/2548-939-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

    Filesize

    72KB

  • memory/2548-940-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/2548-941-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/2548-942-0x0000000008130000-0x000000000817B000-memory.dmp

    Filesize

    300KB

  • memory/2548-943-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2548-944-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/2548-945-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/2548-946-0x0000000008C80000-0x0000000008CF6000-memory.dmp

    Filesize

    472KB

  • memory/2548-141-0x00000000023B0000-0x00000000023EC000-memory.dmp

    Filesize

    240KB

  • memory/2548-947-0x0000000008D40000-0x0000000008F02000-memory.dmp

    Filesize

    1.8MB

  • memory/2548-948-0x0000000008F20000-0x000000000944C000-memory.dmp

    Filesize

    5.2MB

  • memory/2548-949-0x0000000009570000-0x000000000958E000-memory.dmp

    Filesize

    120KB

  • memory/2548-950-0x0000000002430000-0x0000000002480000-memory.dmp

    Filesize

    320KB