Analysis

  • max time kernel
    103s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 16:01

General

  • Target

    e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe

  • Size

    745KB

  • MD5

    87a976cdc0855156dceaa1bc6ed8edba

  • SHA1

    81753061d1ed3efbd1c711dbcec9d0df95bf76b7

  • SHA256

    e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0

  • SHA512

    4706bf438a9ed779d6d480e581aa49a714dcb2bdf58bd0c5ab6e87e1afe959fe5546de087faded781071418db7cc6d0d2531b29f6ff3c115d06fbf049f54dd17

  • SSDEEP

    12288:py90iCAA4KQ8ggsLMoSveY0CyKHzgp89GEb4X3Z+XfS+7YJN2zD1BlgN5b:pyLCAAFQhgmModnKT190Z+XfoJhfb

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe
    "C:\Users\Admin\AppData\Local\Temp\e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1080
          4⤵
          • Program crash
          PID:4908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1328
          4⤵
          • Program crash
          PID:4584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2180 -ip 2180
    1⤵
      PID:2328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2936 -ip 2936
      1⤵
        PID:3300

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exe

        Filesize

        136KB

        MD5

        ace73b2b1f835de11594ea9a243a9f5c

        SHA1

        2f929d1f69784fbe499a95b064679a16947bdd84

        SHA256

        7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

        SHA512

        024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exe

        Filesize

        136KB

        MD5

        ace73b2b1f835de11594ea9a243a9f5c

        SHA1

        2f929d1f69784fbe499a95b064679a16947bdd84

        SHA256

        7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

        SHA512

        024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exe

        Filesize

        591KB

        MD5

        5971c63104a3dfc2ddf4a8b76d418e50

        SHA1

        7ad427b1b2df83176a13f17c16d6806bb627995a

        SHA256

        749fced96c33744d36535e1c3f65463ba3d6c0892fb839aa6d8d84455e5a7e7f

        SHA512

        5fc75b357b66492df620ba7b118bb7796f44108c83b780b2b86d84efc84d5778da006ac91f7615dcc6367e8a1c2c842e8aa93e579bde1af7aadbd15af4926c43

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exe

        Filesize

        591KB

        MD5

        5971c63104a3dfc2ddf4a8b76d418e50

        SHA1

        7ad427b1b2df83176a13f17c16d6806bb627995a

        SHA256

        749fced96c33744d36535e1c3f65463ba3d6c0892fb839aa6d8d84455e5a7e7f

        SHA512

        5fc75b357b66492df620ba7b118bb7796f44108c83b780b2b86d84efc84d5778da006ac91f7615dcc6367e8a1c2c842e8aa93e579bde1af7aadbd15af4926c43

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exe

        Filesize

        376KB

        MD5

        9e41662369672bdf928cd7dd5b47c718

        SHA1

        34854976dade78f51e56bb35a0adb4513764d87f

        SHA256

        4f3410b6af47df8264e63fc30df5e14d64f179c80de38df5a206f5175c3fe044

        SHA512

        bd6681c98c67dcca97819b6a1339a873141a4214e42b3e61dec526ed5760b400193e85d4d4287c6e0150c68fce44b1fdf3c9c8ee39965eb046d8becdbfb99117

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exe

        Filesize

        376KB

        MD5

        9e41662369672bdf928cd7dd5b47c718

        SHA1

        34854976dade78f51e56bb35a0adb4513764d87f

        SHA256

        4f3410b6af47df8264e63fc30df5e14d64f179c80de38df5a206f5175c3fe044

        SHA512

        bd6681c98c67dcca97819b6a1339a873141a4214e42b3e61dec526ed5760b400193e85d4d4287c6e0150c68fce44b1fdf3c9c8ee39965eb046d8becdbfb99117

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exe

        Filesize

        459KB

        MD5

        341e411392b9d650acf1765843c5895e

        SHA1

        f6e02f85fcb5e826a434baa6e173fc3555521710

        SHA256

        17ac8db1d24290d737e59b59580cf537d33e2ad87139de6b111cd100096ed122

        SHA512

        5265f2e9b2f456a4e4342c90bc654fce920f1d1c16ded06af12c0f3e24ff8f0a99fd4bdf239de82388ace9402c705ffec0c24972772306145767163a7f0b6880

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exe

        Filesize

        459KB

        MD5

        341e411392b9d650acf1765843c5895e

        SHA1

        f6e02f85fcb5e826a434baa6e173fc3555521710

        SHA256

        17ac8db1d24290d737e59b59580cf537d33e2ad87139de6b111cd100096ed122

        SHA512

        5265f2e9b2f456a4e4342c90bc654fce920f1d1c16ded06af12c0f3e24ff8f0a99fd4bdf239de82388ace9402c705ffec0c24972772306145767163a7f0b6880

      • memory/2180-148-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/2180-149-0x0000000004E00000-0x00000000053A4000-memory.dmp

        Filesize

        5.6MB

      • memory/2180-150-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-151-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-153-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-155-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-157-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-159-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-161-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-163-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-165-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-167-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-169-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-171-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-173-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-175-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-177-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2180-178-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-179-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-180-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-181-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/2180-183-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-184-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-185-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/2180-186-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/2936-191-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-192-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-194-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-196-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-198-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-200-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-202-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-204-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-206-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-208-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-210-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-212-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-216-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2936-215-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-218-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2936-220-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-222-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-224-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-219-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2936-226-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-214-0x00000000008F0000-0x0000000000936000-memory.dmp

        Filesize

        280KB

      • memory/2936-228-0x0000000004E00000-0x0000000004E35000-memory.dmp

        Filesize

        212KB

      • memory/2936-987-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/2936-988-0x0000000007F70000-0x0000000007F82000-memory.dmp

        Filesize

        72KB

      • memory/2936-989-0x0000000007F90000-0x000000000809A000-memory.dmp

        Filesize

        1.0MB

      • memory/2936-990-0x00000000080B0000-0x00000000080EC000-memory.dmp

        Filesize

        240KB

      • memory/2936-991-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2936-992-0x00000000083B0000-0x0000000008416000-memory.dmp

        Filesize

        408KB

      • memory/2936-993-0x0000000008A80000-0x0000000008B12000-memory.dmp

        Filesize

        584KB

      • memory/2936-994-0x0000000008C30000-0x0000000008C80000-memory.dmp

        Filesize

        320KB

      • memory/2936-995-0x0000000008C90000-0x0000000008D06000-memory.dmp

        Filesize

        472KB

      • memory/2936-996-0x0000000008D40000-0x0000000008D5E000-memory.dmp

        Filesize

        120KB

      • memory/2936-997-0x0000000008E20000-0x0000000008FE2000-memory.dmp

        Filesize

        1.8MB

      • memory/2936-998-0x0000000008FF0000-0x000000000951C000-memory.dmp

        Filesize

        5.2MB

      • memory/4760-1005-0x00000000003D0000-0x00000000003F8000-memory.dmp

        Filesize

        160KB

      • memory/4760-1006-0x0000000007160000-0x0000000007170000-memory.dmp

        Filesize

        64KB