Analysis

  • max time kernel
    68s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 18:30

General

  • Target

    ee34d858f75f572972f4632c658701d7fadfa5c0a76743eb64edade6c839c5e8.exe

  • Size

    611KB

  • MD5

    5203342b2df69249132a4c6670230276

  • SHA1

    d5a37c6c47d512fcf0bba91b33a04b85e10bb3c7

  • SHA256

    ee34d858f75f572972f4632c658701d7fadfa5c0a76743eb64edade6c839c5e8

  • SHA512

    38e58b83ad5dd6104e39c920c47fd19671bc5dd8a031b8bea3a1ff6458f5f0de47996d62d76494677a225b21d3a12262ed57743cf7373af6e83b51a2a78018c1

  • SSDEEP

    12288:Ay902EVd/o0YKH0NHOn6Q5JPyQzc9pcRgmXWKyl:AydEVdwb201O6QfPivcRgmX1yl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee34d858f75f572972f4632c658701d7fadfa5c0a76743eb64edade6c839c5e8.exe
    "C:\Users\Admin\AppData\Local\Temp\ee34d858f75f572972f4632c658701d7fadfa5c0a76743eb64edade6c839c5e8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st300955.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st300955.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22850628.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22850628.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp321467.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp321467.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1912
          4⤵
          • Program crash
          PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr470670.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr470670.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3788 -ip 3788
    1⤵
      PID:1012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr470670.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr470670.exe

      Filesize

      136KB

      MD5

      ace73b2b1f835de11594ea9a243a9f5c

      SHA1

      2f929d1f69784fbe499a95b064679a16947bdd84

      SHA256

      7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

      SHA512

      024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st300955.exe

      Filesize

      457KB

      MD5

      e7df76dd6ee5f306d5aca0e46b6886bb

      SHA1

      44b41be0cf4d303442eb751f2bfb5c21768500d3

      SHA256

      e52277a0c8645d904fc879463dc99d4cb21205ac125a34b514e72f1f6ce9d395

      SHA512

      90ec4684405f568ce5a0b85f689a5a2a5cf6aa982834f53b7bde75f6a2f54e1a6de0cee9aa91841f38dac6e5895215f44fbc0026021dfb917da498bef8128e8e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st300955.exe

      Filesize

      457KB

      MD5

      e7df76dd6ee5f306d5aca0e46b6886bb

      SHA1

      44b41be0cf4d303442eb751f2bfb5c21768500d3

      SHA256

      e52277a0c8645d904fc879463dc99d4cb21205ac125a34b514e72f1f6ce9d395

      SHA512

      90ec4684405f568ce5a0b85f689a5a2a5cf6aa982834f53b7bde75f6a2f54e1a6de0cee9aa91841f38dac6e5895215f44fbc0026021dfb917da498bef8128e8e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22850628.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22850628.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp321467.exe

      Filesize

      459KB

      MD5

      86b2a0ee76f81729c50e093ff535986c

      SHA1

      ae0b6dbf7c77014f2c9efb598db2f31f59544188

      SHA256

      43c0227a8f86bc33f966b71d371ec482cac529ed216c5105a8f8f9056b8ff8a6

      SHA512

      65ed72c0801c72966786dbdcc0dd3dbf037286dcfb2f3d06d848b2c71c571e2a211ab5cbb0d00e323deb63395909ef71fdfe6e4c4a91ff0c79b93a0941dcb5f5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp321467.exe

      Filesize

      459KB

      MD5

      86b2a0ee76f81729c50e093ff535986c

      SHA1

      ae0b6dbf7c77014f2c9efb598db2f31f59544188

      SHA256

      43c0227a8f86bc33f966b71d371ec482cac529ed216c5105a8f8f9056b8ff8a6

      SHA512

      65ed72c0801c72966786dbdcc0dd3dbf037286dcfb2f3d06d848b2c71c571e2a211ab5cbb0d00e323deb63395909ef71fdfe6e4c4a91ff0c79b93a0941dcb5f5

    • memory/3788-153-0x0000000004F20000-0x00000000054C4000-memory.dmp

      Filesize

      5.6MB

    • memory/3788-154-0x0000000000880000-0x00000000008C6000-memory.dmp

      Filesize

      280KB

    • memory/3788-155-0x0000000004F10000-0x0000000004F20000-memory.dmp

      Filesize

      64KB

    • memory/3788-156-0x0000000004F10000-0x0000000004F20000-memory.dmp

      Filesize

      64KB

    • memory/3788-157-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-158-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-160-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-162-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-164-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-166-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-168-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-170-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-172-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-174-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-176-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-178-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-180-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-182-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-184-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-186-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-188-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-190-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-192-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-194-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-196-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-198-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-200-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-202-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-204-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-206-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-208-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-210-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-212-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-214-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-216-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-218-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-220-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/3788-949-0x0000000007950000-0x0000000007F68000-memory.dmp

      Filesize

      6.1MB

    • memory/3788-950-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/3788-951-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/3788-952-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/3788-953-0x0000000004F10000-0x0000000004F20000-memory.dmp

      Filesize

      64KB

    • memory/3788-954-0x00000000083B0000-0x0000000008416000-memory.dmp

      Filesize

      408KB

    • memory/3788-955-0x0000000008A70000-0x0000000008B02000-memory.dmp

      Filesize

      584KB

    • memory/3788-956-0x0000000008B20000-0x0000000008B96000-memory.dmp

      Filesize

      472KB

    • memory/3788-957-0x0000000008BE0000-0x0000000008BFE000-memory.dmp

      Filesize

      120KB

    • memory/3788-958-0x0000000008E00000-0x0000000008FC2000-memory.dmp

      Filesize

      1.8MB

    • memory/3788-959-0x0000000008FD0000-0x00000000094FC000-memory.dmp

      Filesize

      5.2MB

    • memory/3788-960-0x00000000048D0000-0x0000000004920000-memory.dmp

      Filesize

      320KB

    • memory/4020-967-0x0000000000D30000-0x0000000000D58000-memory.dmp

      Filesize

      160KB

    • memory/4020-968-0x0000000007B40000-0x0000000007B50000-memory.dmp

      Filesize

      64KB

    • memory/5024-147-0x00000000000A0000-0x00000000000AA000-memory.dmp

      Filesize

      40KB