Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 19:11

General

  • Target

    6c5b00c602fca29604d9284afe9d2bead7c019eb7a6845babf913f073320c72e.exe

  • Size

    611KB

  • MD5

    6e5ea7218c6d5dca7809c47a5b125d72

  • SHA1

    98727619e7156f5e5da46fbd34018429a0980ffe

  • SHA256

    6c5b00c602fca29604d9284afe9d2bead7c019eb7a6845babf913f073320c72e

  • SHA512

    b516fb6027ec234e8b89a6e8c25ec9d62057e113c1c841060316a30c51702f2a1c7eeaf695720447caf891b3dc890d36b91ebf21f464d34bc5a7e2addcc9f5f9

  • SSDEEP

    12288:zy90dA9V4xRpbctPdQvx883vcTb2o3dBHRxlLT:zydMpbcOnEH2ydjP/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c5b00c602fca29604d9284afe9d2bead7c019eb7a6845babf913f073320c72e.exe
    "C:\Users\Admin\AppData\Local\Temp\6c5b00c602fca29604d9284afe9d2bead7c019eb7a6845babf913f073320c72e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259236.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259236.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81685235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81685235.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp481465.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp481465.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 1320
          4⤵
          • Program crash
          PID:1368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090981.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090981.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4984
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 680 -ip 680
    1⤵
      PID:3904

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090981.exe

            Filesize

            136KB

            MD5

            ace73b2b1f835de11594ea9a243a9f5c

            SHA1

            2f929d1f69784fbe499a95b064679a16947bdd84

            SHA256

            7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

            SHA512

            024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090981.exe

            Filesize

            136KB

            MD5

            ace73b2b1f835de11594ea9a243a9f5c

            SHA1

            2f929d1f69784fbe499a95b064679a16947bdd84

            SHA256

            7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

            SHA512

            024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259236.exe

            Filesize

            457KB

            MD5

            0a305aa6842b3af853bd306fbb6b385c

            SHA1

            afb3238028ba5981457aa514a5e2cf9197c33f7e

            SHA256

            63f462116e203b84c4b0201e05fc75caab0d060c695f798d07a1dc39e5dae6fd

            SHA512

            7a9ad6b22d30d17bb69141816cdb1c8e811187f63bd729d6722a26d6ef37e307871c77c37a430c2ee2469b3d5e94081888f900f49d9eafc05849818c6ff27286

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259236.exe

            Filesize

            457KB

            MD5

            0a305aa6842b3af853bd306fbb6b385c

            SHA1

            afb3238028ba5981457aa514a5e2cf9197c33f7e

            SHA256

            63f462116e203b84c4b0201e05fc75caab0d060c695f798d07a1dc39e5dae6fd

            SHA512

            7a9ad6b22d30d17bb69141816cdb1c8e811187f63bd729d6722a26d6ef37e307871c77c37a430c2ee2469b3d5e94081888f900f49d9eafc05849818c6ff27286

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81685235.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81685235.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp481465.exe

            Filesize

            459KB

            MD5

            86f69c2e0c71d3c157a1d78e8bc80d06

            SHA1

            36ab64506e7e6769e4495257655570e13f8c740b

            SHA256

            54a138c9b3a02dfd8d4ee77c6ea0c8095b1732d8eeed609f43a7bb8d3d290f42

            SHA512

            a58c15a1513c5f52520541beea37959856cdd5455fee6a153bff233c720818877f9eaefaa6c2590b34e9b5dd6c3c27da886bef8cb53a781d35b64260621709ad

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp481465.exe

            Filesize

            459KB

            MD5

            86f69c2e0c71d3c157a1d78e8bc80d06

            SHA1

            36ab64506e7e6769e4495257655570e13f8c740b

            SHA256

            54a138c9b3a02dfd8d4ee77c6ea0c8095b1732d8eeed609f43a7bb8d3d290f42

            SHA512

            a58c15a1513c5f52520541beea37959856cdd5455fee6a153bff233c720818877f9eaefaa6c2590b34e9b5dd6c3c27da886bef8cb53a781d35b64260621709ad

          • memory/680-161-0x0000000000910000-0x0000000000956000-memory.dmp

            Filesize

            280KB

          • memory/680-162-0x0000000004E50000-0x00000000053F4000-memory.dmp

            Filesize

            5.6MB

          • memory/680-163-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-164-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-165-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-166-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-167-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-169-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-171-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-175-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-173-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-177-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-181-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-179-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-185-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-189-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-187-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-193-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-191-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-183-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-203-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-205-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-207-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-201-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-209-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-199-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-197-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-195-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-213-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-211-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-215-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-217-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-219-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-221-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-225-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-227-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-229-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-223-0x0000000004E00000-0x0000000004E35000-memory.dmp

            Filesize

            212KB

          • memory/680-958-0x00000000078C0000-0x0000000007ED8000-memory.dmp

            Filesize

            6.1MB

          • memory/680-959-0x0000000007F70000-0x0000000007F82000-memory.dmp

            Filesize

            72KB

          • memory/680-960-0x0000000007F90000-0x000000000809A000-memory.dmp

            Filesize

            1.0MB

          • memory/680-961-0x00000000080B0000-0x00000000080EC000-memory.dmp

            Filesize

            240KB

          • memory/680-962-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-963-0x00000000083B0000-0x0000000008416000-memory.dmp

            Filesize

            408KB

          • memory/680-964-0x0000000008A80000-0x0000000008B12000-memory.dmp

            Filesize

            584KB

          • memory/680-965-0x0000000008C40000-0x0000000008CB6000-memory.dmp

            Filesize

            472KB

          • memory/680-966-0x0000000008D20000-0x0000000008EE2000-memory.dmp

            Filesize

            1.8MB

          • memory/680-967-0x0000000008EF0000-0x000000000941C000-memory.dmp

            Filesize

            5.2MB

          • memory/680-968-0x0000000009530000-0x000000000954E000-memory.dmp

            Filesize

            120KB

          • memory/680-969-0x00000000024E0000-0x0000000002530000-memory.dmp

            Filesize

            320KB

          • memory/680-972-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-973-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/680-974-0x0000000004E40000-0x0000000004E50000-memory.dmp

            Filesize

            64KB

          • memory/4628-148-0x0000000000DE0000-0x0000000000DEA000-memory.dmp

            Filesize

            40KB

          • memory/4984-979-0x0000000000CA0000-0x0000000000CC8000-memory.dmp

            Filesize

            160KB

          • memory/4984-980-0x0000000007A80000-0x0000000007A90000-memory.dmp

            Filesize

            64KB