Analysis

  • max time kernel
    55s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/04/2023, 20:13

General

  • Target

    aae5812fd1f243aeb6842d41e7d807ffa4d04e28840ddd96b630e4cf3b320fe3.exe

  • Size

    746KB

  • MD5

    497cddb63967772354d15d29218e313c

  • SHA1

    883cb4879893737015a93ece9fefd2d565ccb081

  • SHA256

    aae5812fd1f243aeb6842d41e7d807ffa4d04e28840ddd96b630e4cf3b320fe3

  • SHA512

    94f65fb6c86fa2afd080518c402fdf12b6aa8661c3e1b89610189c22733eba849ba3b1ce677f5af62e1668076c6655f0af217724441092529d3089685d01476e

  • SSDEEP

    12288:5y90UsNzoiiyLa44+Iu2W8oU3G0OJ+krhN8SJI4zXQCS9iPNcie0mvY9GtT:5yDs0xFlGBoDM+kr8P9yNct0o9T

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aae5812fd1f243aeb6842d41e7d807ffa4d04e28840ddd96b630e4cf3b320fe3.exe
    "C:\Users\Admin\AppData\Local\Temp\aae5812fd1f243aeb6842d41e7d807ffa4d04e28840ddd96b630e4cf3b320fe3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042951.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22988297.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22988297.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk006010.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk006010.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310172.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310172.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310172.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310172.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042951.exe

    Filesize

    592KB

    MD5

    c3ad23edfc86e18825a85f6bf774490b

    SHA1

    77968e2b60e403516aeb6b5f5c0f6f85460e85cf

    SHA256

    5f33756b09428e39191ef38b4fd1d2eda1d826889a5c3df892f873a540f77c29

    SHA512

    65cd087eead9d1580aae15f200c33579c0229fb7dc25925132d5d9e70db302ac54670fa28f87015ec5500ac2d4793c56159478ab23d9d0f4956a0507e0053151

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042951.exe

    Filesize

    592KB

    MD5

    c3ad23edfc86e18825a85f6bf774490b

    SHA1

    77968e2b60e403516aeb6b5f5c0f6f85460e85cf

    SHA256

    5f33756b09428e39191ef38b4fd1d2eda1d826889a5c3df892f873a540f77c29

    SHA512

    65cd087eead9d1580aae15f200c33579c0229fb7dc25925132d5d9e70db302ac54670fa28f87015ec5500ac2d4793c56159478ab23d9d0f4956a0507e0053151

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22988297.exe

    Filesize

    377KB

    MD5

    6b51d905b468d080d87ca62994e4373b

    SHA1

    d06fb06a2a00a83f4d35754df635988c206f233b

    SHA256

    140546c20907561b284902833e38fabf9930e8b6c01d530e501ec9e6b440bd13

    SHA512

    c2c4a7f814e74a7c8ff742a78d91d49102efd220e5521656b78e6017cc7efb2587c8e79405582dbdcd0229eb2053808866308bf7a863f81be0dd8a6f260aa00b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22988297.exe

    Filesize

    377KB

    MD5

    6b51d905b468d080d87ca62994e4373b

    SHA1

    d06fb06a2a00a83f4d35754df635988c206f233b

    SHA256

    140546c20907561b284902833e38fabf9930e8b6c01d530e501ec9e6b440bd13

    SHA512

    c2c4a7f814e74a7c8ff742a78d91d49102efd220e5521656b78e6017cc7efb2587c8e79405582dbdcd0229eb2053808866308bf7a863f81be0dd8a6f260aa00b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk006010.exe

    Filesize

    459KB

    MD5

    e1b184e8f3e5ed21894d7536aa9663d5

    SHA1

    bd4942d87e7c757943c9d3e46072636db4952ef0

    SHA256

    9a49f1a11bf4829f982c8ab833de730058fdc45b528fa688d3ffe13cd2681274

    SHA512

    e90d40e15eff930bfebcbcf41a3ac1ac22f16d9424bce4b89933a97b3dc2654545d2f6e210a560ecbb92badfd8a324a520fd3060097777066ee5fb74fb6c001c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk006010.exe

    Filesize

    459KB

    MD5

    e1b184e8f3e5ed21894d7536aa9663d5

    SHA1

    bd4942d87e7c757943c9d3e46072636db4952ef0

    SHA256

    9a49f1a11bf4829f982c8ab833de730058fdc45b528fa688d3ffe13cd2681274

    SHA512

    e90d40e15eff930bfebcbcf41a3ac1ac22f16d9424bce4b89933a97b3dc2654545d2f6e210a560ecbb92badfd8a324a520fd3060097777066ee5fb74fb6c001c

  • memory/1072-378-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/1072-974-0x0000000007DE0000-0x00000000083E6000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-201-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-199-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-197-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-986-0x0000000000D30000-0x0000000000D80000-memory.dmp

    Filesize

    320KB

  • memory/1072-985-0x0000000009340000-0x000000000935E000-memory.dmp

    Filesize

    120KB

  • memory/1072-984-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/1072-983-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/1072-982-0x0000000008A30000-0x0000000008AA6000-memory.dmp

    Filesize

    472KB

  • memory/1072-981-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/1072-980-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/1072-979-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1072-978-0x0000000007B20000-0x0000000007B6B000-memory.dmp

    Filesize

    300KB

  • memory/1072-977-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/1072-976-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/1072-187-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-189-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-975-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/1072-203-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-383-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1072-381-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1072-379-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1072-211-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-209-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-176-0x0000000002750000-0x000000000278C000-memory.dmp

    Filesize

    240KB

  • memory/1072-177-0x0000000004C80000-0x0000000004CBA000-memory.dmp

    Filesize

    232KB

  • memory/1072-179-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-178-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-181-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-183-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-185-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-207-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-191-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-205-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-193-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/1072-195-0x0000000004C80000-0x0000000004CB5000-memory.dmp

    Filesize

    212KB

  • memory/4240-992-0x0000000000AC0000-0x0000000000AE8000-memory.dmp

    Filesize

    160KB

  • memory/4240-993-0x0000000007850000-0x000000000789B000-memory.dmp

    Filesize

    300KB

  • memory/4240-994-0x0000000007B00000-0x0000000007B10000-memory.dmp

    Filesize

    64KB

  • memory/4860-163-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-165-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-136-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB

  • memory/4860-134-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB

  • memory/4860-135-0x0000000002610000-0x0000000002628000-memory.dmp

    Filesize

    96KB

  • memory/4860-171-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4860-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4860-169-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB

  • memory/4860-168-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB

  • memory/4860-167-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB

  • memory/4860-166-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4860-161-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-159-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-157-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-155-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-153-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-151-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-149-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-147-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-145-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-143-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-141-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-133-0x0000000004D50000-0x000000000524E000-memory.dmp

    Filesize

    5.0MB

  • memory/4860-131-0x0000000000A60000-0x0000000000A7A000-memory.dmp

    Filesize

    104KB

  • memory/4860-139-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-138-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/4860-137-0x0000000000A30000-0x0000000000A40000-memory.dmp

    Filesize

    64KB