Analysis

  • max time kernel
    60s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 20:34

General

  • Target

    997b9c2b775dfa44517add44451011a2ed42fb19247e6b0354076fd14b11e5df.exe

  • Size

    746KB

  • MD5

    8439689c22489b36cf84c41d1ba42158

  • SHA1

    9cc0c5c72c459d861094b23baa79ab241d832e96

  • SHA256

    997b9c2b775dfa44517add44451011a2ed42fb19247e6b0354076fd14b11e5df

  • SHA512

    92d7f8feef3c117d10f5d1c6305e9a0776cf05d991aab37e3c56d196224ef3a4282696318184bf8eb4506c248a77a33deb4deda79089e962ae4ee7ea265f6240

  • SSDEEP

    12288:ty90uhpOIVF/vUsIBQWkwdw3Fn3/YIXE5aEbr4wkSay68Q:tyJn1hUQWkwdwVPvX+RbrZWf8Q

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\997b9c2b775dfa44517add44451011a2ed42fb19247e6b0354076fd14b11e5df.exe
    "C:\Users\Admin\AppData\Local\Temp\997b9c2b775dfa44517add44451011a2ed42fb19247e6b0354076fd14b11e5df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052523.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052523.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91850430.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91850430.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214401.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214401.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527867.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527867.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527867.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527867.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052523.exe

    Filesize

    592KB

    MD5

    c6ffa6a9970d4d994e443b0138325e5f

    SHA1

    aeb2ec7e28f0036a7ad81f8e0a47cae68113726e

    SHA256

    79190338a283769e25ccd5d4039b49f26d5b1f7a73f1732ea656ef5b00561e96

    SHA512

    b59cc8ec8e0382144a50069027553dfd537b70c04496844963f9ad8b9c5c6e6a53c31283f50eb80d1a161bb2ed48935aa290c7cf15f98a6ec5b0ec4187bbc0d4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052523.exe

    Filesize

    592KB

    MD5

    c6ffa6a9970d4d994e443b0138325e5f

    SHA1

    aeb2ec7e28f0036a7ad81f8e0a47cae68113726e

    SHA256

    79190338a283769e25ccd5d4039b49f26d5b1f7a73f1732ea656ef5b00561e96

    SHA512

    b59cc8ec8e0382144a50069027553dfd537b70c04496844963f9ad8b9c5c6e6a53c31283f50eb80d1a161bb2ed48935aa290c7cf15f98a6ec5b0ec4187bbc0d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91850430.exe

    Filesize

    377KB

    MD5

    f76b2654e8ff85e6c50b90daef190b61

    SHA1

    7759d26de7f3c7c35e2c08566483fda294d745c3

    SHA256

    ead3e28aeb405e32edc15fde71d0dbcece1c4b0344ebc3276f2d6508f7fe3761

    SHA512

    0c91f2c807734f2f103580fd4c53ead0e82d30fb7b6c1a06b35f99fc0a47c8df51ab232d6b785a2d91dc961260ca10970953e280b0c62fd76b73bef5459b956b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91850430.exe

    Filesize

    377KB

    MD5

    f76b2654e8ff85e6c50b90daef190b61

    SHA1

    7759d26de7f3c7c35e2c08566483fda294d745c3

    SHA256

    ead3e28aeb405e32edc15fde71d0dbcece1c4b0344ebc3276f2d6508f7fe3761

    SHA512

    0c91f2c807734f2f103580fd4c53ead0e82d30fb7b6c1a06b35f99fc0a47c8df51ab232d6b785a2d91dc961260ca10970953e280b0c62fd76b73bef5459b956b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214401.exe

    Filesize

    459KB

    MD5

    4e94127a23dbb2321d32766fa406d05d

    SHA1

    0a0f3c949532b1d8b807b373bd317df7604fcf4a

    SHA256

    b861eaa6451d555e0e87b69905e2468186079d6bf20eed371b9e365e762fd707

    SHA512

    17d5d6c96e5a967277e621a4a97cae82d3fce879eae2515e2329688cf88eca752095977c46edb45aae87f5d051c034cf834f9ea06914d56349b0a4b475cb3a06

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214401.exe

    Filesize

    459KB

    MD5

    4e94127a23dbb2321d32766fa406d05d

    SHA1

    0a0f3c949532b1d8b807b373bd317df7604fcf4a

    SHA256

    b861eaa6451d555e0e87b69905e2468186079d6bf20eed371b9e365e762fd707

    SHA512

    17d5d6c96e5a967277e621a4a97cae82d3fce879eae2515e2329688cf88eca752095977c46edb45aae87f5d051c034cf834f9ea06914d56349b0a4b475cb3a06

  • memory/2172-148-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/2172-149-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/2172-150-0x0000000004FB0000-0x0000000005554000-memory.dmp

    Filesize

    5.6MB

  • memory/2172-151-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-152-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-154-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-156-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-158-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-160-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-162-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-164-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-166-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-168-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-170-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-172-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-174-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-176-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-178-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/2172-179-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/2172-180-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/2172-181-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/2172-183-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3976-188-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-189-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-191-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-193-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-195-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-197-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-199-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-201-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-203-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-205-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-207-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-209-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-211-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-213-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-215-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-217-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-219-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-221-0x0000000005380000-0x00000000053B5000-memory.dmp

    Filesize

    212KB

  • memory/3976-222-0x0000000000840000-0x0000000000886000-memory.dmp

    Filesize

    280KB

  • memory/3976-223-0x0000000002430000-0x0000000002440000-memory.dmp

    Filesize

    64KB

  • memory/3976-225-0x0000000002430000-0x0000000002440000-memory.dmp

    Filesize

    64KB

  • memory/3976-227-0x0000000002430000-0x0000000002440000-memory.dmp

    Filesize

    64KB

  • memory/3976-984-0x00000000078B0000-0x0000000007EC8000-memory.dmp

    Filesize

    6.1MB

  • memory/3976-985-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/3976-986-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/3976-987-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/3976-988-0x0000000002430000-0x0000000002440000-memory.dmp

    Filesize

    64KB

  • memory/3976-989-0x00000000083B0000-0x0000000008416000-memory.dmp

    Filesize

    408KB

  • memory/3976-990-0x0000000008A70000-0x0000000008B02000-memory.dmp

    Filesize

    584KB

  • memory/3976-991-0x0000000008C40000-0x0000000008CB6000-memory.dmp

    Filesize

    472KB

  • memory/3976-992-0x0000000008CF0000-0x0000000008D0E000-memory.dmp

    Filesize

    120KB

  • memory/3976-993-0x0000000008DB0000-0x0000000008E00000-memory.dmp

    Filesize

    320KB

  • memory/3976-994-0x0000000009010000-0x00000000091D2000-memory.dmp

    Filesize

    1.8MB

  • memory/3976-995-0x00000000091E0000-0x000000000970C000-memory.dmp

    Filesize

    5.2MB

  • memory/4176-1001-0x00000000001A0000-0x00000000001C8000-memory.dmp

    Filesize

    160KB

  • memory/4176-1002-0x0000000006F90000-0x0000000006FA0000-memory.dmp

    Filesize

    64KB