Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2023 22:17

General

  • Target

    87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe

  • Size

    694KB

  • MD5

    c88d16a49b7babc5381c0d7426eac720

  • SHA1

    3da7e4f6dd930063887c1dc5f4a39f3e08e4d000

  • SHA256

    87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88

  • SHA512

    a4ecd81cc801f0265872f505bcb446e1a43b198e555e5866d76ffe8878b51b08ea51a4ff4333a40f8a6cb0ca7759b113fae583ffa9f0b75ec813c71037e8ea35

  • SSDEEP

    12288:ly90uDNpuBy+MELYum/Xy72rELqlni5VdUN0cRAbP5HBkGEFG8w:lyzDN0MY773qlEdUerbG/w

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe
    "C:\Users\Admin\AppData\Local\Temp\87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • memory/528-145-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-153-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-919-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/528-403-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/528-401-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/528-399-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/528-155-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-157-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-151-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-149-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-147-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-141-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-143-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-139-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-137-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-135-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-133-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-122-0x0000000004760000-0x000000000479C000-memory.dmp

    Filesize

    240KB

  • memory/528-123-0x00000000047A0000-0x00000000047DA000-memory.dmp

    Filesize

    232KB

  • memory/528-124-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-131-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-129-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-127-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/528-125-0x00000000047A0000-0x00000000047D5000-memory.dmp

    Filesize

    212KB

  • memory/656-93-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-99-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-83-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-91-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-82-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-89-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-95-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-111-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/656-110-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/656-107-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-87-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-105-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-109-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-97-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-101-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-103-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-85-0x00000000047D0000-0x00000000047E3000-memory.dmp

    Filesize

    76KB

  • memory/656-81-0x00000000047D0000-0x00000000047E8000-memory.dmp

    Filesize

    96KB

  • memory/656-80-0x0000000007330000-0x0000000007370000-memory.dmp

    Filesize

    256KB

  • memory/656-79-0x00000000003D0000-0x00000000003FD000-memory.dmp

    Filesize

    180KB

  • memory/656-78-0x0000000004760000-0x000000000477A000-memory.dmp

    Filesize

    104KB

  • memory/1520-927-0x00000000012F0000-0x0000000001318000-memory.dmp

    Filesize

    160KB

  • memory/1520-928-0x00000000070F0000-0x0000000007130000-memory.dmp

    Filesize

    256KB