Analysis

  • max time kernel
    165s
  • max time network
    178s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 22:17

General

  • Target

    87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe

  • Size

    694KB

  • MD5

    c88d16a49b7babc5381c0d7426eac720

  • SHA1

    3da7e4f6dd930063887c1dc5f4a39f3e08e4d000

  • SHA256

    87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88

  • SHA512

    a4ecd81cc801f0265872f505bcb446e1a43b198e555e5866d76ffe8878b51b08ea51a4ff4333a40f8a6cb0ca7759b113fae583ffa9f0b75ec813c71037e8ea35

  • SSDEEP

    12288:ly90uDNpuBy+MELYum/Xy72rELqlni5VdUN0cRAbP5HBkGEFG8w:lyzDN0MY773qlEdUerbG/w

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe
    "C:\Users\Admin\AppData\Local\Temp\87f53b86fabf6e6a4da32aae72f12b7b208d10f835b8903b93cd8c456494cf88.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si425119.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683219.exe

    Filesize

    540KB

    MD5

    bcd8ab70be34578d823b031a5881c4a1

    SHA1

    41bb14648cfa4e5936fbd56f5cafb541d31985bf

    SHA256

    96824f7e7790e88fd71cbeeb25bf1ee7e1e831052571f00819e0b37a1673c202

    SHA512

    c22ea4119d26b9131f5d08a47d8d5002bdbd46c7c1a91932aef8d9b5f7c0edac0456fb50adddb7695717d8c3da52b966d5ba9af87386bf2a04b03f7bcbad93ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42320623.exe

    Filesize

    258KB

    MD5

    e78824a39971ed5fddd5b6891c48322c

    SHA1

    b5bb97a17cd2160d5eb5e448b791da1ff157807e

    SHA256

    6dd28981b0951c37aaca70aa751542035d0594a4a63c4018ff7ec3bb0a682511

    SHA512

    12a6179c0375850755f13341dbcedc33a74b47a429b7c5ea0f04c94a4cdb4b35ecd7089eea26c7f600f107ede8e706ffff129f77ff4defed283b6fb9bf0af48b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613814.exe

    Filesize

    341KB

    MD5

    890bbe4c6b10902939bac8d6caadd5f1

    SHA1

    d0596a57b5a3aa101520bd952eb7a24210a62748

    SHA256

    36648d456be373b940278d2702a68d866bcb5a561c18f10b986e15d5f33b1374

    SHA512

    0821d24f167aa05dfda5cf51d952a3357f5038e9f45433dae9101dea83861cca808c293b725a3976e05b6b03c087c063ef33a338e67d603a76d826eb3a96619f

  • memory/2032-998-0x0000000007780000-0x00000000077CB000-memory.dmp

    Filesize

    300KB

  • memory/2032-997-0x0000000000A00000-0x0000000000A28000-memory.dmp

    Filesize

    160KB

  • memory/2032-999-0x0000000007AA0000-0x0000000007AB0000-memory.dmp

    Filesize

    64KB

  • memory/2960-146-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-158-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-140-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-141-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-142-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-143-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-144-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-138-0x0000000002FB0000-0x0000000002FC8000-memory.dmp

    Filesize

    96KB

  • memory/2960-148-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-150-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-152-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-154-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-156-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2960-160-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-162-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-164-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-166-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-168-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-170-0x0000000002FB0000-0x0000000002FC3000-memory.dmp

    Filesize

    76KB

  • memory/2960-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2960-172-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-173-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-174-0x0000000002F80000-0x0000000002F90000-memory.dmp

    Filesize

    64KB

  • memory/2960-176-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2960-137-0x0000000007220000-0x000000000771E000-memory.dmp

    Filesize

    5.0MB

  • memory/2960-136-0x0000000002CF0000-0x0000000002D0A000-memory.dmp

    Filesize

    104KB

  • memory/4724-181-0x00000000047E0000-0x000000000481C000-memory.dmp

    Filesize

    240KB

  • memory/4724-186-0x0000000004820000-0x0000000004830000-memory.dmp

    Filesize

    64KB

  • memory/4724-187-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-190-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-192-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-188-0x0000000004820000-0x0000000004830000-memory.dmp

    Filesize

    64KB

  • memory/4724-185-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-184-0x0000000004820000-0x0000000004830000-memory.dmp

    Filesize

    64KB

  • memory/4724-194-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-196-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-198-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-200-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-202-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-204-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-206-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-208-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-210-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-212-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-214-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-216-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-218-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-220-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/4724-979-0x000000000A2C0000-0x000000000A8C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4724-980-0x0000000004C00000-0x0000000004C12000-memory.dmp

    Filesize

    72KB

  • memory/4724-981-0x0000000009CB0000-0x0000000009DBA000-memory.dmp

    Filesize

    1.0MB

  • memory/4724-982-0x0000000004D60000-0x0000000004D9E000-memory.dmp

    Filesize

    248KB

  • memory/4724-983-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/4724-984-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/4724-985-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4724-986-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/4724-987-0x000000000AE20000-0x000000000AE96000-memory.dmp

    Filesize

    472KB

  • memory/4724-183-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

    Filesize

    280KB

  • memory/4724-182-0x00000000048E0000-0x000000000491A000-memory.dmp

    Filesize

    232KB

  • memory/4724-988-0x000000000B000000-0x000000000B1C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4724-989-0x000000000B1D0000-0x000000000B6FC000-memory.dmp

    Filesize

    5.2MB

  • memory/4724-990-0x000000000B810000-0x000000000B82E000-memory.dmp

    Filesize

    120KB