Analysis

  • max time kernel
    87s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 21:39

General

  • Target

    94c9be7055b1c035f49d7a56e53e685dc80be0ef365c394bdf4acbc143a6cb6b.exe

  • Size

    696KB

  • MD5

    526c740884d2ee4c8b7000650bdb44b6

  • SHA1

    ecf27860b7c2268d61361a5739b7183e36c13664

  • SHA256

    94c9be7055b1c035f49d7a56e53e685dc80be0ef365c394bdf4acbc143a6cb6b

  • SHA512

    6ac436455d29fcc512dbd665fb9df27f113e9b4be6f101d8d9b44392235d2ac55695b71015724e626b68ac133fb47b9a518386f2d45889f8eb6f74b6e03f3cb3

  • SSDEEP

    12288:vy90NAVRQ0WH8h2g2u00zPsA3Xxk5bqtSbZe7gUx0a1CY:vyrVRbWeL2b0zsakRbZyzCY

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94c9be7055b1c035f49d7a56e53e685dc80be0ef365c394bdf4acbc143a6cb6b.exe
    "C:\Users\Admin\AppData\Local\Temp\94c9be7055b1c035f49d7a56e53e685dc80be0ef365c394bdf4acbc143a6cb6b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339351.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339351.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16207774.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16207774.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1080
          4⤵
          • Program crash
          PID:3436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk784563.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk784563.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 1320
          4⤵
          • Program crash
          PID:4732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363630.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363630.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1808 -ip 1808
    1⤵
      PID:4360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1292 -ip 1292
      1⤵
        PID:4340

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363630.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363630.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339351.exe

        Filesize

        542KB

        MD5

        6b6727a69307c9fdca4ee2190975ec12

        SHA1

        544c404df064af19c15ce9994cc729825a6af45d

        SHA256

        709c5e6d0baafb4261dbeb66895643b18f658dbb2f827d3a5ecfb5816fc2a63c

        SHA512

        3258382cdf00db6a2cd4ba2eccdf3ef4559a5c28dcb8c3d105c3babde75ce06e6b782d0563af97bb8a9bf508c4c97a85ceefe13d63a6f556eaa5415f070bf5a2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339351.exe

        Filesize

        542KB

        MD5

        6b6727a69307c9fdca4ee2190975ec12

        SHA1

        544c404df064af19c15ce9994cc729825a6af45d

        SHA256

        709c5e6d0baafb4261dbeb66895643b18f658dbb2f827d3a5ecfb5816fc2a63c

        SHA512

        3258382cdf00db6a2cd4ba2eccdf3ef4559a5c28dcb8c3d105c3babde75ce06e6b782d0563af97bb8a9bf508c4c97a85ceefe13d63a6f556eaa5415f070bf5a2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16207774.exe

        Filesize

        257KB

        MD5

        49a3e2a9c93b5480fba0c80d6bf3e0ae

        SHA1

        d0c69d5967ae1c31aac39e05aa2bb6b4fa99f00f

        SHA256

        c9257fe5ec807291b0a3118208fe7fbcbd6d793422c84ba8065da878272a95f8

        SHA512

        ce69ba4c9b7d7f9bcb86d83c708fb17dccdc1d26f1f79a2c2242e0897834f66093436ac3fb60c4bd946ae7b4bdd3647f92644209b27a6a87ed6c3d8788f29712

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16207774.exe

        Filesize

        257KB

        MD5

        49a3e2a9c93b5480fba0c80d6bf3e0ae

        SHA1

        d0c69d5967ae1c31aac39e05aa2bb6b4fa99f00f

        SHA256

        c9257fe5ec807291b0a3118208fe7fbcbd6d793422c84ba8065da878272a95f8

        SHA512

        ce69ba4c9b7d7f9bcb86d83c708fb17dccdc1d26f1f79a2c2242e0897834f66093436ac3fb60c4bd946ae7b4bdd3647f92644209b27a6a87ed6c3d8788f29712

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk784563.exe

        Filesize

        340KB

        MD5

        2b021584b403eeb605e18138e1ea3451

        SHA1

        6be1105f95f13925654907b8df94145f863b3ccd

        SHA256

        722fafe8e5d80d4cc2d6ba2a04736c570e340c3bc9bbbd49da021788b56d6c25

        SHA512

        b835a7c2e308de531eea78066321fc8826b0e5f75663d6c7d84a352e2c9c023a4924e210443bfda3e5f6e7531a292949816bd270913c6a91aa4a8c8d0f4a50b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk784563.exe

        Filesize

        340KB

        MD5

        2b021584b403eeb605e18138e1ea3451

        SHA1

        6be1105f95f13925654907b8df94145f863b3ccd

        SHA256

        722fafe8e5d80d4cc2d6ba2a04736c570e340c3bc9bbbd49da021788b56d6c25

        SHA512

        b835a7c2e308de531eea78066321fc8826b0e5f75663d6c7d84a352e2c9c023a4924e210443bfda3e5f6e7531a292949816bd270913c6a91aa4a8c8d0f4a50b3

      • memory/804-1004-0x0000000007CB0000-0x0000000007CC0000-memory.dmp

        Filesize

        64KB

      • memory/804-1003-0x0000000000EB0000-0x0000000000ED8000-memory.dmp

        Filesize

        160KB

      • memory/1292-227-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-987-0x000000000A300000-0x000000000A312000-memory.dmp

        Filesize

        72KB

      • memory/1292-997-0x0000000004B60000-0x0000000004BB0000-memory.dmp

        Filesize

        320KB

      • memory/1292-996-0x000000000B7C0000-0x000000000B7DE000-memory.dmp

        Filesize

        120KB

      • memory/1292-995-0x000000000B180000-0x000000000B6AC000-memory.dmp

        Filesize

        5.2MB

      • memory/1292-994-0x000000000AFB0000-0x000000000B172000-memory.dmp

        Filesize

        1.8MB

      • memory/1292-993-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/1292-992-0x000000000AE00000-0x000000000AE92000-memory.dmp

        Filesize

        584KB

      • memory/1292-991-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/1292-990-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1292-989-0x000000000A440000-0x000000000A47C000-memory.dmp

        Filesize

        240KB

      • memory/1292-988-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/1292-986-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/1292-225-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-223-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-217-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-219-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-221-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-215-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-213-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-211-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-191-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-192-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-194-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-196-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-198-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-200-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-203-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1292-204-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-202-0x0000000004690000-0x00000000046D6000-memory.dmp

        Filesize

        280KB

      • memory/1292-205-0x0000000007230000-0x0000000007240000-memory.dmp

        Filesize

        64KB

      • memory/1292-207-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1292-209-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/1808-174-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-183-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-154-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-184-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-172-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-182-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1808-170-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-152-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-178-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-153-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-176-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1808-156-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-180-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-168-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-166-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-164-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-162-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-160-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-158-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

        Filesize

        76KB

      • memory/1808-151-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-150-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/1808-149-0x0000000007320000-0x00000000078C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1808-148-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

        Filesize

        180KB