Analysis

  • max time kernel
    60s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 23:11

General

  • Target

    50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe

  • Size

    696KB

  • MD5

    b4d854967873eb4ac67d91a4625e7d38

  • SHA1

    6bea892356f73106ed2b6c57c14ca275dfdbd9ed

  • SHA256

    50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a

  • SHA512

    53f6c113f38c4e2ff06c0d46c2570a9ecb610a979c5c619a0cb4d8dd14de484100ce18bf2963f82a7ba067c434779c26c5c8e62c7ae7f8bd442d1f96cb9ae05a

  • SSDEEP

    12288:Ny908ViJ0el544iq91CtwMo0ef3hVvTFjXhgbpt8ddq8ZtbcpF:NyRlP4N1fnF9g/gnnbi

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe
    "C:\Users\Admin\AppData\Local\Temp\50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 1084
          4⤵
          • Program crash
          PID:3780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 1328
          4⤵
          • Program crash
          PID:4576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1636 -ip 1636
    1⤵
      PID:2648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4252 -ip 4252
      1⤵
        PID:884

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exe

        Filesize

        542KB

        MD5

        6c1f608a6ad6fe55ead0f136f2794981

        SHA1

        3f0e82ed7f68a80f3bacf566675829386903c693

        SHA256

        9a67d2baf66389954e3bc626441f1849ae5c48a2d315ba2573351664450f961a

        SHA512

        65c12327fc8bc642cd16cf4f1905cadde7d19f6f6a27a74cf41e32a76e8c15c1d94662dc5705ec99038ab0a89ac546a03c95dcd3423cd5382103441a357604f5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exe

        Filesize

        542KB

        MD5

        6c1f608a6ad6fe55ead0f136f2794981

        SHA1

        3f0e82ed7f68a80f3bacf566675829386903c693

        SHA256

        9a67d2baf66389954e3bc626441f1849ae5c48a2d315ba2573351664450f961a

        SHA512

        65c12327fc8bc642cd16cf4f1905cadde7d19f6f6a27a74cf41e32a76e8c15c1d94662dc5705ec99038ab0a89ac546a03c95dcd3423cd5382103441a357604f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exe

        Filesize

        258KB

        MD5

        374a51069f5922255c498bb168519d4f

        SHA1

        45d1b58c586bf9e2fd1e368a379100e78d7220d3

        SHA256

        b6aea1b82c782880eb7116231ca829059f3f1a016332d0792f42f4381fb8f785

        SHA512

        fe89134ea0344524f00b99d23cafe88f2e37f93d1d9a1162cf695c1bcc4a092256fca4e5777251ec13e7d1d85e03811a3cffd1eb9faa820f79abcb9d7e4b17a1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exe

        Filesize

        258KB

        MD5

        374a51069f5922255c498bb168519d4f

        SHA1

        45d1b58c586bf9e2fd1e368a379100e78d7220d3

        SHA256

        b6aea1b82c782880eb7116231ca829059f3f1a016332d0792f42f4381fb8f785

        SHA512

        fe89134ea0344524f00b99d23cafe88f2e37f93d1d9a1162cf695c1bcc4a092256fca4e5777251ec13e7d1d85e03811a3cffd1eb9faa820f79abcb9d7e4b17a1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exe

        Filesize

        341KB

        MD5

        f2267f4c2e10152f4840c473bbed53b8

        SHA1

        4e6000959b5cb6cb2f05adf261942a54cab5789a

        SHA256

        0c5ef9566e95ba9994f942777d8b39a25f950a26eb074d3c4d68721fd00cfb31

        SHA512

        986914faa5be66b9b4f1133897c448f8511a072546a0686413e3ab1bd248153d2287eb22fbc26daff2cfc08519926b33829736bcf2be7b9ba5e56ffe7db558bd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exe

        Filesize

        341KB

        MD5

        f2267f4c2e10152f4840c473bbed53b8

        SHA1

        4e6000959b5cb6cb2f05adf261942a54cab5789a

        SHA256

        0c5ef9566e95ba9994f942777d8b39a25f950a26eb074d3c4d68721fd00cfb31

        SHA512

        986914faa5be66b9b4f1133897c448f8511a072546a0686413e3ab1bd248153d2287eb22fbc26daff2cfc08519926b33829736bcf2be7b9ba5e56ffe7db558bd

      • memory/1636-161-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-171-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-150-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-151-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-153-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-155-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-157-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-159-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-148-0x0000000002DC0000-0x0000000002DED000-memory.dmp

        Filesize

        180KB

      • memory/1636-163-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-165-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-167-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-169-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-149-0x0000000007410000-0x00000000079B4000-memory.dmp

        Filesize

        5.6MB

      • memory/1636-173-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-175-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-177-0x0000000004A30000-0x0000000004A43000-memory.dmp

        Filesize

        76KB

      • memory/1636-178-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-179-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-180-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1636-182-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-183-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-185-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/1636-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/3712-1005-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/3712-1006-0x0000000007120000-0x0000000007130000-memory.dmp

        Filesize

        64KB

      • memory/4252-191-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-194-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-196-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-198-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-200-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-202-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-204-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-206-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-208-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-211-0x0000000002DE0000-0x0000000002E26000-memory.dmp

        Filesize

        280KB

      • memory/4252-210-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-213-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4252-215-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4252-217-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4252-214-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-218-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-220-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-222-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-224-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-226-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-228-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-987-0x0000000009C80000-0x000000000A298000-memory.dmp

        Filesize

        6.1MB

      • memory/4252-988-0x000000000A300000-0x000000000A312000-memory.dmp

        Filesize

        72KB

      • memory/4252-989-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/4252-990-0x000000000A440000-0x000000000A47C000-memory.dmp

        Filesize

        240KB

      • memory/4252-991-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4252-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/4252-993-0x000000000AE00000-0x000000000AE92000-memory.dmp

        Filesize

        584KB

      • memory/4252-994-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/4252-995-0x000000000AFA0000-0x000000000B162000-memory.dmp

        Filesize

        1.8MB

      • memory/4252-192-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/4252-996-0x000000000B1C0000-0x000000000B6EC000-memory.dmp

        Filesize

        5.2MB

      • memory/4252-997-0x000000000B7C0000-0x000000000B7DE000-memory.dmp

        Filesize

        120KB

      • memory/4252-998-0x0000000004810000-0x0000000004860000-memory.dmp

        Filesize

        320KB