Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 22:28

General

  • Target

    468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe

  • Size

    695KB

  • MD5

    ecbb832f74caf1b0473e490b0583a332

  • SHA1

    23c76c83d7d03e8496f363c993ab07bd07baddb9

  • SHA256

    468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf

  • SHA512

    ee14a302a77ec2e89a375070d82f53df2ffac9ee8fa36e71ded8eae7bb04c34d36d0ba1cbf8d4d560f1fdccc627ec4c8b686aabbc4361f6edf1a3bc1cfc34487

  • SSDEEP

    12288:Py90g3CFHAXjA3VyXYKRhgP0HR+C6axwWCqhSbZe+JuH2m2DXLL/:Py/3CFgTANK9R+6wjbZ3Jhz//

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe
    "C:\Users\Admin\AppData\Local\Temp\468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4048

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exe

          Filesize

          542KB

          MD5

          fcb69176d1e37339758fa1a5c82b1b04

          SHA1

          6f72898e50f06dbf4cd40687d933ddd3a7c00169

          SHA256

          f498903257da016a9859040f373e5082432e9c45c7973980106f954d27f6ba33

          SHA512

          74c14d5f4a589ee196acb4ab986279dc0e64303399831fb910b2780e8c0d5fec2294750a1f46748cc926c96ff0d3c45fce38c49ba2dc74d0fce648b734487824

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exe

          Filesize

          542KB

          MD5

          fcb69176d1e37339758fa1a5c82b1b04

          SHA1

          6f72898e50f06dbf4cd40687d933ddd3a7c00169

          SHA256

          f498903257da016a9859040f373e5082432e9c45c7973980106f954d27f6ba33

          SHA512

          74c14d5f4a589ee196acb4ab986279dc0e64303399831fb910b2780e8c0d5fec2294750a1f46748cc926c96ff0d3c45fce38c49ba2dc74d0fce648b734487824

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exe

          Filesize

          257KB

          MD5

          259adda282b27b6df5348dd6898bd24d

          SHA1

          7c2e44d32926af4464ce3f77327f96fcd1c6ba3b

          SHA256

          f2c9b6693ff2acc314b318ae3965b36c73d7f38b383d9aea5d943d95f50883a0

          SHA512

          90bd0262af48c6de7b73c61066ae0cdf2d25a76f67d7cc434d198aed82db46f24595b2c45d4cc8f851cd65675b9b566ab468bcf2b30665520d6f4895147d1e95

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exe

          Filesize

          257KB

          MD5

          259adda282b27b6df5348dd6898bd24d

          SHA1

          7c2e44d32926af4464ce3f77327f96fcd1c6ba3b

          SHA256

          f2c9b6693ff2acc314b318ae3965b36c73d7f38b383d9aea5d943d95f50883a0

          SHA512

          90bd0262af48c6de7b73c61066ae0cdf2d25a76f67d7cc434d198aed82db46f24595b2c45d4cc8f851cd65675b9b566ab468bcf2b30665520d6f4895147d1e95

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exe

          Filesize

          340KB

          MD5

          89659518f8663860edd2f3afa8de173d

          SHA1

          54428db43751c417368a33043d7c79721719e2af

          SHA256

          2be87b4898cb5a1e93a6e6672164ba9da7e5686b579a6fb92176f0937be8df88

          SHA512

          d4dc58660ea893d79d8c26a391260c3a5f12557c86789dfd2d31742bb89197caec7da814fdeac8003c7aeb09fa13dcd3eb7390b3056ef6b42f99b3e7b194effa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exe

          Filesize

          340KB

          MD5

          89659518f8663860edd2f3afa8de173d

          SHA1

          54428db43751c417368a33043d7c79721719e2af

          SHA256

          2be87b4898cb5a1e93a6e6672164ba9da7e5686b579a6fb92176f0937be8df88

          SHA512

          d4dc58660ea893d79d8c26a391260c3a5f12557c86789dfd2d31742bb89197caec7da814fdeac8003c7aeb09fa13dcd3eb7390b3056ef6b42f99b3e7b194effa

        • memory/1616-215-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-976-0x0000000009C10000-0x0000000009D1A000-memory.dmp

          Filesize

          1.0MB

        • memory/1616-987-0x00000000049E0000-0x0000000004A30000-memory.dmp

          Filesize

          320KB

        • memory/1616-985-0x000000000B110000-0x000000000B63C000-memory.dmp

          Filesize

          5.2MB

        • memory/1616-984-0x000000000AF30000-0x000000000B0F2000-memory.dmp

          Filesize

          1.8MB

        • memory/1616-983-0x000000000AE70000-0x000000000AE8E000-memory.dmp

          Filesize

          120KB

        • memory/1616-982-0x000000000ADD0000-0x000000000AE46000-memory.dmp

          Filesize

          472KB

        • memory/1616-981-0x000000000AD30000-0x000000000ADC2000-memory.dmp

          Filesize

          584KB

        • memory/1616-980-0x000000000A040000-0x000000000A0A6000-memory.dmp

          Filesize

          408KB

        • memory/1616-979-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

          Filesize

          300KB

        • memory/1616-977-0x0000000009D30000-0x0000000009D6E000-memory.dmp

          Filesize

          248KB

        • memory/1616-978-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/1616-192-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-975-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

          Filesize

          72KB

        • memory/1616-974-0x000000000A190000-0x000000000A796000-memory.dmp

          Filesize

          6.0MB

        • memory/1616-213-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-211-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-209-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-207-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-205-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-203-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-201-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-199-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-197-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-177-0x0000000004BD0000-0x0000000004C0C000-memory.dmp

          Filesize

          240KB

        • memory/1616-178-0x0000000007680000-0x00000000076BA000-memory.dmp

          Filesize

          232KB

        • memory/1616-179-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-182-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-184-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-180-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-186-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-188-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/1616-191-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/1616-190-0x00000000046E0000-0x0000000004726000-memory.dmp

          Filesize

          280KB

        • memory/1616-193-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/1616-195-0x0000000007680000-0x00000000076B5000-memory.dmp

          Filesize

          212KB

        • memory/4048-993-0x0000000000550000-0x0000000000578000-memory.dmp

          Filesize

          160KB

        • memory/4048-995-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/4048-994-0x0000000007300000-0x000000000734B000-memory.dmp

          Filesize

          300KB

        • memory/4360-145-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-151-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-169-0x0000000007450000-0x0000000007460000-memory.dmp

          Filesize

          64KB

        • memory/4360-168-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/4360-167-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-165-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-163-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-135-0x0000000007460000-0x000000000795E000-memory.dmp

          Filesize

          5.0MB

        • memory/4360-161-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-159-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-138-0x0000000007450000-0x0000000007460000-memory.dmp

          Filesize

          64KB

        • memory/4360-157-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-141-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-170-0x0000000007450000-0x0000000007460000-memory.dmp

          Filesize

          64KB

        • memory/4360-149-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-147-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-155-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-143-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-153-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-140-0x0000000004CC0000-0x0000000004CD3000-memory.dmp

          Filesize

          76KB

        • memory/4360-139-0x0000000007450000-0x0000000007460000-memory.dmp

          Filesize

          64KB

        • memory/4360-134-0x0000000004C20000-0x0000000004C3A000-memory.dmp

          Filesize

          104KB

        • memory/4360-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4360-172-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/4360-137-0x0000000007450000-0x0000000007460000-memory.dmp

          Filesize

          64KB

        • memory/4360-136-0x0000000004CC0000-0x0000000004CD8000-memory.dmp

          Filesize

          96KB