Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 03:32

General

  • Target

    b82da5037d681f95502aea602dcb13a87ac538274adb500dc7df51fc4fbff2a0.exe

  • Size

    746KB

  • MD5

    2778d9a56bc7d06a899d3b173b435615

  • SHA1

    7d9ebea827ebdfab87c31593e5632da55dbdcc29

  • SHA256

    b82da5037d681f95502aea602dcb13a87ac538274adb500dc7df51fc4fbff2a0

  • SHA512

    3b4132186cd06ba556c48c40e8b4d36e55cb5734b1cbd3742e4e5942f93da2a60b0a91fd8a0fc2155e70693c4d49208f45c2e949c525b7d6415cb4470115cf4f

  • SSDEEP

    12288:ty90/5NRCgtbdGKrhoF4gqn27aYZEk/VStq9oABtnXBfLxdxeOaB:tyy5zltbrhoFm8a6otZgnX1LxdxeOa

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b82da5037d681f95502aea602dcb13a87ac538274adb500dc7df51fc4fbff2a0.exe
    "C:\Users\Admin\AppData\Local\Temp\b82da5037d681f95502aea602dcb13a87ac538274adb500dc7df51fc4fbff2a0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649598.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649598.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23006391.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23006391.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 1088
          4⤵
          • Program crash
          PID:3448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk826283.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk826283.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 1536
          4⤵
          • Program crash
          PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927533.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927533.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2652
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4616 -ip 4616
    1⤵
      PID:3480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3464 -ip 3464
      1⤵
        PID:484

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927533.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927533.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649598.exe

        Filesize

        592KB

        MD5

        0fdce5b6bb3db999ac037895fb55222b

        SHA1

        4fed46127bd97dd9cc109c36f66f9301a83e21dd

        SHA256

        fdc19eea5f1cc41cc95a182f4e6d912827e7d3a56f839888b0aae20eb64cbdf9

        SHA512

        ae2e27002689c9a3ea20e04cb932c36695b5adc438b72c88f84242baa8b7c6940000a427a587a343b43be5c9be932ad918f6f0c33fe46e047a4482ba9f3b5317

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649598.exe

        Filesize

        592KB

        MD5

        0fdce5b6bb3db999ac037895fb55222b

        SHA1

        4fed46127bd97dd9cc109c36f66f9301a83e21dd

        SHA256

        fdc19eea5f1cc41cc95a182f4e6d912827e7d3a56f839888b0aae20eb64cbdf9

        SHA512

        ae2e27002689c9a3ea20e04cb932c36695b5adc438b72c88f84242baa8b7c6940000a427a587a343b43be5c9be932ad918f6f0c33fe46e047a4482ba9f3b5317

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23006391.exe

        Filesize

        376KB

        MD5

        b99de3cbe9ab0980dcb6b40570fe9f85

        SHA1

        fd7085bf5fdb47593200d65e8ccc17cdc45b3a5f

        SHA256

        d795d68f4fe5077f28cef17e34ab72ca25613bfe92ee194850d3dbdc4daa3a5c

        SHA512

        111c62cd6a2311d4085ef6aad5dec736d6ab9c3ff089e2573cb3d92106cd2933140ad15f2f31e8fdb1cdcb87d36ee56f6073a901041eae4fdf19600a39317067

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23006391.exe

        Filesize

        376KB

        MD5

        b99de3cbe9ab0980dcb6b40570fe9f85

        SHA1

        fd7085bf5fdb47593200d65e8ccc17cdc45b3a5f

        SHA256

        d795d68f4fe5077f28cef17e34ab72ca25613bfe92ee194850d3dbdc4daa3a5c

        SHA512

        111c62cd6a2311d4085ef6aad5dec736d6ab9c3ff089e2573cb3d92106cd2933140ad15f2f31e8fdb1cdcb87d36ee56f6073a901041eae4fdf19600a39317067

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk826283.exe

        Filesize

        459KB

        MD5

        57040a996bb19a4f837a2cce53b8f343

        SHA1

        5e6e201c37e71f12b0da3098da5421715d5463b6

        SHA256

        f5d163a065db227e6e8ef70e7e6fbc8286fa95c7af41f936d85b07aec44a5c44

        SHA512

        2e0d518f4f20048d59340c6bcca0d0b12dc4d42b7e5ad228697cb1a044abb553e760eecc21c947a2794133720eda9f9ef49ea168af27b012899cf4f95a57f7cc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk826283.exe

        Filesize

        459KB

        MD5

        57040a996bb19a4f837a2cce53b8f343

        SHA1

        5e6e201c37e71f12b0da3098da5421715d5463b6

        SHA256

        f5d163a065db227e6e8ef70e7e6fbc8286fa95c7af41f936d85b07aec44a5c44

        SHA512

        2e0d518f4f20048d59340c6bcca0d0b12dc4d42b7e5ad228697cb1a044abb553e760eecc21c947a2794133720eda9f9ef49ea168af27b012899cf4f95a57f7cc

      • memory/3464-234-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-996-0x0000000007F70000-0x0000000007F82000-memory.dmp

        Filesize

        72KB

      • memory/3464-1009-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-1008-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-1006-0x0000000009020000-0x000000000954C000-memory.dmp

        Filesize

        5.2MB

      • memory/3464-1005-0x0000000008E50000-0x0000000009012000-memory.dmp

        Filesize

        1.8MB

      • memory/3464-1004-0x0000000008C30000-0x0000000008C4E000-memory.dmp

        Filesize

        120KB

      • memory/3464-1003-0x0000000008B90000-0x0000000008C06000-memory.dmp

        Filesize

        472KB

      • memory/3464-1002-0x0000000008B30000-0x0000000008B80000-memory.dmp

        Filesize

        320KB

      • memory/3464-1001-0x0000000008A70000-0x0000000008B02000-memory.dmp

        Filesize

        584KB

      • memory/3464-1000-0x00000000083B0000-0x0000000008416000-memory.dmp

        Filesize

        408KB

      • memory/3464-999-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-998-0x00000000080B0000-0x00000000080EC000-memory.dmp

        Filesize

        240KB

      • memory/3464-997-0x0000000007F90000-0x000000000809A000-memory.dmp

        Filesize

        1.0MB

      • memory/3464-995-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/3464-236-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-232-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-230-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-228-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-226-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-224-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-222-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-220-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-199-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-200-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-202-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-204-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-207-0x0000000000960000-0x00000000009A6000-memory.dmp

        Filesize

        280KB

      • memory/3464-206-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-209-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-212-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-211-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-210-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3464-214-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-216-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/3464-218-0x0000000002770000-0x00000000027A5000-memory.dmp

        Filesize

        212KB

      • memory/4412-1015-0x0000000000D70000-0x0000000000D98000-memory.dmp

        Filesize

        160KB

      • memory/4412-1016-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

        Filesize

        64KB

      • memory/4616-177-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-189-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/4616-173-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-190-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4616-171-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-152-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4616-184-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/4616-169-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-155-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-179-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-153-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4616-175-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-191-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4616-192-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4616-181-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-167-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-165-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-163-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-161-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-159-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-157-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB

      • memory/4616-151-0x0000000004F20000-0x00000000054C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4616-148-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/4616-194-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/4616-154-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

        Filesize

        72KB