Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 02:58

General

  • Target

    137b6cb916d81579584a7f28c6ac37ed9a8ca8c20934bf3ed884d8f3260c2f04.exe

  • Size

    746KB

  • MD5

    559aaca9cadbf198fa92f1a400863bdd

  • SHA1

    a466ed10a8d84af50bd4c963a1aaad6f24e54cb2

  • SHA256

    137b6cb916d81579584a7f28c6ac37ed9a8ca8c20934bf3ed884d8f3260c2f04

  • SHA512

    62ebd6624249f234c4d25dc878e39b2f9bacb7ce3974ff2c782833eb81726da8ad9b1f40dd9f787ed19ac1746ba7ec1d6e185d4e5a2a32b710df64223b972323

  • SSDEEP

    12288:ry90+cy09Nw7ymBqdYtcvt3q2eoNMiXMv9EkBtyXpe3CroQCws:ryrc19NwBBqdYtcvtFeojR8yXQ3CMd

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\137b6cb916d81579584a7f28c6ac37ed9a8ca8c20934bf3ed884d8f3260c2f04.exe
    "C:\Users\Admin\AppData\Local\Temp\137b6cb916d81579584a7f28c6ac37ed9a8ca8c20934bf3ed884d8f3260c2f04.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965451.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965451.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\05585029.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\05585029.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 1088
          4⤵
          • Program crash
          PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361617.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361617.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 1732
          4⤵
          • Program crash
          PID:1416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si999237.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si999237.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1156 -ip 1156
    1⤵
      PID:996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4284 -ip 4284
      1⤵
        PID:1944

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si999237.exe

              Filesize

              136KB

              MD5

              b9f17cc95395f13838ba119abc3f742f

              SHA1

              ecdbc7ef78234c1c7009fdbc6f744c511067767d

              SHA256

              2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

              SHA512

              bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si999237.exe

              Filesize

              136KB

              MD5

              b9f17cc95395f13838ba119abc3f742f

              SHA1

              ecdbc7ef78234c1c7009fdbc6f744c511067767d

              SHA256

              2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

              SHA512

              bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965451.exe

              Filesize

              591KB

              MD5

              3f8cbe849015839e43ee20ecf378d12b

              SHA1

              92e4120f1ff71058a643118eebd83b1e570a87f0

              SHA256

              bc4934c5fec6a7b5f66b72a2b4663151f2b5e54bb1979532f0c3528bb0d4e65f

              SHA512

              3b56f4c75a30299368d816259fcd82e58d486133d7d21d769ed879b03277b91407ef394bc41a0f224b57b09f16a0ada2aed933de7c19adb629432f243ca311c5

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un965451.exe

              Filesize

              591KB

              MD5

              3f8cbe849015839e43ee20ecf378d12b

              SHA1

              92e4120f1ff71058a643118eebd83b1e570a87f0

              SHA256

              bc4934c5fec6a7b5f66b72a2b4663151f2b5e54bb1979532f0c3528bb0d4e65f

              SHA512

              3b56f4c75a30299368d816259fcd82e58d486133d7d21d769ed879b03277b91407ef394bc41a0f224b57b09f16a0ada2aed933de7c19adb629432f243ca311c5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\05585029.exe

              Filesize

              376KB

              MD5

              56a4e48e698928ef87398ac1f675f196

              SHA1

              8dbc78ed63506e940c041eec441e43fc40bf9b13

              SHA256

              6bacc942516a9d2ad15f369cf0be976507aeb97366a7f0967a1d8633121a49cc

              SHA512

              0c0c9085431b5265668300d732dce5f13fcc033eccc79801d6aee2825c923eb164e44d998f30d31f1993a9e762695a0844a15532d2fd368853588b68b3ea0e6f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\05585029.exe

              Filesize

              376KB

              MD5

              56a4e48e698928ef87398ac1f675f196

              SHA1

              8dbc78ed63506e940c041eec441e43fc40bf9b13

              SHA256

              6bacc942516a9d2ad15f369cf0be976507aeb97366a7f0967a1d8633121a49cc

              SHA512

              0c0c9085431b5265668300d732dce5f13fcc033eccc79801d6aee2825c923eb164e44d998f30d31f1993a9e762695a0844a15532d2fd368853588b68b3ea0e6f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361617.exe

              Filesize

              459KB

              MD5

              18a9a2ae465e201d9edce60682ee42d1

              SHA1

              1e5baf3886112b616eb8fb9e1cfd8dc0ea3b08b4

              SHA256

              527fe07a88e0bb6f12528874825f7d7d560d1e03ae78f76a4c08adf8b8fd8c26

              SHA512

              4b0e8b916b267ae80ea683c887f0fa1b763ae38bedcb15e4df523419d8e8145860d189a5884aa0cfd1ea21dd11213b30fa6e72505185731ea39e4e3ce8f88be4

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361617.exe

              Filesize

              459KB

              MD5

              18a9a2ae465e201d9edce60682ee42d1

              SHA1

              1e5baf3886112b616eb8fb9e1cfd8dc0ea3b08b4

              SHA256

              527fe07a88e0bb6f12528874825f7d7d560d1e03ae78f76a4c08adf8b8fd8c26

              SHA512

              4b0e8b916b267ae80ea683c887f0fa1b763ae38bedcb15e4df523419d8e8145860d189a5884aa0cfd1ea21dd11213b30fa6e72505185731ea39e4e3ce8f88be4

            • memory/1156-148-0x0000000004E70000-0x0000000005414000-memory.dmp

              Filesize

              5.6MB

            • memory/1156-149-0x0000000000940000-0x000000000096D000-memory.dmp

              Filesize

              180KB

            • memory/1156-150-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-151-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-152-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-153-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-154-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-156-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-158-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-160-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-162-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-164-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-166-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-168-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-170-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-172-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-174-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-176-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-178-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-180-0x0000000002830000-0x0000000002842000-memory.dmp

              Filesize

              72KB

            • memory/1156-181-0x0000000000400000-0x0000000000803000-memory.dmp

              Filesize

              4.0MB

            • memory/1156-182-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-183-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-184-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1156-186-0x0000000000400000-0x0000000000803000-memory.dmp

              Filesize

              4.0MB

            • memory/1316-1009-0x00000000007F0000-0x0000000000818000-memory.dmp

              Filesize

              160KB

            • memory/1316-1010-0x0000000007580000-0x0000000007590000-memory.dmp

              Filesize

              64KB

            • memory/4284-194-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-418-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-196-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-198-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-200-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-202-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-204-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-206-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-208-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-210-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-212-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-214-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-216-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-218-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-220-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-222-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-224-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-414-0x00000000008F0000-0x0000000000936000-memory.dmp

              Filesize

              280KB

            • memory/4284-416-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-191-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-420-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-987-0x0000000007940000-0x0000000007F58000-memory.dmp

              Filesize

              6.1MB

            • memory/4284-988-0x0000000007F70000-0x0000000007F82000-memory.dmp

              Filesize

              72KB

            • memory/4284-989-0x0000000007F90000-0x000000000809A000-memory.dmp

              Filesize

              1.0MB

            • memory/4284-990-0x00000000080B0000-0x00000000080EC000-memory.dmp

              Filesize

              240KB

            • memory/4284-991-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-992-0x0000000008500000-0x0000000008566000-memory.dmp

              Filesize

              408KB

            • memory/4284-993-0x0000000008BB0000-0x0000000008C42000-memory.dmp

              Filesize

              584KB

            • memory/4284-995-0x0000000008C70000-0x0000000008CE6000-memory.dmp

              Filesize

              472KB

            • memory/4284-996-0x0000000008D20000-0x0000000008D3E000-memory.dmp

              Filesize

              120KB

            • memory/4284-997-0x0000000008DE0000-0x0000000008E30000-memory.dmp

              Filesize

              320KB

            • memory/4284-998-0x0000000008F50000-0x0000000009112000-memory.dmp

              Filesize

              1.8MB

            • memory/4284-1000-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-1001-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-192-0x0000000002770000-0x00000000027A5000-memory.dmp

              Filesize

              212KB

            • memory/4284-999-0x0000000009120000-0x000000000964C000-memory.dmp

              Filesize

              5.2MB

            • memory/4284-1002-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB

            • memory/4284-1003-0x0000000004F00000-0x0000000004F10000-memory.dmp

              Filesize

              64KB