Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 05:06

General

  • Target

    bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe

  • Size

    701KB

  • MD5

    077c31e1627af858997273055bc36e79

  • SHA1

    81aa9bfde069631c2d4a1f1a283ed7ef578748b5

  • SHA256

    bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7

  • SHA512

    b66c4abbbc550263d90a5f261185920d1e193af2135e46c7b59aa94395ab1d4fa441ec7ac8cce19b1d7d50236d23afd65c52e950b53d0dab14d4d0d1dfdf6a62

  • SSDEEP

    12288:my90spL3I8EMH49lkrrQh+GaPXFzoAEG2bo9wiyih8XIF4Cdz:myF13JYj3a1zoBGzw7mzFV

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exe

    Filesize

    547KB

    MD5

    adb2930ec343813535e643120b5827de

    SHA1

    eae1a10548854c3352b2ea60838d31a0ce4230ac

    SHA256

    7ca317fcd888dcff74d244c57897119cfae2cc602541da0c7c6cc2c0e474baea

    SHA512

    f8a31149e6ea52b806e3be2c782bf32311eb4a4c7f29539c29dae475b078b7893912437645da72a8459a62b3ec789ba4e9bb79a4c0e32f3c781cd8619122bec3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exe

    Filesize

    547KB

    MD5

    adb2930ec343813535e643120b5827de

    SHA1

    eae1a10548854c3352b2ea60838d31a0ce4230ac

    SHA256

    7ca317fcd888dcff74d244c57897119cfae2cc602541da0c7c6cc2c0e474baea

    SHA512

    f8a31149e6ea52b806e3be2c782bf32311eb4a4c7f29539c29dae475b078b7893912437645da72a8459a62b3ec789ba4e9bb79a4c0e32f3c781cd8619122bec3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exe

    Filesize

    269KB

    MD5

    d0608369a0d88fe82238c1298286a0d2

    SHA1

    313e8ffa3716127a399bd8791c9aba5f545de561

    SHA256

    79f4ee66d3b50f74efdb008a86de3d10087951bad974e40060965c4d187e7510

    SHA512

    f4ce76dba6cb4cbe24e176864ebd307d69319ac72e21aa7664f5af29cda9b4f894e81af0574d907da244e96fc7ca0dc95d3ff516c0fb205a75859d02015cedb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exe

    Filesize

    269KB

    MD5

    d0608369a0d88fe82238c1298286a0d2

    SHA1

    313e8ffa3716127a399bd8791c9aba5f545de561

    SHA256

    79f4ee66d3b50f74efdb008a86de3d10087951bad974e40060965c4d187e7510

    SHA512

    f4ce76dba6cb4cbe24e176864ebd307d69319ac72e21aa7664f5af29cda9b4f894e81af0574d907da244e96fc7ca0dc95d3ff516c0fb205a75859d02015cedb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exe

    Filesize

    353KB

    MD5

    09a87faa8f3b84d8165eee4fc93f42fc

    SHA1

    253c198a717cf087d5c3ff90f1d21e5d9fd14c8a

    SHA256

    e8bb480ef76b9c0197446fe62e0b267a68cab6ced5abb2582e902ed6d4e93ec9

    SHA512

    1527e70e24a8244dd1ceb705ffb301045da4c78149efdca2cd8addd892b27ac19c605d376c10f947392533c04b651847d16fd5791fbefd4841f11c1d6ec48da0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exe

    Filesize

    353KB

    MD5

    09a87faa8f3b84d8165eee4fc93f42fc

    SHA1

    253c198a717cf087d5c3ff90f1d21e5d9fd14c8a

    SHA256

    e8bb480ef76b9c0197446fe62e0b267a68cab6ced5abb2582e902ed6d4e93ec9

    SHA512

    1527e70e24a8244dd1ceb705ffb301045da4c78149efdca2cd8addd892b27ac19c605d376c10f947392533c04b651847d16fd5791fbefd4841f11c1d6ec48da0

  • memory/2964-217-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2964-215-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2964-992-0x00000000047C0000-0x0000000004810000-memory.dmp

    Filesize

    320KB

  • memory/2964-991-0x000000000B220000-0x000000000B74C000-memory.dmp

    Filesize

    5.2MB

  • memory/2964-990-0x000000000B050000-0x000000000B212000-memory.dmp

    Filesize

    1.8MB

  • memory/2964-988-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/2964-987-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/2964-986-0x000000000AD40000-0x000000000ADD2000-memory.dmp

    Filesize

    584KB

  • memory/2964-985-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/2964-984-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2964-983-0x000000000A4D0000-0x000000000A51B000-memory.dmp

    Filesize

    300KB

  • memory/2964-982-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/2964-981-0x000000000A230000-0x000000000A33A000-memory.dmp

    Filesize

    1.0MB

  • memory/2964-980-0x000000000A200000-0x000000000A212000-memory.dmp

    Filesize

    72KB

  • memory/2964-979-0x0000000009B90000-0x000000000A196000-memory.dmp

    Filesize

    6.0MB

  • memory/2964-220-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-192-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-194-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-218-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-202-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-212-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2964-214-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-211-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-210-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/2964-208-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-181-0x00000000049A0000-0x00000000049DC000-memory.dmp

    Filesize

    240KB

  • memory/2964-182-0x0000000004A40000-0x0000000004A7A000-memory.dmp

    Filesize

    232KB

  • memory/2964-183-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-184-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-186-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-188-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-190-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-206-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-198-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-204-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-200-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/2964-196-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/3564-168-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-170-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-140-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3564-141-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-176-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/3564-175-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-173-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-172-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-138-0x0000000004A80000-0x0000000004A98000-memory.dmp

    Filesize

    96KB

  • memory/3564-171-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/3564-166-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-164-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-162-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-160-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-158-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-156-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-154-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-152-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-150-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-148-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-146-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-144-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-143-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/3564-142-0x0000000007280000-0x0000000007290000-memory.dmp

    Filesize

    64KB

  • memory/3564-137-0x0000000007290000-0x000000000778E000-memory.dmp

    Filesize

    5.0MB

  • memory/3564-136-0x0000000004A20000-0x0000000004A3A000-memory.dmp

    Filesize

    104KB

  • memory/4972-998-0x0000000000030000-0x0000000000058000-memory.dmp

    Filesize

    160KB

  • memory/4972-999-0x0000000006DE0000-0x0000000006E2B000-memory.dmp

    Filesize

    300KB

  • memory/4972-1000-0x0000000006D90000-0x0000000006DA0000-memory.dmp

    Filesize

    64KB