Analysis

  • max time kernel
    51s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 05:12

General

  • Target

    8b96af6cffe6146e018d8039687d05bc821f5fb71f99fc07a8d8728b701bd15c.exe

  • Size

    563KB

  • MD5

    c9ed106bca8842a9adaaefb89a7e3835

  • SHA1

    d6e4fc7de114d7aa3b939cce0a421b996f4d31c4

  • SHA256

    8b96af6cffe6146e018d8039687d05bc821f5fb71f99fc07a8d8728b701bd15c

  • SHA512

    149106e250ebd0a89b21f91fc7af545e42f63554dc0ee71067382bc0c2bec08ee1a122919c19ac27e688bb09c6e373861a2cf43fe0d3b51ba3bb33735d818046

  • SSDEEP

    12288:9y90FilJz4nuyM8TbsedEow9o9wGb+L1XItXu3k7N2:9ydynuyTyo3wa2G1AEM

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b96af6cffe6146e018d8039687d05bc821f5fb71f99fc07a8d8728b701bd15c.exe
    "C:\Users\Admin\AppData\Local\Temp\8b96af6cffe6146e018d8039687d05bc821f5fb71f99fc07a8d8728b701bd15c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st569609.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st569609.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41809150.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41809150.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp929874.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp929874.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743616.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743616.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743616.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743616.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st569609.exe

    Filesize

    409KB

    MD5

    640619dc861eaeb78e863261764434d1

    SHA1

    9b635c244eb390c151d3dd61ffeb580ad9cd92de

    SHA256

    48d0939595b58f8e740731652de4ccba664d78fa8aaf41375d82b672a31fce50

    SHA512

    780793558f7e6bddb399656eed18e858594403fda135c647bff84a39a049bbcaf3c6bb3c7dab6f2576f5bbc44529eda9d02e80b79481af217b1f13356080d78f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st569609.exe

    Filesize

    409KB

    MD5

    640619dc861eaeb78e863261764434d1

    SHA1

    9b635c244eb390c151d3dd61ffeb580ad9cd92de

    SHA256

    48d0939595b58f8e740731652de4ccba664d78fa8aaf41375d82b672a31fce50

    SHA512

    780793558f7e6bddb399656eed18e858594403fda135c647bff84a39a049bbcaf3c6bb3c7dab6f2576f5bbc44529eda9d02e80b79481af217b1f13356080d78f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41809150.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41809150.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp929874.exe

    Filesize

    353KB

    MD5

    eb162061f413fbb344de2ce6949a3574

    SHA1

    3c0036b065b028af1d1f2e4db94090d588af56e4

    SHA256

    1ba85b43956a412b47735842a4de376b99512dff61415fb1304b93b1e190aafe

    SHA512

    adc045d71c72f4737fd5dfd3bcb9da79b7b6b989dd611c588a752a65a53a6f3ef6d3b2c2bc21d867a93cdcc6b53be0413d73cfa1ee1a48ce56256f7e7bf8d683

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp929874.exe

    Filesize

    353KB

    MD5

    eb162061f413fbb344de2ce6949a3574

    SHA1

    3c0036b065b028af1d1f2e4db94090d588af56e4

    SHA256

    1ba85b43956a412b47735842a4de376b99512dff61415fb1304b93b1e190aafe

    SHA512

    adc045d71c72f4737fd5dfd3bcb9da79b7b6b989dd611c588a752a65a53a6f3ef6d3b2c2bc21d867a93cdcc6b53be0413d73cfa1ee1a48ce56256f7e7bf8d683

  • memory/1772-135-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/2108-142-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2108-141-0x0000000002C90000-0x0000000002CD6000-memory.dmp

    Filesize

    280KB

  • memory/2108-143-0x00000000070B0000-0x00000000070EC000-memory.dmp

    Filesize

    240KB

  • memory/2108-144-0x00000000070F0000-0x00000000075EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2108-145-0x0000000007630000-0x000000000766A000-memory.dmp

    Filesize

    232KB

  • memory/2108-146-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2108-147-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2108-148-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-149-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-151-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-153-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-155-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-157-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-159-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-161-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-163-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-165-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-167-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-169-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-171-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-173-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-175-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-177-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-179-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-181-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-183-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-185-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-187-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-189-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-191-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-193-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-195-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-197-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-199-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-201-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-203-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-205-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-207-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-209-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-211-0x0000000007630000-0x0000000007665000-memory.dmp

    Filesize

    212KB

  • memory/2108-940-0x000000000A170000-0x000000000A776000-memory.dmp

    Filesize

    6.0MB

  • memory/2108-941-0x0000000009BF0000-0x0000000009C02000-memory.dmp

    Filesize

    72KB

  • memory/2108-942-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/2108-943-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/2108-944-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/2108-945-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2108-946-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/2108-947-0x000000000AD60000-0x000000000ADF2000-memory.dmp

    Filesize

    584KB

  • memory/2108-948-0x000000000AE00000-0x000000000AE76000-memory.dmp

    Filesize

    472KB

  • memory/2108-949-0x000000000AEC0000-0x000000000B082000-memory.dmp

    Filesize

    1.8MB

  • memory/2108-950-0x000000000B0A0000-0x000000000B5CC000-memory.dmp

    Filesize

    5.2MB

  • memory/2108-951-0x000000000B700000-0x000000000B71E000-memory.dmp

    Filesize

    120KB

  • memory/2108-952-0x0000000006BD0000-0x0000000006C20000-memory.dmp

    Filesize

    320KB

  • memory/2108-954-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2108-955-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/2568-961-0x00000000004A0000-0x00000000004C8000-memory.dmp

    Filesize

    160KB

  • memory/2568-962-0x0000000007280000-0x00000000072CB000-memory.dmp

    Filesize

    300KB

  • memory/2568-963-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB