Analysis

  • max time kernel
    87s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 06:46

General

  • Target

    524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe

  • Size

    700KB

  • MD5

    f33064f452ca1707152db7e62d9e8d5d

  • SHA1

    73ce598b80b3f7d99790d2e396736be36c7ff0a6

  • SHA256

    524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad

  • SHA512

    9d9360a32e1cba90d4e9b34efe66204a7f961ca8b583682251563e2e0776cc72009bda8e23daedf3a00839b8ab6d89f79cc1e5872a565de9177ab397674d8d32

  • SSDEEP

    12288:Wy900Ts35b3gHi0AjqHMQEko/AFLbimF1bFEG2To9w1iVlFjKXyHlwi0hBarce:WyDOhAkwzXmGDwQvgeKiaWh

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe
    "C:\Users\Admin\AppData\Local\Temp\524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1080
          4⤵
          • Program crash
          PID:4540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2032
          4⤵
          • Program crash
          PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5060 -ip 5060
    1⤵
      PID:3268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2104 -ip 2104
      1⤵
        PID:2596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exe

        Filesize

        546KB

        MD5

        0ce7fb123f32298494b8f5eaf746b894

        SHA1

        dcce487845cc4c2d5cc2c6282503010677b32cda

        SHA256

        0cbae64bbba56aac8f3f98032084df1bf1af85cc0c2da7dc5693f2ce7c4e9e45

        SHA512

        e01e101d93e75589456e280bc807def195c89b4983863ebf9a604b8ae41e09232513a2f4a7072d1d20b3b80561bf2bbcda02939a56d3c922f386af7b1239de89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exe

        Filesize

        546KB

        MD5

        0ce7fb123f32298494b8f5eaf746b894

        SHA1

        dcce487845cc4c2d5cc2c6282503010677b32cda

        SHA256

        0cbae64bbba56aac8f3f98032084df1bf1af85cc0c2da7dc5693f2ce7c4e9e45

        SHA512

        e01e101d93e75589456e280bc807def195c89b4983863ebf9a604b8ae41e09232513a2f4a7072d1d20b3b80561bf2bbcda02939a56d3c922f386af7b1239de89

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exe

        Filesize

        269KB

        MD5

        376e331e60ca40e88ff1ef7066415c1c

        SHA1

        865f3bad4e12c19a1a9efeb6b648255622d7faa3

        SHA256

        24a3d84578b358466e43a3d1fd6b60a9a2e513e46b7d505fdec18fe1572ba51b

        SHA512

        bef55974e780733fae1de49f1b6b540c873fdd724f41cc1093849a7e3c4366c92aa6dd9d17b386d46fc0a7c08d3b3fb5b7ef36bb34cf80683fe65de3e4335597

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exe

        Filesize

        269KB

        MD5

        376e331e60ca40e88ff1ef7066415c1c

        SHA1

        865f3bad4e12c19a1a9efeb6b648255622d7faa3

        SHA256

        24a3d84578b358466e43a3d1fd6b60a9a2e513e46b7d505fdec18fe1572ba51b

        SHA512

        bef55974e780733fae1de49f1b6b540c873fdd724f41cc1093849a7e3c4366c92aa6dd9d17b386d46fc0a7c08d3b3fb5b7ef36bb34cf80683fe65de3e4335597

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exe

        Filesize

        353KB

        MD5

        39b9579763de8ad85c529127ea1bb05b

        SHA1

        65cfe3677a5ff61e7e8e003acf92aa9d3acadfc8

        SHA256

        27fdd572c95c5c847aa0c467d3205bbe4179d4ded3f9d6443357ce53f79b3eb2

        SHA512

        580df5d67191c15139c04f87249f11ed5a3a5ab56826b394e92093100acae38840799d3a4137b6828c5637ac9a796df30055307a34070f19fb1793df14b22d29

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exe

        Filesize

        353KB

        MD5

        39b9579763de8ad85c529127ea1bb05b

        SHA1

        65cfe3677a5ff61e7e8e003acf92aa9d3acadfc8

        SHA256

        27fdd572c95c5c847aa0c467d3205bbe4179d4ded3f9d6443357ce53f79b3eb2

        SHA512

        580df5d67191c15139c04f87249f11ed5a3a5ab56826b394e92093100acae38840799d3a4137b6828c5637ac9a796df30055307a34070f19fb1793df14b22d29

      • memory/800-1004-0x0000000006EA0000-0x0000000006EB0000-memory.dmp

        Filesize

        64KB

      • memory/800-1003-0x0000000000050000-0x0000000000078000-memory.dmp

        Filesize

        160KB

      • memory/2104-223-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-987-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/2104-999-0x0000000002BC0000-0x0000000002C06000-memory.dmp

        Filesize

        280KB

      • memory/2104-995-0x000000000B3C0000-0x000000000B8EC000-memory.dmp

        Filesize

        5.2MB

      • memory/2104-994-0x000000000B1F0000-0x000000000B3B2000-memory.dmp

        Filesize

        1.8MB

      • memory/2104-993-0x000000000AFD0000-0x000000000AFEE000-memory.dmp

        Filesize

        120KB

      • memory/2104-992-0x000000000AF30000-0x000000000AFA6000-memory.dmp

        Filesize

        472KB

      • memory/2104-991-0x000000000AEC0000-0x000000000AF10000-memory.dmp

        Filesize

        320KB

      • memory/2104-990-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/2104-989-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/2104-988-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/2104-986-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/2104-985-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/2104-984-0x0000000009CD0000-0x000000000A2E8000-memory.dmp

        Filesize

        6.1MB

      • memory/2104-225-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-221-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-219-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-217-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-188-0x0000000002BC0000-0x0000000002C06000-memory.dmp

        Filesize

        280KB

      • memory/2104-189-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-190-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-192-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-194-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-196-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-198-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-202-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-200-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-206-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-205-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/2104-203-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/2104-207-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/2104-209-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-211-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-213-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/2104-215-0x0000000007190000-0x00000000071C5000-memory.dmp

        Filesize

        212KB

      • memory/5060-172-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-170-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-183-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/5060-152-0x0000000007400000-0x00000000079A4000-memory.dmp

        Filesize

        5.6MB

      • memory/5060-181-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/5060-180-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-178-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-176-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-154-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-168-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-156-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-153-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-174-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-166-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-162-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-164-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-158-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-160-0x0000000007250000-0x0000000007262000-memory.dmp

        Filesize

        72KB

      • memory/5060-150-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/5060-151-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/5060-149-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/5060-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

        Filesize

        180KB