Analysis

  • max time kernel
    63s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 09:49

General

  • Target

    6485f72d6dd24c7886a518bba2e857336e63ab84102129e2b5f454c45d6d6a59.exe

  • Size

    700KB

  • MD5

    870e9ab678ee4dc285abf7fa7e57ab5c

  • SHA1

    1d8c86852a8902c76ec7189e7778635d10b15aab

  • SHA256

    6485f72d6dd24c7886a518bba2e857336e63ab84102129e2b5f454c45d6d6a59

  • SHA512

    aa61cad3ada10cb3e0b1e674a2ba3261468c82fb4f75e993e9a9e0be5d2cd650029565d577ac58c6d32b0610d10abcbb1b9b65abcfd5113bff1e3cf95ef09f6d

  • SSDEEP

    12288:9y90igM9RacAnu4VwAisvwAZ6wo7x3rwbjzSTvYv9mSIqiAqyXOyE:9yfg+RdIu4Vl/T6v7lsjzhvd/CyPE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6485f72d6dd24c7886a518bba2e857336e63ab84102129e2b5f454c45d6d6a59.exe
    "C:\Users\Admin\AppData\Local\Temp\6485f72d6dd24c7886a518bba2e857336e63ab84102129e2b5f454c45d6d6a59.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un770446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un770446.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97297657.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97297657.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 1092
          4⤵
          • Program crash
          PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk345435.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk345435.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4492
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 1472
          4⤵
          • Program crash
          PID:4740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897393.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897393.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4292 -ip 4292
    1⤵
      PID:4696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4492 -ip 4492
      1⤵
        PID:4684

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897393.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897393.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un770446.exe

        Filesize

        546KB

        MD5

        2df42e270042bc79b9970f35df842f79

        SHA1

        13991519dc91da6627c02b7c651af5a65f23ea3c

        SHA256

        05dde7312c316da00303c5e6692c37c45c8899a7b4a5d64ca0704f9ad6c94426

        SHA512

        1c264bcc717f891c272346f2fa2ea87b95c26b9ce03f6f465733979daf63f06c731f28246dc4622160088c5a1cf88d1a2dd3e3618052eb30aa482ddfeb7d91f4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un770446.exe

        Filesize

        546KB

        MD5

        2df42e270042bc79b9970f35df842f79

        SHA1

        13991519dc91da6627c02b7c651af5a65f23ea3c

        SHA256

        05dde7312c316da00303c5e6692c37c45c8899a7b4a5d64ca0704f9ad6c94426

        SHA512

        1c264bcc717f891c272346f2fa2ea87b95c26b9ce03f6f465733979daf63f06c731f28246dc4622160088c5a1cf88d1a2dd3e3618052eb30aa482ddfeb7d91f4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97297657.exe

        Filesize

        269KB

        MD5

        66a146674d27555a907ee1626a176c82

        SHA1

        5dd83a6a0ebc91aa8f188994f93625fb37c6a363

        SHA256

        38e944a4bcfa8ff970d23896647173f9616178923a36b41477bb6540e3bb59fd

        SHA512

        3a45656d9c86839312a69fcf98c62fad72fc17f7a5cb50dbe0cba65fa9a165055b86c6d8e84d52936fbac2bd6ac877488e0e086b31a59a7a6c63ed65158597f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97297657.exe

        Filesize

        269KB

        MD5

        66a146674d27555a907ee1626a176c82

        SHA1

        5dd83a6a0ebc91aa8f188994f93625fb37c6a363

        SHA256

        38e944a4bcfa8ff970d23896647173f9616178923a36b41477bb6540e3bb59fd

        SHA512

        3a45656d9c86839312a69fcf98c62fad72fc17f7a5cb50dbe0cba65fa9a165055b86c6d8e84d52936fbac2bd6ac877488e0e086b31a59a7a6c63ed65158597f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk345435.exe

        Filesize

        353KB

        MD5

        29a7a3908628bda65a27921cd0949e75

        SHA1

        c04b735e868b91a8725c09219ae4704c4aa6e7b0

        SHA256

        a64d512802e7e679262d42ea2a24a400b1f5a15cd28109c3aed74968cdf267a0

        SHA512

        0267fc36f70118a306c63e7a1a21643433ab2431add18cd45d3285de3d502f8eb6a1b6fecaee59ebf62ae9fead8ac5eeeb0b5d2e4fe6954e517518b4345626f2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk345435.exe

        Filesize

        353KB

        MD5

        29a7a3908628bda65a27921cd0949e75

        SHA1

        c04b735e868b91a8725c09219ae4704c4aa6e7b0

        SHA256

        a64d512802e7e679262d42ea2a24a400b1f5a15cd28109c3aed74968cdf267a0

        SHA512

        0267fc36f70118a306c63e7a1a21643433ab2431add18cd45d3285de3d502f8eb6a1b6fecaee59ebf62ae9fead8ac5eeeb0b5d2e4fe6954e517518b4345626f2

      • memory/4032-1004-0x0000000000840000-0x0000000000868000-memory.dmp

        Filesize

        160KB

      • memory/4032-1005-0x0000000007660000-0x0000000007670000-memory.dmp

        Filesize

        64KB

      • memory/4292-157-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-166-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-151-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-153-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-155-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-158-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/4292-149-0x0000000007290000-0x0000000007834000-memory.dmp

        Filesize

        5.6MB

      • memory/4292-162-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/4292-161-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-159-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/4292-164-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-150-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-168-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-170-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-172-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-174-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-176-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-178-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-180-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

        Filesize

        72KB

      • memory/4292-181-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/4292-183-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/4292-184-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/4292-185-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/4292-148-0x0000000002C70000-0x0000000002C9D000-memory.dmp

        Filesize

        180KB

      • memory/4492-191-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-192-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-194-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-196-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-198-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-200-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-202-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-204-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-206-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-208-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-210-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-212-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-214-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-218-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-216-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-220-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-222-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-224-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4492-245-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/4492-246-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/4492-248-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/4492-986-0x0000000009C80000-0x000000000A298000-memory.dmp

        Filesize

        6.1MB

      • memory/4492-987-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/4492-988-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/4492-989-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/4492-990-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/4492-991-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/4492-992-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/4492-993-0x000000000AED0000-0x000000000AF20000-memory.dmp

        Filesize

        320KB

      • memory/4492-994-0x000000000AF30000-0x000000000AFA6000-memory.dmp

        Filesize

        472KB

      • memory/4492-190-0x0000000002BC0000-0x0000000002C06000-memory.dmp

        Filesize

        280KB

      • memory/4492-995-0x000000000B100000-0x000000000B2C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4492-996-0x000000000B2F0000-0x000000000B81C000-memory.dmp

        Filesize

        5.2MB

      • memory/4492-997-0x000000000BA60000-0x000000000BA7E000-memory.dmp

        Filesize

        120KB