Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 11:03

General

  • Target

    2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe

  • Size

    707KB

  • MD5

    5a1d4d55dcefe885cfa2cc616d3525d6

  • SHA1

    c782a2da7104a5c6e57ad931de2091a3098afa09

  • SHA256

    2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48

  • SHA512

    0ad43060e8317fddf52aa9272120ad48f82f1c1f6b111c0a323688ced5b655b99e97e27d988817bfcb0094908290d00180014531c70b3ee5d3cb0276c5e79e43

  • SSDEEP

    12288:qy900lzliCK+x0TwKbLjKAYpvF2djxScEIofQDsFSU3XWFDGSTynPamFwtEA3zRR:qyRzECKc5f2tMcEffQDsEiTPzg9zRdn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe
    "C:\Users\Admin\AppData\Local\Temp\2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 1080
          4⤵
          • Program crash
          PID:932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 2072
          4⤵
          • Program crash
          PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1772 -ip 1772
    1⤵
      PID:4492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3752 -ip 3752
      1⤵
        PID:3164

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe

        Filesize

        553KB

        MD5

        7d87605ba65c9b22678d6e80dee7f777

        SHA1

        398ce8a75091e8a2117ca7b7b313f84f0bb58b35

        SHA256

        925ff38bd0a53f0c9930f258db335723b17f2eb885e278fae9708f430a775b87

        SHA512

        15e293f20df10ed2a3feecff3f006be0787beb276cdb94e72f55d787b1e85cc8a02722cae24df5493e70ae49a9ace142ea0c5d356e188e32c392197bcb03d9d9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe

        Filesize

        553KB

        MD5

        7d87605ba65c9b22678d6e80dee7f777

        SHA1

        398ce8a75091e8a2117ca7b7b313f84f0bb58b35

        SHA256

        925ff38bd0a53f0c9930f258db335723b17f2eb885e278fae9708f430a775b87

        SHA512

        15e293f20df10ed2a3feecff3f006be0787beb276cdb94e72f55d787b1e85cc8a02722cae24df5493e70ae49a9ace142ea0c5d356e188e32c392197bcb03d9d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe

        Filesize

        258KB

        MD5

        ad2ad38410cf2d6ded634c128b7310f8

        SHA1

        716732ad5cee55cbcef9e669c1c72f227815bf60

        SHA256

        a97e5ee697bdfe339dce50f00c806c5cd040602d486a7786919937daf1003ae4

        SHA512

        c833e9125997cdbd61988006092a78c3350954556478ad04316c0029244b24be592bc3d09d079c22de7baa9bcfd0099cf02d2791a42f5b7f73fabc9af7a1adc4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe

        Filesize

        258KB

        MD5

        ad2ad38410cf2d6ded634c128b7310f8

        SHA1

        716732ad5cee55cbcef9e669c1c72f227815bf60

        SHA256

        a97e5ee697bdfe339dce50f00c806c5cd040602d486a7786919937daf1003ae4

        SHA512

        c833e9125997cdbd61988006092a78c3350954556478ad04316c0029244b24be592bc3d09d079c22de7baa9bcfd0099cf02d2791a42f5b7f73fabc9af7a1adc4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe

        Filesize

        353KB

        MD5

        c692d8d179eae7759ad76a44cbe6bc7c

        SHA1

        38e4feab036ec5865a0632ec43c5d63f4fc8c6c1

        SHA256

        d955f7c67230e4d1a63e39ec914079f05eb912f42d6dccd5f183e45852b6ee04

        SHA512

        21d36a41a6fe0d34bb695c6f27753a5ede904028bd0fdafde27afe31d45689f62d22a466a806ed4a7711c25f048c04fb87bd1566da5805e11eb779c0c134ce0d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe

        Filesize

        353KB

        MD5

        c692d8d179eae7759ad76a44cbe6bc7c

        SHA1

        38e4feab036ec5865a0632ec43c5d63f4fc8c6c1

        SHA256

        d955f7c67230e4d1a63e39ec914079f05eb912f42d6dccd5f183e45852b6ee04

        SHA512

        21d36a41a6fe0d34bb695c6f27753a5ede904028bd0fdafde27afe31d45689f62d22a466a806ed4a7711c25f048c04fb87bd1566da5805e11eb779c0c134ce0d

      • memory/864-1006-0x0000000007CE0000-0x0000000007CF0000-memory.dmp

        Filesize

        64KB

      • memory/864-1005-0x0000000000FD0000-0x0000000000FF8000-memory.dmp

        Filesize

        160KB

      • memory/1772-156-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-170-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-152-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-151-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-153-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-154-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-149-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

        Filesize

        180KB

      • memory/1772-158-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-160-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-162-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-164-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-166-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-168-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-150-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-172-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-174-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-176-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-178-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-180-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1772-182-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-183-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-184-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1772-148-0x0000000007250000-0x00000000077F4000-memory.dmp

        Filesize

        5.6MB

      • memory/3752-191-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-194-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-196-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-198-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-200-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-202-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-204-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-206-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-208-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-210-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-212-0x0000000002DE0000-0x0000000002E26000-memory.dmp

        Filesize

        280KB

      • memory/3752-214-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-217-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-216-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-218-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-220-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-213-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-222-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-224-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-226-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-228-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-987-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/3752-988-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/3752-989-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/3752-990-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/3752-991-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-992-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/3752-993-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/3752-994-0x000000000AED0000-0x000000000AF20000-memory.dmp

        Filesize

        320KB

      • memory/3752-995-0x000000000AF30000-0x000000000AFA6000-memory.dmp

        Filesize

        472KB

      • memory/3752-192-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-996-0x000000000B0E0000-0x000000000B0FE000-memory.dmp

        Filesize

        120KB

      • memory/3752-997-0x000000000B1A0000-0x000000000B362000-memory.dmp

        Filesize

        1.8MB

      • memory/3752-998-0x000000000B380000-0x000000000B8AC000-memory.dmp

        Filesize

        5.2MB