Analysis

  • max time kernel
    53s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 10:18

General

  • Target

    4ad21e7e0b29e38f26c09e96dc1278215c5292af193356b9de076bb7c72bd4ea.exe

  • Size

    707KB

  • MD5

    4c50e2e36ad0c24a32fc682f9a8a0b22

  • SHA1

    bad771c7b11f9e2ca273075062acbd55ec7f3292

  • SHA256

    4ad21e7e0b29e38f26c09e96dc1278215c5292af193356b9de076bb7c72bd4ea

  • SHA512

    dae530002a44a5d67183ec727dddedcec286455a879f0a8840a8ec7642658340aac5e5b1ec389795a21a5bd68ef192acd40331d996c12751385979f290443f11

  • SSDEEP

    12288:Cy90zNn84jq6GC7ORnE2OB976S7wu8nu24ysTHSTQnvkm4qb2A/+Eoy5gEGh:CyINnYEx2SUu8D4PHXvAsqEmh

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad21e7e0b29e38f26c09e96dc1278215c5292af193356b9de076bb7c72bd4ea.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad21e7e0b29e38f26c09e96dc1278215c5292af193356b9de076bb7c72bd4ea.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305647.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305647.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87928296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87928296.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk241720.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk241720.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697695.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697695.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3448

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697695.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697695.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305647.exe

          Filesize

          552KB

          MD5

          ce41df51c4aae51837989030cacdc648

          SHA1

          5876dae8d6519e1fa0da26947fcddfc9af977964

          SHA256

          d95602ac7d6ae530fc70dbe2cb6780a277b9c070b9f115fcdc03f4500267889a

          SHA512

          0d148b8a6ba2fae64608b04b4be850c8aafaf82f8cde13f2629904a0ca08133e3af10eeb45d05f11775bb89a9c719876b7a3eca84b14106b67eaf85bd798e889

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305647.exe

          Filesize

          552KB

          MD5

          ce41df51c4aae51837989030cacdc648

          SHA1

          5876dae8d6519e1fa0da26947fcddfc9af977964

          SHA256

          d95602ac7d6ae530fc70dbe2cb6780a277b9c070b9f115fcdc03f4500267889a

          SHA512

          0d148b8a6ba2fae64608b04b4be850c8aafaf82f8cde13f2629904a0ca08133e3af10eeb45d05f11775bb89a9c719876b7a3eca84b14106b67eaf85bd798e889

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87928296.exe

          Filesize

          257KB

          MD5

          954d2b8f8853824c0b9e88a5f2d23fc8

          SHA1

          1f9617417549a422fac3b5c821affb72cb97ea46

          SHA256

          047b80fa4c35f1000da0e97f3b42ca6f95817b685d4d6fac608c650401d44f11

          SHA512

          53559db8e86df5e148378337930222273aff96d653e3b6235fa843c0580494415483db4291c8f6f31023f1be2e16692f16045e6b35ba6355a68abfbfdc8f0daf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87928296.exe

          Filesize

          257KB

          MD5

          954d2b8f8853824c0b9e88a5f2d23fc8

          SHA1

          1f9617417549a422fac3b5c821affb72cb97ea46

          SHA256

          047b80fa4c35f1000da0e97f3b42ca6f95817b685d4d6fac608c650401d44f11

          SHA512

          53559db8e86df5e148378337930222273aff96d653e3b6235fa843c0580494415483db4291c8f6f31023f1be2e16692f16045e6b35ba6355a68abfbfdc8f0daf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk241720.exe

          Filesize

          353KB

          MD5

          213940db178222216a0972c3f7bd9fd5

          SHA1

          0addd5c5c3d5a30f5a8f67a6025a0693a779cfa0

          SHA256

          331cf89472918b15b3e2862e2f52dcbde00bb6c7ea6b51ef3c432a687f498f8b

          SHA512

          30e30a9f4aee38ea5d4afa3aaffa1b5e0adc78ec05ea504ba3d9383e754a56e275c449a15d7f3a306dad962f99940823004978f2d9af149dc6e9a5b3eab89dd1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk241720.exe

          Filesize

          353KB

          MD5

          213940db178222216a0972c3f7bd9fd5

          SHA1

          0addd5c5c3d5a30f5a8f67a6025a0693a779cfa0

          SHA256

          331cf89472918b15b3e2862e2f52dcbde00bb6c7ea6b51ef3c432a687f498f8b

          SHA512

          30e30a9f4aee38ea5d4afa3aaffa1b5e0adc78ec05ea504ba3d9383e754a56e275c449a15d7f3a306dad962f99940823004978f2d9af149dc6e9a5b3eab89dd1

        • memory/2692-136-0x0000000002F40000-0x0000000002F5A000-memory.dmp

          Filesize

          104KB

        • memory/2692-137-0x00000000073D0000-0x00000000078CE000-memory.dmp

          Filesize

          5.0MB

        • memory/2692-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2692-140-0x0000000004850000-0x0000000004868000-memory.dmp

          Filesize

          96KB

        • memory/2692-139-0x00000000073C0000-0x00000000073D0000-memory.dmp

          Filesize

          64KB

        • memory/2692-141-0x00000000073C0000-0x00000000073D0000-memory.dmp

          Filesize

          64KB

        • memory/2692-142-0x00000000073C0000-0x00000000073D0000-memory.dmp

          Filesize

          64KB

        • memory/2692-144-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-143-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-146-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-148-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-150-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-152-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-154-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-156-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-158-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-160-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-162-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-164-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-166-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-168-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-170-0x0000000004850000-0x0000000004862000-memory.dmp

          Filesize

          72KB

        • memory/2692-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/2692-172-0x00000000073C0000-0x00000000073D0000-memory.dmp

          Filesize

          64KB

        • memory/2692-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/3448-998-0x00000000076E0000-0x00000000076F0000-memory.dmp

          Filesize

          64KB

        • memory/3448-997-0x0000000007420000-0x000000000746B000-memory.dmp

          Filesize

          300KB

        • memory/3448-996-0x0000000000680000-0x00000000006A8000-memory.dmp

          Filesize

          160KB

        • memory/4736-184-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-232-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4736-186-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-188-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-190-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-192-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-194-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-196-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-198-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-200-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-202-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-204-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-206-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-208-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-210-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-212-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-214-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-226-0x0000000002CE0000-0x0000000002D26000-memory.dmp

          Filesize

          280KB

        • memory/4736-228-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4736-182-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-230-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4736-977-0x000000000A200000-0x000000000A806000-memory.dmp

          Filesize

          6.0MB

        • memory/4736-978-0x0000000009BF0000-0x0000000009C02000-memory.dmp

          Filesize

          72KB

        • memory/4736-979-0x0000000009C20000-0x0000000009D2A000-memory.dmp

          Filesize

          1.0MB

        • memory/4736-980-0x0000000009D40000-0x0000000009D7E000-memory.dmp

          Filesize

          248KB

        • memory/4736-981-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

          Filesize

          300KB

        • memory/4736-982-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4736-983-0x000000000A050000-0x000000000A0B6000-memory.dmp

          Filesize

          408KB

        • memory/4736-984-0x000000000AD40000-0x000000000ADD2000-memory.dmp

          Filesize

          584KB

        • memory/4736-985-0x000000000AF20000-0x000000000AF96000-memory.dmp

          Filesize

          472KB

        • memory/4736-986-0x000000000AFE0000-0x000000000B1A2000-memory.dmp

          Filesize

          1.8MB

        • memory/4736-987-0x000000000B1C0000-0x000000000B6EC000-memory.dmp

          Filesize

          5.2MB

        • memory/4736-181-0x0000000007140000-0x0000000007175000-memory.dmp

          Filesize

          212KB

        • memory/4736-180-0x0000000007140000-0x000000000717A000-memory.dmp

          Filesize

          232KB

        • memory/4736-179-0x0000000004BA0000-0x0000000004BDC000-memory.dmp

          Filesize

          240KB

        • memory/4736-988-0x000000000B800000-0x000000000B81E000-memory.dmp

          Filesize

          120KB

        • memory/4736-990-0x0000000006C20000-0x0000000006C70000-memory.dmp

          Filesize

          320KB