Analysis

  • max time kernel
    51s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 10:53

General

  • Target

    700d69886c489285ce30a469f9839f660738061b796b9092f58a0b5000feccdc.exe

  • Size

    707KB

  • MD5

    6e0f7819c83a5e90c416f1cc269a5936

  • SHA1

    757944b388356f8346fa39ecad15749b191dd5da

  • SHA256

    700d69886c489285ce30a469f9839f660738061b796b9092f58a0b5000feccdc

  • SHA512

    e32ab5a9a3bae77632dc1828dfd0b13f793d6c0138861b685ef15edebaf6f97b3bd97ae67fb852eb3738c4f887acdc0ea50dc81c756ab395fac66dc75c8ad48e

  • SSDEEP

    12288:0y90HSk0728HfjSSRg8XWvFrg8cvA8Vefz9AO88DcXNTdnJQm9WYKApQfxOJjRV0:0yySk07LfOigG4E8co8YfSO/qLJxfJQx

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\700d69886c489285ce30a469f9839f660738061b796b9092f58a0b5000feccdc.exe
    "C:\Users\Admin\AppData\Local\Temp\700d69886c489285ce30a469f9839f660738061b796b9092f58a0b5000feccdc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un651685.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un651685.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85929260.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85929260.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871089.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385718.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385718.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385718.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385718.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un651685.exe

    Filesize

    553KB

    MD5

    fb24b053442350ac9b24aad11b7e158c

    SHA1

    8300efdb45eeb7f89732da8d6cb96745bf880e82

    SHA256

    35d035094020935aad000fcc6632a406338e0a2c6d919c47d8955c0eb364d56c

    SHA512

    c5f23e0e047671b6cf20ea7aa00a76c668b926f0ec218571ea6cb0f848977e833ecd16102e470b579ae6102b49d699f656941408ffcb9ff96b65abc9276ce89f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un651685.exe

    Filesize

    553KB

    MD5

    fb24b053442350ac9b24aad11b7e158c

    SHA1

    8300efdb45eeb7f89732da8d6cb96745bf880e82

    SHA256

    35d035094020935aad000fcc6632a406338e0a2c6d919c47d8955c0eb364d56c

    SHA512

    c5f23e0e047671b6cf20ea7aa00a76c668b926f0ec218571ea6cb0f848977e833ecd16102e470b579ae6102b49d699f656941408ffcb9ff96b65abc9276ce89f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85929260.exe

    Filesize

    258KB

    MD5

    4716dbc835b834c0b505a2ed48c3f86e

    SHA1

    1b2a43231b88f9dce22fdfcf32d0a528e10f0641

    SHA256

    a01e17bdd6b52560289ad9e6a221bfed25582243e0180f4aa4ed930e9ca52df1

    SHA512

    b6429e998bafc0676988d7b35dc35daf1047e8b9f74196fe0b957ad29914ce322f5662bdd55181bba39193dd0e1d8ab2c7026d8babd38b8deff55e46fdcd96cf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85929260.exe

    Filesize

    258KB

    MD5

    4716dbc835b834c0b505a2ed48c3f86e

    SHA1

    1b2a43231b88f9dce22fdfcf32d0a528e10f0641

    SHA256

    a01e17bdd6b52560289ad9e6a221bfed25582243e0180f4aa4ed930e9ca52df1

    SHA512

    b6429e998bafc0676988d7b35dc35daf1047e8b9f74196fe0b957ad29914ce322f5662bdd55181bba39193dd0e1d8ab2c7026d8babd38b8deff55e46fdcd96cf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871089.exe

    Filesize

    353KB

    MD5

    a5e452a6039b3e5e003184667c887d9c

    SHA1

    2a21f31aeeddcd7479cdacac16972c38fac07b6c

    SHA256

    d963d360b7aa995b5bd00e88492c247ecdf4b9879fb013d3a558e33b6e068b63

    SHA512

    c277fd9872d69394c35279e9a53a50cd4d672b32afa94c34e81662d6996b28b1469f214ff35850077019cc66766d1e442c1abba9400b64f5eb0e399056eb0ce5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871089.exe

    Filesize

    353KB

    MD5

    a5e452a6039b3e5e003184667c887d9c

    SHA1

    2a21f31aeeddcd7479cdacac16972c38fac07b6c

    SHA256

    d963d360b7aa995b5bd00e88492c247ecdf4b9879fb013d3a558e33b6e068b63

    SHA512

    c277fd9872d69394c35279e9a53a50cd4d672b32afa94c34e81662d6996b28b1469f214ff35850077019cc66766d1e442c1abba9400b64f5eb0e399056eb0ce5

  • memory/936-325-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/936-975-0x0000000009BF0000-0x0000000009C02000-memory.dmp

    Filesize

    72KB

  • memory/936-201-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-199-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-197-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-986-0x0000000004710000-0x0000000004760000-memory.dmp

    Filesize

    320KB

  • memory/936-985-0x000000000B7D0000-0x000000000B7EE000-memory.dmp

    Filesize

    120KB

  • memory/936-187-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-984-0x000000000B180000-0x000000000B6AC000-memory.dmp

    Filesize

    5.2MB

  • memory/936-983-0x000000000AFA0000-0x000000000B162000-memory.dmp

    Filesize

    1.8MB

  • memory/936-982-0x000000000AEE0000-0x000000000AF56000-memory.dmp

    Filesize

    472KB

  • memory/936-981-0x000000000AD40000-0x000000000ADD2000-memory.dmp

    Filesize

    584KB

  • memory/936-980-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/936-189-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-979-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/936-978-0x0000000009DC0000-0x0000000009E0B000-memory.dmp

    Filesize

    300KB

  • memory/936-977-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/936-191-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-976-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/936-203-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-974-0x000000000A1C0000-0x000000000A7C6000-memory.dmp

    Filesize

    6.0MB

  • memory/936-327-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/936-329-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/936-323-0x0000000002C90000-0x0000000002CD6000-memory.dmp

    Filesize

    280KB

  • memory/936-211-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-176-0x00000000047B0000-0x00000000047EC000-memory.dmp

    Filesize

    240KB

  • memory/936-177-0x0000000004AF0000-0x0000000004B2A000-memory.dmp

    Filesize

    232KB

  • memory/936-179-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-178-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-181-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-183-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-185-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-209-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-207-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-205-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-193-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/936-195-0x0000000004AF0000-0x0000000004B25000-memory.dmp

    Filesize

    212KB

  • memory/3564-992-0x00000000009D0000-0x00000000009F8000-memory.dmp

    Filesize

    160KB

  • memory/3564-993-0x0000000007A70000-0x0000000007A80000-memory.dmp

    Filesize

    64KB

  • memory/3564-994-0x0000000007750000-0x000000000779B000-memory.dmp

    Filesize

    300KB

  • memory/4848-163-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-165-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-157-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-145-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-134-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4848-135-0x0000000004B60000-0x0000000004B78000-memory.dmp

    Filesize

    96KB

  • memory/4848-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4848-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4848-169-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4848-168-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4848-167-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4848-166-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4848-136-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB

  • memory/4848-161-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-159-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-155-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-153-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-151-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-149-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-147-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-143-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-141-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-132-0x0000000007330000-0x000000000782E000-memory.dmp

    Filesize

    5.0MB

  • memory/4848-131-0x0000000002FE0000-0x0000000002FFA000-memory.dmp

    Filesize

    104KB

  • memory/4848-139-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-138-0x0000000004B60000-0x0000000004B73000-memory.dmp

    Filesize

    76KB

  • memory/4848-137-0x0000000007320000-0x0000000007330000-memory.dmp

    Filesize

    64KB