Analysis

  • max time kernel
    56s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 12:54

General

  • Target

    9f9d04746bb476a2bd42d750223baa7af699d0072c141720c35599af5f1a4362.exe

  • Size

    694KB

  • MD5

    6e824a11523082d2c07a3c13138d6b71

  • SHA1

    8635f4eec398ea5cbb4d6f622acb5dc666ea11dd

  • SHA256

    9f9d04746bb476a2bd42d750223baa7af699d0072c141720c35599af5f1a4362

  • SHA512

    4c724cae24aab832119e4685e16445d52cf15e1cfd71ae00f2ac056c6b560a43e5b55c37b4a40db71b6055330626cda3e594517015c33597177d5939c0f3e0e1

  • SSDEEP

    12288:py90r9ZBepVZqirP8gXT3Ve6bZ1rXCONAtTcm3S1U75vleu2K701y:pyOEfqiL8+3VeIFCjtB3S1UDWK4Y

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f9d04746bb476a2bd42d750223baa7af699d0072c141720c35599af5f1a4362.exe
    "C:\Users\Admin\AppData\Local\Temp\9f9d04746bb476a2bd42d750223baa7af699d0072c141720c35599af5f1a4362.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un148287.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un148287.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14856892.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14856892.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk772065.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk772065.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333450.exe
      2⤵
      • Executes dropped EXE
      PID:4280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333450.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un148287.exe

    Filesize

    541KB

    MD5

    b12fa92472c160d77509a685ffb89de1

    SHA1

    647708ee38ccdbbc9e68cfa1639b9c4a355e32da

    SHA256

    b3a31a655d3fd6aad7ac7b5abfa80c2b3d6497ad16ef03df0d20b7ad1d7ef371

    SHA512

    5a004254036dee45653a05d94b15f56554208e4b8e8b2960ebce73c235eab59e994af10a4b9257d785281b9d7730cba7f3c7f2784e1400b27019c78446d22e30

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un148287.exe

    Filesize

    541KB

    MD5

    b12fa92472c160d77509a685ffb89de1

    SHA1

    647708ee38ccdbbc9e68cfa1639b9c4a355e32da

    SHA256

    b3a31a655d3fd6aad7ac7b5abfa80c2b3d6497ad16ef03df0d20b7ad1d7ef371

    SHA512

    5a004254036dee45653a05d94b15f56554208e4b8e8b2960ebce73c235eab59e994af10a4b9257d785281b9d7730cba7f3c7f2784e1400b27019c78446d22e30

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14856892.exe

    Filesize

    257KB

    MD5

    b850f41654139fdca3ea17f487fe9183

    SHA1

    5823560ebd5aa2ead79f07ca699016c5c98c531b

    SHA256

    e7012fcfb33d1ad6f04e9b9a17f97fecabb9ce42deb2b2dbedd3a30fc01cc553

    SHA512

    6802f84663ed6dc6dade2a4ec32395f4ac5a1ec71e7cee900462d69fc5fb594e66dfa184512dfd989a8d963b1aa54148d7e73eea8b56cdb8f15c4fdb3a2661a5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14856892.exe

    Filesize

    257KB

    MD5

    b850f41654139fdca3ea17f487fe9183

    SHA1

    5823560ebd5aa2ead79f07ca699016c5c98c531b

    SHA256

    e7012fcfb33d1ad6f04e9b9a17f97fecabb9ce42deb2b2dbedd3a30fc01cc553

    SHA512

    6802f84663ed6dc6dade2a4ec32395f4ac5a1ec71e7cee900462d69fc5fb594e66dfa184512dfd989a8d963b1aa54148d7e73eea8b56cdb8f15c4fdb3a2661a5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk772065.exe

    Filesize

    340KB

    MD5

    7a14eaa7d21ebc5ecb15fbb49fd3dc96

    SHA1

    983d325d3bd7350e2ffbe5f9022abd13ea6292eb

    SHA256

    9785bced23e8a6248e945ad64ca93ed3db5849c28c602c6f5d13182287f8167b

    SHA512

    907332c093685907003e0d322229797cd93b2263e12c8fb2e40e8291168e60f7cca3308daf508a7b3122475a1edf7c6db36ef104775ac847039ce4783f27811c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk772065.exe

    Filesize

    340KB

    MD5

    7a14eaa7d21ebc5ecb15fbb49fd3dc96

    SHA1

    983d325d3bd7350e2ffbe5f9022abd13ea6292eb

    SHA256

    9785bced23e8a6248e945ad64ca93ed3db5849c28c602c6f5d13182287f8167b

    SHA512

    907332c093685907003e0d322229797cd93b2263e12c8fb2e40e8291168e60f7cca3308daf508a7b3122475a1edf7c6db36ef104775ac847039ce4783f27811c

  • memory/4312-208-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-212-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-990-0x000000000B260000-0x000000000B78C000-memory.dmp

    Filesize

    5.2MB

  • memory/4312-184-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-987-0x000000000B040000-0x000000000B090000-memory.dmp

    Filesize

    320KB

  • memory/4312-186-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-985-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/4312-984-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4312-983-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/4312-982-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

    Filesize

    300KB

  • memory/4312-188-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-981-0x0000000009D30000-0x0000000009D6E000-memory.dmp

    Filesize

    248KB

  • memory/4312-980-0x0000000007130000-0x0000000007140000-memory.dmp

    Filesize

    64KB

  • memory/4312-979-0x0000000009C10000-0x0000000009D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4312-978-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

    Filesize

    72KB

  • memory/4312-977-0x000000000A160000-0x000000000A766000-memory.dmp

    Filesize

    6.0MB

  • memory/4312-218-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-216-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-214-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-210-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-206-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-204-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-202-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-200-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-198-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-196-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-179-0x0000000007090000-0x00000000070CC000-memory.dmp

    Filesize

    240KB

  • memory/4312-180-0x0000000007640000-0x000000000767A000-memory.dmp

    Filesize

    232KB

  • memory/4312-181-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-182-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-989-0x000000000B090000-0x000000000B252000-memory.dmp

    Filesize

    1.8MB

  • memory/4312-986-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/4312-194-0x0000000007130000-0x0000000007140000-memory.dmp

    Filesize

    64KB

  • memory/4312-191-0x0000000002C80000-0x0000000002CC6000-memory.dmp

    Filesize

    280KB

  • memory/4312-190-0x0000000007640000-0x0000000007675000-memory.dmp

    Filesize

    212KB

  • memory/4312-192-0x0000000007130000-0x0000000007140000-memory.dmp

    Filesize

    64KB

  • memory/4312-195-0x0000000007130000-0x0000000007140000-memory.dmp

    Filesize

    64KB

  • memory/4576-140-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-166-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-152-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4576-173-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-171-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-170-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-135-0x0000000002DB0000-0x0000000002DCA000-memory.dmp

    Filesize

    104KB

  • memory/4576-169-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4576-139-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-168-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4576-137-0x0000000004C80000-0x0000000004C98000-memory.dmp

    Filesize

    96KB

  • memory/4576-136-0x00000000073F0000-0x00000000078EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4576-144-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-162-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-156-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-160-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-150-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-148-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-146-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-164-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-142-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-141-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-158-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB

  • memory/4576-138-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/4576-154-0x0000000004C80000-0x0000000004C93000-memory.dmp

    Filesize

    76KB