Analysis

  • max time kernel
    51s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 12:16

General

  • Target

    60c9289d270aa9a8b6d3554ff89912ac7c5fc6358a53265d15c8ebcb7b80b3d7.exe

  • Size

    695KB

  • MD5

    896553c779f25399ad0cef39a758ba4b

  • SHA1

    66d3b23925f9e1fcb1cc7370e4d183b1f09c0200

  • SHA256

    60c9289d270aa9a8b6d3554ff89912ac7c5fc6358a53265d15c8ebcb7b80b3d7

  • SHA512

    a13e65312310a9ba2c24aae4ed2d41410aceccf787f3a4038658a68704466e1135554ae60ed0394890c00c08add5e3f207c8f7a251e31c0dc9ab171b5062ad31

  • SSDEEP

    12288:iy903dTLREAqt7FLe/Xg3FhT7CDNUg5zVkkxHeP9MD0bWA:iywSRqw1cDNF5zVkKM4rA

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60c9289d270aa9a8b6d3554ff89912ac7c5fc6358a53265d15c8ebcb7b80b3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\60c9289d270aa9a8b6d3554ff89912ac7c5fc6358a53265d15c8ebcb7b80b3d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456813.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456813.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02845440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02845440.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890509.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890509.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si028554.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si028554.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si028554.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si028554.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456813.exe

    Filesize

    542KB

    MD5

    df21fefbbdbcba90546097e5270e80a9

    SHA1

    79427d83dee4fae40c9843c0dc73edaa175e0838

    SHA256

    3973dddc8cffaf83487819d164ff8bd385e149d4f64a67cdda18414b72bb454e

    SHA512

    36ebe1adf9fe86f74b314a7c7dd8a5b690d2afd97e1332e37428d08b9f3a6b25312a712c3b195d714b93a94e9cfb9f5f6aec6f3e1a3294a7f416d2a84ad55acd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un456813.exe

    Filesize

    542KB

    MD5

    df21fefbbdbcba90546097e5270e80a9

    SHA1

    79427d83dee4fae40c9843c0dc73edaa175e0838

    SHA256

    3973dddc8cffaf83487819d164ff8bd385e149d4f64a67cdda18414b72bb454e

    SHA512

    36ebe1adf9fe86f74b314a7c7dd8a5b690d2afd97e1332e37428d08b9f3a6b25312a712c3b195d714b93a94e9cfb9f5f6aec6f3e1a3294a7f416d2a84ad55acd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02845440.exe

    Filesize

    258KB

    MD5

    e2a77cb2baa8fabbb6d5030a125a10f5

    SHA1

    54d16b9ae9da5d0ead6591eee4a54cbac1b386d9

    SHA256

    3ae5fed8d4f66ff93a97330d056db647849d393b4c6b94f4f7d1978d8c038a20

    SHA512

    2116d2f98ee4ca296b6be9a30db532087823255fbaa9c7def1f3696976762a8141b605c998334513dcae289d5adcefb0e7aa3d1a41edf746424c3ff961efbf6a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02845440.exe

    Filesize

    258KB

    MD5

    e2a77cb2baa8fabbb6d5030a125a10f5

    SHA1

    54d16b9ae9da5d0ead6591eee4a54cbac1b386d9

    SHA256

    3ae5fed8d4f66ff93a97330d056db647849d393b4c6b94f4f7d1978d8c038a20

    SHA512

    2116d2f98ee4ca296b6be9a30db532087823255fbaa9c7def1f3696976762a8141b605c998334513dcae289d5adcefb0e7aa3d1a41edf746424c3ff961efbf6a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890509.exe

    Filesize

    340KB

    MD5

    2654a8995d01a1999d2c39e8cd3d93ab

    SHA1

    f5c3a6133317ae2fa17730edb3106162067721d7

    SHA256

    64455f6c252d2aa99b812171b013ded17279bb6ba8ee62c6511ce71cca5339f1

    SHA512

    c58f26b0047f90f8457f54898adb11e30ea4cc67baa3aaa98c954168473967f483fe6ca0a9588fcd29c64e60d040bcfb08af813e178e75de12ba8ac4a5d0b354

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890509.exe

    Filesize

    340KB

    MD5

    2654a8995d01a1999d2c39e8cd3d93ab

    SHA1

    f5c3a6133317ae2fa17730edb3106162067721d7

    SHA256

    64455f6c252d2aa99b812171b013ded17279bb6ba8ee62c6511ce71cca5339f1

    SHA512

    c58f26b0047f90f8457f54898adb11e30ea4cc67baa3aaa98c954168473967f483fe6ca0a9588fcd29c64e60d040bcfb08af813e178e75de12ba8ac4a5d0b354

  • memory/3560-135-0x00000000048D0000-0x00000000048EA000-memory.dmp

    Filesize

    104KB

  • memory/3560-136-0x00000000072C0000-0x00000000077BE000-memory.dmp

    Filesize

    5.0MB

  • memory/3560-137-0x0000000004C70000-0x0000000004C88000-memory.dmp

    Filesize

    96KB

  • memory/3560-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3560-139-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3560-140-0x00000000072B0000-0x00000000072C0000-memory.dmp

    Filesize

    64KB

  • memory/3560-142-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-141-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-144-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-146-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-148-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-150-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-152-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-154-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-156-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-158-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-160-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-162-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-164-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-166-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-168-0x0000000004C70000-0x0000000004C83000-memory.dmp

    Filesize

    76KB

  • memory/3560-169-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3560-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3576-176-0x0000000004810000-0x000000000484C000-memory.dmp

    Filesize

    240KB

  • memory/3576-177-0x0000000004AA0000-0x0000000004ADA000-memory.dmp

    Filesize

    232KB

  • memory/3576-179-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-178-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-181-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-183-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-185-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-187-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-189-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-191-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-193-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-195-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-197-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-199-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-201-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-203-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-205-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-207-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-208-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

    Filesize

    280KB

  • memory/3576-211-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-212-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/3576-210-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/3576-215-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/3576-214-0x0000000004AA0000-0x0000000004AD5000-memory.dmp

    Filesize

    212KB

  • memory/3576-974-0x000000000A3C0000-0x000000000A9C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-975-0x0000000004CF0000-0x0000000004D02000-memory.dmp

    Filesize

    72KB

  • memory/3576-976-0x0000000009DB0000-0x0000000009EBA000-memory.dmp

    Filesize

    1.0MB

  • memory/3576-977-0x0000000004D40000-0x0000000004D7E000-memory.dmp

    Filesize

    248KB

  • memory/3576-978-0x0000000004DC0000-0x0000000004E0B000-memory.dmp

    Filesize

    300KB

  • memory/3576-979-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/3576-980-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/3576-981-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3576-982-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/3576-983-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/3576-984-0x000000000AF40000-0x000000000B102000-memory.dmp

    Filesize

    1.8MB

  • memory/3576-985-0x000000000B110000-0x000000000B63C000-memory.dmp

    Filesize

    5.2MB

  • memory/3576-987-0x0000000004880000-0x00000000048D0000-memory.dmp

    Filesize

    320KB

  • memory/4020-993-0x00000000000D0000-0x00000000000F8000-memory.dmp

    Filesize

    160KB

  • memory/4020-994-0x0000000006E50000-0x0000000006E9B000-memory.dmp

    Filesize

    300KB

  • memory/4020-995-0x0000000007140000-0x0000000007150000-memory.dmp

    Filesize

    64KB