Analysis

  • max time kernel
    55s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 12:20

General

  • Target

    966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe

  • Size

    696KB

  • MD5

    96842a3dd27d06b66f1575bca986b743

  • SHA1

    d05681403fe79b745a9e2b02162be301c9e1bed5

  • SHA256

    966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8

  • SHA512

    f547c20aaeb2f1667d661b85c1736d9a28a921f1b251a0262641a64ec3090f93412b8add22cf6cbca94927d421a6a6357efce248889ddcb5e0845e7c8b873875

  • SSDEEP

    12288:9y90VtjHvNjo2Kgdx8e6oBYgv+Gvr5nRHZ1FNU45zykkxeCiD0Oqhk7:9yGNjoWQe6oTGIR51FNf5zykKeCiD0Jq

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe
    "C:\Users\Admin\AppData\Local\Temp\966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2556

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exe

          Filesize

          542KB

          MD5

          69f965729346408079e8cfbe1606f9b7

          SHA1

          31abd8de5742d7bd4bfab0a894a97323a3460068

          SHA256

          3b22097a521811ea5054a0ad240c1956ce072d696b96537fa0c939b6dc8f6151

          SHA512

          3b5fc3ad7a53bfdfaa206284ecf0e811fbf98d612cd660c553bda28c146c197f2fd020d7e45760df7aa2f3feba63365999472ca22907b9dd32ff04625aafbf9c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exe

          Filesize

          542KB

          MD5

          69f965729346408079e8cfbe1606f9b7

          SHA1

          31abd8de5742d7bd4bfab0a894a97323a3460068

          SHA256

          3b22097a521811ea5054a0ad240c1956ce072d696b96537fa0c939b6dc8f6151

          SHA512

          3b5fc3ad7a53bfdfaa206284ecf0e811fbf98d612cd660c553bda28c146c197f2fd020d7e45760df7aa2f3feba63365999472ca22907b9dd32ff04625aafbf9c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exe

          Filesize

          258KB

          MD5

          9389fc466503b7936bb11cf94aa87c13

          SHA1

          5c19ee1a83f67b7e7dd2a517012c87697a78ae8f

          SHA256

          375192532fea2de9a5b0c19474740881cda1dc513dd006bcbb3943e5ca7b5e58

          SHA512

          e161b31631586a3d341227ead86dbace85c688ed169f9f55d36a23cf4f8da094381a3afe24443c87dc95dc1b1904b8252e27c03937d18a899c46dfc45412e3e7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exe

          Filesize

          258KB

          MD5

          9389fc466503b7936bb11cf94aa87c13

          SHA1

          5c19ee1a83f67b7e7dd2a517012c87697a78ae8f

          SHA256

          375192532fea2de9a5b0c19474740881cda1dc513dd006bcbb3943e5ca7b5e58

          SHA512

          e161b31631586a3d341227ead86dbace85c688ed169f9f55d36a23cf4f8da094381a3afe24443c87dc95dc1b1904b8252e27c03937d18a899c46dfc45412e3e7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exe

          Filesize

          340KB

          MD5

          555bbdfe5adb09ad59da1d183becabc3

          SHA1

          a8f309a80bac831885404c9e73b8517e78b98856

          SHA256

          21597f37e9e7bd4c0b1c632d189ac365249bfb4a99da2be5d73da4674017072c

          SHA512

          fe18e7b5cc43653d3bdee564f0e4ea232522e14a2651b43309a6ce67dd79f956055182bb031c90d0f354f5dc736d696f3930527cda989f53cdce420ee9efc990

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exe

          Filesize

          340KB

          MD5

          555bbdfe5adb09ad59da1d183becabc3

          SHA1

          a8f309a80bac831885404c9e73b8517e78b98856

          SHA256

          21597f37e9e7bd4c0b1c632d189ac365249bfb4a99da2be5d73da4674017072c

          SHA512

          fe18e7b5cc43653d3bdee564f0e4ea232522e14a2651b43309a6ce67dd79f956055182bb031c90d0f354f5dc736d696f3930527cda989f53cdce420ee9efc990

        • memory/2556-991-0x0000000007170000-0x0000000007180000-memory.dmp

          Filesize

          64KB

        • memory/2556-990-0x0000000006E70000-0x0000000006EBB000-memory.dmp

          Filesize

          300KB

        • memory/2556-989-0x00000000000F0000-0x0000000000118000-memory.dmp

          Filesize

          160KB

        • memory/4344-971-0x000000000A250000-0x000000000A856000-memory.dmp

          Filesize

          6.0MB

        • memory/4344-974-0x0000000009D50000-0x0000000009D8E000-memory.dmp

          Filesize

          248KB

        • memory/4344-983-0x0000000006CA0000-0x0000000006CF0000-memory.dmp

          Filesize

          320KB

        • memory/4344-982-0x000000000B6B0000-0x000000000B6CE000-memory.dmp

          Filesize

          120KB

        • memory/4344-981-0x000000000B0E0000-0x000000000B60C000-memory.dmp

          Filesize

          5.2MB

        • memory/4344-980-0x000000000AF10000-0x000000000B0D2000-memory.dmp

          Filesize

          1.8MB

        • memory/4344-979-0x000000000ADD0000-0x000000000AE46000-memory.dmp

          Filesize

          472KB

        • memory/4344-978-0x000000000AD30000-0x000000000ADC2000-memory.dmp

          Filesize

          584KB

        • memory/4344-977-0x000000000A040000-0x000000000A0A6000-memory.dmp

          Filesize

          408KB

        • memory/4344-976-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/4344-975-0x0000000009DB0000-0x0000000009DFB000-memory.dmp

          Filesize

          300KB

        • memory/4344-973-0x0000000009C40000-0x0000000009D4A000-memory.dmp

          Filesize

          1.0MB

        • memory/4344-972-0x0000000007250000-0x0000000007262000-memory.dmp

          Filesize

          72KB

        • memory/4344-381-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/4344-379-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/4344-377-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/4344-376-0x0000000002C80000-0x0000000002CC6000-memory.dmp

          Filesize

          280KB

        • memory/4344-208-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-206-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-173-0x0000000002FA0000-0x0000000002FDC000-memory.dmp

          Filesize

          240KB

        • memory/4344-174-0x0000000004A40000-0x0000000004A7A000-memory.dmp

          Filesize

          232KB

        • memory/4344-176-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-175-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-178-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-180-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-182-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-184-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-186-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-188-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-190-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-192-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-194-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-196-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-198-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-200-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-202-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4344-204-0x0000000004A40000-0x0000000004A75000-memory.dmp

          Filesize

          212KB

        • memory/4656-154-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-136-0x00000000070D0000-0x00000000070E8000-memory.dmp

          Filesize

          96KB

        • memory/4656-168-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/4656-166-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4656-165-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/4656-164-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-156-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-162-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-160-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-140-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-138-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-158-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-146-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-152-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-150-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-148-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-137-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-144-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-142-0x00000000070D0000-0x00000000070E3000-memory.dmp

          Filesize

          76KB

        • memory/4656-135-0x0000000007270000-0x000000000776E000-memory.dmp

          Filesize

          5.0MB

        • memory/4656-134-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4656-133-0x0000000007260000-0x0000000007270000-memory.dmp

          Filesize

          64KB

        • memory/4656-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4656-131-0x0000000004BE0000-0x0000000004BFA000-memory.dmp

          Filesize

          104KB