Analysis

  • max time kernel
    58s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 13:09

General

  • Target

    7a74b9649b104082bb0df1316c07dc986c663936dd7132d3b81dc4a2e171938e.exe

  • Size

    694KB

  • MD5

    47da01d9f925ec08e2ea8f90cf1dc3d2

  • SHA1

    773f52c66cf7477448ad44e58a6b01745642e93e

  • SHA256

    7a74b9649b104082bb0df1316c07dc986c663936dd7132d3b81dc4a2e171938e

  • SHA512

    10c79e9c88ff4ec70c7e4852bcb48e27e127434f1aeba8e5baf56cdba7110f4868c7976ac87d1293303781eac9767939e25c013becef3191ed0f1a3521056813

  • SSDEEP

    12288:wy90pB+n/o/qQ4jX2eMnbAU7Re/2jVyy/AsXlhxnUo5vleu2K75org5XPV:wySB+nbQ4jXbMBAMVb1hxnUUWK7er4fV

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a74b9649b104082bb0df1316c07dc986c663936dd7132d3b81dc4a2e171938e.exe
    "C:\Users\Admin\AppData\Local\Temp\7a74b9649b104082bb0df1316c07dc986c663936dd7132d3b81dc4a2e171938e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958428.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958428.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22347015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22347015.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1080
          4⤵
          • Program crash
          PID:3528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk897064.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk897064.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 1052
          4⤵
          • Program crash
          PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024474.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2204 -ip 2204
    1⤵
      PID:100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4992 -ip 4992
      1⤵
        PID:1012

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024474.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024474.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958428.exe

        Filesize

        540KB

        MD5

        a96262a52a92639522e1631664118413

        SHA1

        bb39f49c8730aa183ba9ecf90e32233798da1cf2

        SHA256

        b6e3dea481c5588dc2bbe4cf75a56ce432762ede557eb1210f58dabd00c23ead

        SHA512

        fcaba65334f6d3ea9e5c8b48d6105bacf3db38e41aa6317b140c09cd66172fe0f0f88f8c3115cf6343968a63e76da0069958679f0a85bfd79879ea2f6fb941de

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958428.exe

        Filesize

        540KB

        MD5

        a96262a52a92639522e1631664118413

        SHA1

        bb39f49c8730aa183ba9ecf90e32233798da1cf2

        SHA256

        b6e3dea481c5588dc2bbe4cf75a56ce432762ede557eb1210f58dabd00c23ead

        SHA512

        fcaba65334f6d3ea9e5c8b48d6105bacf3db38e41aa6317b140c09cd66172fe0f0f88f8c3115cf6343968a63e76da0069958679f0a85bfd79879ea2f6fb941de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22347015.exe

        Filesize

        257KB

        MD5

        1cc45bf2b1a7a7b947f3754933e76991

        SHA1

        6c465fd446efd2ed53eb62d194bd735687e68985

        SHA256

        07e20fda75689f5014aa99ddc30b33eaf295c20a19bac8207448d4b7ceff9302

        SHA512

        abe48bf92764636861ca8359ec0770b590ecc5f6e3ba1997a5314f49cb206644f25c93096135e7a507562a4d6431b548554b14fa1965c2212b5afdf7c5bdbc19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22347015.exe

        Filesize

        257KB

        MD5

        1cc45bf2b1a7a7b947f3754933e76991

        SHA1

        6c465fd446efd2ed53eb62d194bd735687e68985

        SHA256

        07e20fda75689f5014aa99ddc30b33eaf295c20a19bac8207448d4b7ceff9302

        SHA512

        abe48bf92764636861ca8359ec0770b590ecc5f6e3ba1997a5314f49cb206644f25c93096135e7a507562a4d6431b548554b14fa1965c2212b5afdf7c5bdbc19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk897064.exe

        Filesize

        340KB

        MD5

        0b3eb97ce340d083dd38729af90db92b

        SHA1

        2832d746155f9fb5c08747e2b0fce928489a253a

        SHA256

        b667f62195b9483d1981b796a24726ae6a31501e5a441b89877c3c19b8bf2b90

        SHA512

        d3e5005795c09e9a09d16fabf25c661df44c48249ea7949647eaa43e076edd4f9622a8dbd8e96213f31f4758288c45cf3af2bf9bad50b6ce729f7a3b4c500719

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk897064.exe

        Filesize

        340KB

        MD5

        0b3eb97ce340d083dd38729af90db92b

        SHA1

        2832d746155f9fb5c08747e2b0fce928489a253a

        SHA256

        b667f62195b9483d1981b796a24726ae6a31501e5a441b89877c3c19b8bf2b90

        SHA512

        d3e5005795c09e9a09d16fabf25c661df44c48249ea7949647eaa43e076edd4f9622a8dbd8e96213f31f4758288c45cf3af2bf9bad50b6ce729f7a3b4c500719

      • memory/1680-1004-0x0000000000D80000-0x0000000000DA8000-memory.dmp

        Filesize

        160KB

      • memory/1680-1005-0x0000000007AA0000-0x0000000007AB0000-memory.dmp

        Filesize

        64KB

      • memory/2204-159-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-169-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-152-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-153-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-155-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-157-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-150-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/2204-161-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-163-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-165-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-167-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-151-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/2204-171-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-173-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-175-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-177-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-179-0x0000000007240000-0x0000000007253000-memory.dmp

        Filesize

        76KB

      • memory/2204-180-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/2204-181-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/2204-182-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/2204-183-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/2204-185-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/2204-149-0x0000000002C70000-0x0000000002C9D000-memory.dmp

        Filesize

        180KB

      • memory/2204-148-0x0000000007330000-0x00000000078D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4992-192-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4992-193-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-194-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-196-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-198-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-200-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-202-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-204-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-206-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-208-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-210-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-212-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-214-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-216-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-218-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-220-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-222-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-224-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-226-0x0000000007180000-0x00000000071B5000-memory.dmp

        Filesize

        212KB

      • memory/4992-236-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4992-986-0x0000000009D20000-0x000000000A338000-memory.dmp

        Filesize

        6.1MB

      • memory/4992-987-0x00000000072A0000-0x00000000072B2000-memory.dmp

        Filesize

        72KB

      • memory/4992-988-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/4992-989-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/4992-990-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4992-991-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/4992-992-0x000000000AF10000-0x000000000AFA2000-memory.dmp

        Filesize

        584KB

      • memory/4992-993-0x000000000AFD0000-0x000000000B046000-memory.dmp

        Filesize

        472KB

      • memory/4992-994-0x000000000B0A0000-0x000000000B262000-memory.dmp

        Filesize

        1.8MB

      • memory/4992-995-0x000000000B290000-0x000000000B7BC000-memory.dmp

        Filesize

        5.2MB

      • memory/4992-191-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/4992-190-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

        Filesize

        280KB

      • memory/4992-996-0x000000000B8C0000-0x000000000B8DE000-memory.dmp

        Filesize

        120KB

      • memory/4992-997-0x0000000006C20000-0x0000000006C70000-memory.dmp

        Filesize

        320KB