Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 13:27

General

  • Target

    163bfe62c5d39a936a494e7b2fa43d81904b75b78ba5969b71bb5ab38bccb84b.exe

  • Size

    694KB

  • MD5

    9a3eba68ad67529edc564c505ec8c3c7

  • SHA1

    38124ff5eb7c9725bb9b1aed76a03112e4acc304

  • SHA256

    163bfe62c5d39a936a494e7b2fa43d81904b75b78ba5969b71bb5ab38bccb84b

  • SHA512

    08c42096181c93b65c746f8deae38fff34b0fb373d48951e9a26f25b9e57ab33ca95809001a1e2eab1633f8fbd63ebd4a529bdf6338c61619b74e35e19d6929b

  • SSDEEP

    12288:cy90IyPBtTsXGYIBpMU1gnddNXtUHptLJ/AszcASlUx5vleu2KGw3Xs:cy3yPB+X8DR1gnbN9UH3fIASlUxWKtXs

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\163bfe62c5d39a936a494e7b2fa43d81904b75b78ba5969b71bb5ab38bccb84b.exe
    "C:\Users\Admin\AppData\Local\Temp\163bfe62c5d39a936a494e7b2fa43d81904b75b78ba5969b71bb5ab38bccb84b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470150.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66157028.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66157028.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk524777.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk524777.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573803.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573803.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573803.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573803.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470150.exe

    Filesize

    540KB

    MD5

    342c5bf0cbf60dce2139106dc3ad8416

    SHA1

    c536f6fea70fa629c54f23092091686f7db44456

    SHA256

    c81ed6c78358df2e0866d796b32f9022eb30bc5aa0f654c0f70f56399be43244

    SHA512

    9b1edc7807fa9ea008fd8d7bd38bb241faf75e33a98ebaa500e03601984e8e6bf4990d285dd552e92d9d3e915c6f2656fe16f755a006a8fb29ebd5be04d954ee

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470150.exe

    Filesize

    540KB

    MD5

    342c5bf0cbf60dce2139106dc3ad8416

    SHA1

    c536f6fea70fa629c54f23092091686f7db44456

    SHA256

    c81ed6c78358df2e0866d796b32f9022eb30bc5aa0f654c0f70f56399be43244

    SHA512

    9b1edc7807fa9ea008fd8d7bd38bb241faf75e33a98ebaa500e03601984e8e6bf4990d285dd552e92d9d3e915c6f2656fe16f755a006a8fb29ebd5be04d954ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66157028.exe

    Filesize

    257KB

    MD5

    d11fd98faf5d2b68f484b2ecbd009c6e

    SHA1

    7648326bf7725feb189749ee830b8dc07a4aa5f5

    SHA256

    a219bb6aae6fc35d45e6ccb8b39f1dc684394c69c57f5d831b279000ba9b096b

    SHA512

    36fae13f13d5c5dc02dd5a341b42aeabcfd05bab05912f42ef26211d3c18aacffdcda393f7bddb8736000e683eaab6ec16a0608f36cefa181d967a35d6607dc5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66157028.exe

    Filesize

    257KB

    MD5

    d11fd98faf5d2b68f484b2ecbd009c6e

    SHA1

    7648326bf7725feb189749ee830b8dc07a4aa5f5

    SHA256

    a219bb6aae6fc35d45e6ccb8b39f1dc684394c69c57f5d831b279000ba9b096b

    SHA512

    36fae13f13d5c5dc02dd5a341b42aeabcfd05bab05912f42ef26211d3c18aacffdcda393f7bddb8736000e683eaab6ec16a0608f36cefa181d967a35d6607dc5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk524777.exe

    Filesize

    340KB

    MD5

    94f4774ee44a70ea144801c5903461e6

    SHA1

    a5929154c9cb8e9fa2694bf1f9408ab70ccb29d8

    SHA256

    3ca2c1a2ca923c7886493e079bd3b96864c32ea8613818eb4ae8358da4769441

    SHA512

    d7577dd96d50dc04b53ac89aeb7aefd8146d64ce825582b102f1c0668f88ac8919d4afee3c4f565ed850aff53b2a7311abc811225a89a5830e512aaa09089b21

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk524777.exe

    Filesize

    340KB

    MD5

    94f4774ee44a70ea144801c5903461e6

    SHA1

    a5929154c9cb8e9fa2694bf1f9408ab70ccb29d8

    SHA256

    3ca2c1a2ca923c7886493e079bd3b96864c32ea8613818eb4ae8358da4769441

    SHA512

    d7577dd96d50dc04b53ac89aeb7aefd8146d64ce825582b102f1c0668f88ac8919d4afee3c4f565ed850aff53b2a7311abc811225a89a5830e512aaa09089b21

  • memory/3576-215-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-979-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

    Filesize

    72KB

  • memory/3576-201-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-199-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-196-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-991-0x000000000B260000-0x000000000B78C000-memory.dmp

    Filesize

    5.2MB

  • memory/3576-990-0x000000000B090000-0x000000000B252000-memory.dmp

    Filesize

    1.8MB

  • memory/3576-189-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-988-0x000000000B040000-0x000000000B090000-memory.dmp

    Filesize

    320KB

  • memory/3576-987-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/3576-986-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/3576-985-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3576-984-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/3576-192-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/3576-983-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/3576-982-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

    Filesize

    300KB

  • memory/3576-981-0x0000000009D30000-0x0000000009D6E000-memory.dmp

    Filesize

    248KB

  • memory/3576-194-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/3576-980-0x0000000009C10000-0x0000000009D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3576-203-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-978-0x000000000A160000-0x000000000A766000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-219-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-217-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-213-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-211-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-180-0x0000000006F80000-0x0000000006FBC000-memory.dmp

    Filesize

    240KB

  • memory/3576-181-0x0000000007650000-0x000000000768A000-memory.dmp

    Filesize

    232KB

  • memory/3576-183-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-182-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-185-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-187-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-190-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

    Filesize

    280KB

  • memory/3576-209-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-207-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-205-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-193-0x0000000007650000-0x0000000007685000-memory.dmp

    Filesize

    212KB

  • memory/3576-197-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/3928-997-0x0000000000140000-0x0000000000168000-memory.dmp

    Filesize

    160KB

  • memory/3928-998-0x0000000006EC0000-0x0000000006F0B000-memory.dmp

    Filesize

    300KB

  • memory/3928-999-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/4612-167-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-169-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-161-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-149-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-138-0x00000000070C0000-0x00000000070D8000-memory.dmp

    Filesize

    96KB

  • memory/4612-139-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB

  • memory/4612-137-0x00000000070F0000-0x00000000075EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4612-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4612-175-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB

  • memory/4612-173-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB

  • memory/4612-172-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB

  • memory/4612-170-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4612-140-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB

  • memory/4612-165-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-163-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-159-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-157-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-155-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-153-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-151-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-147-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-145-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-136-0x0000000004940000-0x000000000495A000-memory.dmp

    Filesize

    104KB

  • memory/4612-135-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/4612-143-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-142-0x00000000070C0000-0x00000000070D3000-memory.dmp

    Filesize

    76KB

  • memory/4612-141-0x00000000070E0000-0x00000000070F0000-memory.dmp

    Filesize

    64KB