Analysis

  • max time kernel
    52s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 13:38

General

  • Target

    10b858faebcb6d870e301908f31d7eccdba6d49db8e6b00adb936cb87fb15f7d.exe

  • Size

    694KB

  • MD5

    396a115783579f92acee0d50b3db982e

  • SHA1

    ec842757b4eb30cca5cda10a839effebd796dcf4

  • SHA256

    10b858faebcb6d870e301908f31d7eccdba6d49db8e6b00adb936cb87fb15f7d

  • SHA512

    f1ef59ef0109b00b75483c5838541e4e7e0148b6cd9d0f41be42c2d81e534e7414af95ada43be9f74e016dfdb11ccdfaa96eb04188d88e20d250d7bb23213c18

  • SSDEEP

    12288:oy90YibYoT8MjfaEH29+P2YoPifsp/AsnzlUsUx5vleu2KXina2Sn4J:oyiQOfaEHWyloKmzlUsUxWKtFn4J

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b858faebcb6d870e301908f31d7eccdba6d49db8e6b00adb936cb87fb15f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\10b858faebcb6d870e301908f31d7eccdba6d49db8e6b00adb936cb87fb15f7d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287230.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287230.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22461417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22461417.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk208861.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk208861.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487599.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487599.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487599.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487599.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287230.exe

    Filesize

    540KB

    MD5

    a8be64c04659c169c0b763296cd70f89

    SHA1

    25795cdb477adc1b0d8b0663daedd9c5e4f0736f

    SHA256

    4154295ced1af4dfc227a28ffcac82abf94189b0c5a8fbae88f1e07af75eb371

    SHA512

    e3000781e074aaa3208a76b0dd4b4723c3dd417358567298312077992a76138c5acac63f774102d5ed3ba6021b2f839a7c432c0bef51de75d728f4cfbf0fff3b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287230.exe

    Filesize

    540KB

    MD5

    a8be64c04659c169c0b763296cd70f89

    SHA1

    25795cdb477adc1b0d8b0663daedd9c5e4f0736f

    SHA256

    4154295ced1af4dfc227a28ffcac82abf94189b0c5a8fbae88f1e07af75eb371

    SHA512

    e3000781e074aaa3208a76b0dd4b4723c3dd417358567298312077992a76138c5acac63f774102d5ed3ba6021b2f839a7c432c0bef51de75d728f4cfbf0fff3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22461417.exe

    Filesize

    257KB

    MD5

    f70bb6e3e854694c767a2d361e0c4551

    SHA1

    5278c10fc2c10a8791204828eb5f54e199586f6e

    SHA256

    a81f063c1834fa5c71ee4613bcb6262637bb20fee368ce09e2a27727e0b3fb83

    SHA512

    2f6142600f531cda77823d4fd6a5c6366fc4c28d6539a0b1526cd2d96e7aa4b36606ea61d6a696aac51fbf42823b00c448a93087daddebbdae5c6e9340383cd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22461417.exe

    Filesize

    257KB

    MD5

    f70bb6e3e854694c767a2d361e0c4551

    SHA1

    5278c10fc2c10a8791204828eb5f54e199586f6e

    SHA256

    a81f063c1834fa5c71ee4613bcb6262637bb20fee368ce09e2a27727e0b3fb83

    SHA512

    2f6142600f531cda77823d4fd6a5c6366fc4c28d6539a0b1526cd2d96e7aa4b36606ea61d6a696aac51fbf42823b00c448a93087daddebbdae5c6e9340383cd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk208861.exe

    Filesize

    340KB

    MD5

    59f36bcd7c4a74a4b385569880d12fdc

    SHA1

    1b2ed2b1e6ee644ab98bdd070caeac0b2f488108

    SHA256

    d4825aca3b066e90e597837f33a3da24b2c8acf930e2a2b8be43173082bae324

    SHA512

    ea738c2c46d4b233b79c0248fc81cc6db3c00518fae7fadc6984bdab7e08e4f298f91d65d6e4d0642ba6281aba8c6060f15224e8abbf4b432c533db1e419b33c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk208861.exe

    Filesize

    340KB

    MD5

    59f36bcd7c4a74a4b385569880d12fdc

    SHA1

    1b2ed2b1e6ee644ab98bdd070caeac0b2f488108

    SHA256

    d4825aca3b066e90e597837f33a3da24b2c8acf930e2a2b8be43173082bae324

    SHA512

    ea738c2c46d4b233b79c0248fc81cc6db3c00518fae7fadc6984bdab7e08e4f298f91d65d6e4d0642ba6281aba8c6060f15224e8abbf4b432c533db1e419b33c

  • memory/2596-998-0x0000000007A50000-0x0000000007A9B000-memory.dmp

    Filesize

    300KB

  • memory/2596-997-0x0000000000CD0000-0x0000000000CF8000-memory.dmp

    Filesize

    160KB

  • memory/2596-999-0x0000000007D40000-0x0000000007D50000-memory.dmp

    Filesize

    64KB

  • memory/2688-146-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-158-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-141-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/2688-140-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/2688-142-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/2688-143-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-144-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-138-0x0000000004AE0000-0x0000000004AF8000-memory.dmp

    Filesize

    96KB

  • memory/2688-148-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-150-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-152-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-154-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-156-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-139-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

    Filesize

    180KB

  • memory/2688-160-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-162-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-164-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-166-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-168-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-170-0x0000000004AE0000-0x0000000004AF3000-memory.dmp

    Filesize

    76KB

  • memory/2688-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2688-172-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/2688-173-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/2688-175-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2688-137-0x00000000071F0000-0x00000000076EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2688-136-0x0000000004800000-0x000000000481A000-memory.dmp

    Filesize

    104KB

  • memory/4736-181-0x0000000004C70000-0x0000000004CAA000-memory.dmp

    Filesize

    232KB

  • memory/4736-183-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-184-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4736-186-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-187-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-191-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-193-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-189-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-188-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-195-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-197-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-199-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-201-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-203-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-205-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-207-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-209-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-211-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-213-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-215-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-217-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-219-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-978-0x000000000A1D0000-0x000000000A7D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4736-979-0x0000000004C00000-0x0000000004C12000-memory.dmp

    Filesize

    72KB

  • memory/4736-980-0x0000000009C10000-0x0000000009D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4736-981-0x0000000009D30000-0x0000000009D6E000-memory.dmp

    Filesize

    248KB

  • memory/4736-982-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-983-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

    Filesize

    300KB

  • memory/4736-984-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/4736-985-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/4736-986-0x000000000AF10000-0x000000000AF86000-memory.dmp

    Filesize

    472KB

  • memory/4736-987-0x000000000AFB0000-0x000000000AFCE000-memory.dmp

    Filesize

    120KB

  • memory/4736-182-0x0000000004C70000-0x0000000004CA5000-memory.dmp

    Filesize

    212KB

  • memory/4736-180-0x0000000004AC0000-0x0000000004AFC000-memory.dmp

    Filesize

    240KB

  • memory/4736-988-0x000000000B080000-0x000000000B0D0000-memory.dmp

    Filesize

    320KB

  • memory/4736-989-0x000000000B1D0000-0x000000000B392000-memory.dmp

    Filesize

    1.8MB

  • memory/4736-991-0x000000000B3A0000-0x000000000B8CC000-memory.dmp

    Filesize

    5.2MB