Analysis

  • max time kernel
    126s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 14:39

General

  • Target

    d9f9d75eed17f71ddb5c06264518536631343af2cb431422499537e4337055e5.exe

  • Size

    694KB

  • MD5

    27a051cd951321e0c212497bd2460231

  • SHA1

    a6d89d5897a47b5c90c24df7f21be6a5e85d2ab0

  • SHA256

    d9f9d75eed17f71ddb5c06264518536631343af2cb431422499537e4337055e5

  • SHA512

    f546570b5889014f2195a8d4956fde310306b49b0681b3b00f40d13ef291b6409982b4121871a292664821a1a9ebafb591f4f40be4587bfd3522d0e90d6c26f9

  • SSDEEP

    12288:Uy90YZ0oIu/umSP+gMv2MUaYRIvZiU/AslND8iUA5vleu2KztyMvyx1:UyrT5mv2gMvTUaT5XD8iUcWKZRvyT

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9f9d75eed17f71ddb5c06264518536631343af2cb431422499537e4337055e5.exe
    "C:\Users\Admin\AppData\Local\Temp\d9f9d75eed17f71ddb5c06264518536631343af2cb431422499537e4337055e5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647881.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647881.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95756635.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95756635.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1096
          4⤵
          • Program crash
          PID:2812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk017329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk017329.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 1876
          4⤵
          • Program crash
          PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037450.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1344
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1068 -ip 1068
    1⤵
      PID:2472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2016 -ip 2016
      1⤵
        PID:544

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037450.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037450.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647881.exe

              Filesize

              540KB

              MD5

              6c0d9407e823e822c603188015e7f689

              SHA1

              4d0b4d1687d9fd005202b4f0f0830dc39ce71e08

              SHA256

              2c839bf64137abc206dd25bb69dbcbe9669fa4816b25483bff048a012021c51c

              SHA512

              18acfd364cfeca8c1f16f9f08769e6569437ccac0560dae0504786243e0df98817401a794ac8482027e27a006b67b8fd2f3fc7bcd5262c2844226ddcbec598d1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647881.exe

              Filesize

              540KB

              MD5

              6c0d9407e823e822c603188015e7f689

              SHA1

              4d0b4d1687d9fd005202b4f0f0830dc39ce71e08

              SHA256

              2c839bf64137abc206dd25bb69dbcbe9669fa4816b25483bff048a012021c51c

              SHA512

              18acfd364cfeca8c1f16f9f08769e6569437ccac0560dae0504786243e0df98817401a794ac8482027e27a006b67b8fd2f3fc7bcd5262c2844226ddcbec598d1

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95756635.exe

              Filesize

              257KB

              MD5

              41671dc9c1869be8fb10d44fb6589cbd

              SHA1

              9d10099a8956fc08b1e05c5aba55863eb6cc5d93

              SHA256

              91d4e75071aaab4ad68bc2c1c6880dc6c3d57bcca898d4eaeff0527bbab66bba

              SHA512

              390ad1d8d45bd5cd2b767a7de509db3bc0124448e9153a8d1feecd89d5a68793d491d0a0ca4ca04ab5a92d02db33079b627b1a2612a5721efc4f57b3da6a5206

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95756635.exe

              Filesize

              257KB

              MD5

              41671dc9c1869be8fb10d44fb6589cbd

              SHA1

              9d10099a8956fc08b1e05c5aba55863eb6cc5d93

              SHA256

              91d4e75071aaab4ad68bc2c1c6880dc6c3d57bcca898d4eaeff0527bbab66bba

              SHA512

              390ad1d8d45bd5cd2b767a7de509db3bc0124448e9153a8d1feecd89d5a68793d491d0a0ca4ca04ab5a92d02db33079b627b1a2612a5721efc4f57b3da6a5206

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk017329.exe

              Filesize

              340KB

              MD5

              397f0b8d21cde77743969d79c55e85c1

              SHA1

              e38a5d104ce3e5879f720a7e5262f32140e20f39

              SHA256

              30b00d8aeae6c28d92977b3d69a5100ca4bf32b6b02e2c5a05e8eba814111a7b

              SHA512

              c45a898a9fbf0e329ec196d9da25bbd5b67da9feac42ec13ec5e2c648d7c378a5f17d1715af62880403ad3113a23897a1c886f53cd35691ee2c3759e1f925211

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk017329.exe

              Filesize

              340KB

              MD5

              397f0b8d21cde77743969d79c55e85c1

              SHA1

              e38a5d104ce3e5879f720a7e5262f32140e20f39

              SHA256

              30b00d8aeae6c28d92977b3d69a5100ca4bf32b6b02e2c5a05e8eba814111a7b

              SHA512

              c45a898a9fbf0e329ec196d9da25bbd5b67da9feac42ec13ec5e2c648d7c378a5f17d1715af62880403ad3113a23897a1c886f53cd35691ee2c3759e1f925211

            • memory/1068-158-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-168-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-151-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-150-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-152-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-153-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-154-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-156-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-148-0x0000000007270000-0x0000000007814000-memory.dmp

              Filesize

              5.6MB

            • memory/1068-160-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-162-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-164-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-166-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-149-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

              Filesize

              180KB

            • memory/1068-170-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-172-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-174-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-176-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-178-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-180-0x0000000004B90000-0x0000000004BA3000-memory.dmp

              Filesize

              76KB

            • memory/1068-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1068-182-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-183-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-184-0x0000000007260000-0x0000000007270000-memory.dmp

              Filesize

              64KB

            • memory/1068-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1344-1005-0x00000000003D0000-0x00000000003F8000-memory.dmp

              Filesize

              160KB

            • memory/1344-1006-0x0000000007480000-0x0000000007490000-memory.dmp

              Filesize

              64KB

            • memory/2016-191-0x0000000002CB0000-0x0000000002CF6000-memory.dmp

              Filesize

              280KB

            • memory/2016-193-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/2016-194-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-195-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-197-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-199-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-201-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-203-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-205-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-207-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-209-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-211-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-213-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-215-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-217-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-219-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-221-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-223-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-225-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-227-0x0000000004C50000-0x0000000004C85000-memory.dmp

              Filesize

              212KB

            • memory/2016-238-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/2016-987-0x0000000009C50000-0x000000000A268000-memory.dmp

              Filesize

              6.1MB

            • memory/2016-988-0x000000000A300000-0x000000000A312000-memory.dmp

              Filesize

              72KB

            • memory/2016-989-0x000000000A320000-0x000000000A42A000-memory.dmp

              Filesize

              1.0MB

            • memory/2016-990-0x000000000A440000-0x000000000A47C000-memory.dmp

              Filesize

              240KB

            • memory/2016-991-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/2016-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

              Filesize

              408KB

            • memory/2016-993-0x000000000AE00000-0x000000000AE92000-memory.dmp

              Filesize

              584KB

            • memory/2016-994-0x000000000AEC0000-0x000000000AF10000-memory.dmp

              Filesize

              320KB

            • memory/2016-995-0x000000000AF20000-0x000000000AF96000-memory.dmp

              Filesize

              472KB

            • memory/2016-192-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/2016-996-0x000000000B000000-0x000000000B1C2000-memory.dmp

              Filesize

              1.8MB

            • memory/2016-997-0x000000000B1D0000-0x000000000B6FC000-memory.dmp

              Filesize

              5.2MB

            • memory/2016-998-0x000000000B780000-0x000000000B79E000-memory.dmp

              Filesize

              120KB