Analysis

  • max time kernel
    109s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 15:13

General

  • Target

    b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9.exe

  • Size

    694KB

  • MD5

    18f6b14e6924c4d658b6b7c7c915309d

  • SHA1

    dd4cdb247a94bb462adb7a92303be2b82ee564ab

  • SHA256

    b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9

  • SHA512

    f261caf269ba568e9043d5a00146169e8a923b140e2713339ad3afcd942c801a94d59445787cf4485b57e197eca8a5aad693e60a818167205076baea240e932f

  • SSDEEP

    12288:0y90SphN71O1DvpNr8r1MoZRsFADeP/oJcNU0ttHHVYEeZWtfd6/:0yDpn71OZvpZ8rlujPRbVGAlY

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730909.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730909.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67477644.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67477644.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1084
          4⤵
          • Program crash
          PID:2876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk705983.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk705983.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1672
          4⤵
          • Program crash
          PID:3004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si519957.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si519957.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3340
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1736 -ip 1736
    1⤵
      PID:4280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2504 -ip 2504
      1⤵
        PID:3936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si519957.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si519957.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730909.exe

        Filesize

        540KB

        MD5

        d841bdb10fdd39c54d5da023f5e1b3bd

        SHA1

        07e91e33f867d290b01f5405aea4c2af1486adf2

        SHA256

        81a9b11529800c31410bdc9f4963608da5aa204f65de03e52fb4bbba27812aa9

        SHA512

        abe5f7e5605a8d8731f7ca472dbf883a86b9d8fb81b5bddeb7b835bef29d6f52a3e373c17346ccc4068cc8143dea1d4a2cfa0559692c9e0744c1e7540e3f87f8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730909.exe

        Filesize

        540KB

        MD5

        d841bdb10fdd39c54d5da023f5e1b3bd

        SHA1

        07e91e33f867d290b01f5405aea4c2af1486adf2

        SHA256

        81a9b11529800c31410bdc9f4963608da5aa204f65de03e52fb4bbba27812aa9

        SHA512

        abe5f7e5605a8d8731f7ca472dbf883a86b9d8fb81b5bddeb7b835bef29d6f52a3e373c17346ccc4068cc8143dea1d4a2cfa0559692c9e0744c1e7540e3f87f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67477644.exe

        Filesize

        258KB

        MD5

        c91285b4611eeeb92274c43c323d1ad7

        SHA1

        baf0e0a55142ba34b3eec01703e4dfa682e6688b

        SHA256

        f3b2cbfd7e1e6adef58aa7d2227b1e899c060b45262f25410ffb9e88a2728b7c

        SHA512

        26e90cabecec4df51ee4fdbbccf54de6d1b7da6e988532ec4b5677ed12989166edd4fab9736a4aff64bb42de26fef1a1dbd3d53d5fde98391368767750d691fc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67477644.exe

        Filesize

        258KB

        MD5

        c91285b4611eeeb92274c43c323d1ad7

        SHA1

        baf0e0a55142ba34b3eec01703e4dfa682e6688b

        SHA256

        f3b2cbfd7e1e6adef58aa7d2227b1e899c060b45262f25410ffb9e88a2728b7c

        SHA512

        26e90cabecec4df51ee4fdbbccf54de6d1b7da6e988532ec4b5677ed12989166edd4fab9736a4aff64bb42de26fef1a1dbd3d53d5fde98391368767750d691fc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk705983.exe

        Filesize

        340KB

        MD5

        daa3eaea56d5ec05bab606a51d81c982

        SHA1

        a9884bad44d85fc7c98e3e815d947f6909e427c4

        SHA256

        0772838bc27fc01098d380ff478a03ab83e18a99fd9afec8f7acbd634d276e60

        SHA512

        06d398c8d0936d0e819b4aafeb1cc609633dc5dede34c5a4ffb3c2486b92833e5f60b4faaae283d86b5a393854ae54c4253d6bcff59d085f66a719ae374b88ee

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk705983.exe

        Filesize

        340KB

        MD5

        daa3eaea56d5ec05bab606a51d81c982

        SHA1

        a9884bad44d85fc7c98e3e815d947f6909e427c4

        SHA256

        0772838bc27fc01098d380ff478a03ab83e18a99fd9afec8f7acbd634d276e60

        SHA512

        06d398c8d0936d0e819b4aafeb1cc609633dc5dede34c5a4ffb3c2486b92833e5f60b4faaae283d86b5a393854ae54c4253d6bcff59d085f66a719ae374b88ee

      • memory/1736-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

        Filesize

        180KB

      • memory/1736-149-0x00000000072B0000-0x0000000007854000-memory.dmp

        Filesize

        5.6MB

      • memory/1736-150-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-151-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-152-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-153-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-154-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-156-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-158-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-160-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-162-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-164-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-166-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-168-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-170-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-172-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-174-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-176-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-178-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-180-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

        Filesize

        76KB

      • memory/1736-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1736-182-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-183-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-184-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/1736-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/2504-191-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-192-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-194-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-196-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-198-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-200-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-202-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-204-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-206-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-208-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-210-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-212-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-214-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-216-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-218-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-220-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-222-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-224-0x0000000004D30000-0x0000000004D65000-memory.dmp

        Filesize

        212KB

      • memory/2504-346-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

        Filesize

        280KB

      • memory/2504-349-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/2504-347-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/2504-352-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/2504-987-0x0000000009D80000-0x000000000A398000-memory.dmp

        Filesize

        6.1MB

      • memory/2504-988-0x000000000A400000-0x000000000A412000-memory.dmp

        Filesize

        72KB

      • memory/2504-989-0x000000000A420000-0x000000000A52A000-memory.dmp

        Filesize

        1.0MB

      • memory/2504-990-0x000000000A540000-0x000000000A57C000-memory.dmp

        Filesize

        240KB

      • memory/2504-991-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/2504-992-0x000000000A840000-0x000000000A8A6000-memory.dmp

        Filesize

        408KB

      • memory/2504-993-0x000000000AF00000-0x000000000AF92000-memory.dmp

        Filesize

        584KB

      • memory/2504-995-0x000000000AFD0000-0x000000000B046000-memory.dmp

        Filesize

        472KB

      • memory/2504-996-0x000000000B0A0000-0x000000000B262000-memory.dmp

        Filesize

        1.8MB

      • memory/2504-997-0x000000000B280000-0x000000000B7AC000-memory.dmp

        Filesize

        5.2MB

      • memory/2504-998-0x000000000B830000-0x000000000B84E000-memory.dmp

        Filesize

        120KB

      • memory/2504-999-0x0000000004800000-0x0000000004850000-memory.dmp

        Filesize

        320KB

      • memory/3340-1005-0x0000000000820000-0x0000000000848000-memory.dmp

        Filesize

        160KB

      • memory/3340-1006-0x0000000007930000-0x0000000007940000-memory.dmp

        Filesize

        64KB