Analysis

  • max time kernel
    112s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 15:51

General

  • Target

    6566b87bd40c4620f893007c7090395b47e948b1ff18eb0b2dea79364356edf3.exe

  • Size

    694KB

  • MD5

    aad5a359179def128210f0d13a3b0960

  • SHA1

    41a90adec66e34f21ce1af075d320978d62fadd4

  • SHA256

    6566b87bd40c4620f893007c7090395b47e948b1ff18eb0b2dea79364356edf3

  • SHA512

    e4d1d4c0385e95ea4320b2f075393020a3d45dbe6ab28f07c6dc959ff98a2f5ead0a7372967901010d124550eb2c8b74765b5466e0e341e68261d30e22d2b467

  • SSDEEP

    12288:ry90VOfQsmIhrwu3wvvNr8GNMiavRVGdMeNzJMNY0tthHuYERIW8ZYKA3glQrrUM:ryZmIh3wvvZ8GJ+RuZzu1A3gjE3

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6566b87bd40c4620f893007c7090395b47e948b1ff18eb0b2dea79364356edf3.exe
    "C:\Users\Admin\AppData\Local\Temp\6566b87bd40c4620f893007c7090395b47e948b1ff18eb0b2dea79364356edf3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un109773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un109773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71064279.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71064279.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1088
          4⤵
          • Program crash
          PID:4996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482416.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1776
          4⤵
          • Program crash
          PID:2496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859928.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859928.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1656
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1736 -ip 1736
    1⤵
      PID:4324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2920 -ip 2920
      1⤵
        PID:4384

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859928.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859928.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un109773.exe

              Filesize

              540KB

              MD5

              96a6d968a28eb86ea46324c90bbe434e

              SHA1

              f7429b62b862214e40e80a38bce5c6344b1df26d

              SHA256

              a9b7540c00179bb6246a7d9ebf108606b2e05a19b49812da3461e51f754a3b54

              SHA512

              97d108276b1d72061c14ee4fa5480f4b60c91b0888849bc4f76f12a1fd9c9d32e0fc897475814b3cafa20940e47bb91ed8142629167d7de900ce5e4c71283859

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un109773.exe

              Filesize

              540KB

              MD5

              96a6d968a28eb86ea46324c90bbe434e

              SHA1

              f7429b62b862214e40e80a38bce5c6344b1df26d

              SHA256

              a9b7540c00179bb6246a7d9ebf108606b2e05a19b49812da3461e51f754a3b54

              SHA512

              97d108276b1d72061c14ee4fa5480f4b60c91b0888849bc4f76f12a1fd9c9d32e0fc897475814b3cafa20940e47bb91ed8142629167d7de900ce5e4c71283859

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71064279.exe

              Filesize

              258KB

              MD5

              05c1f1db110fbe128b0350679740e486

              SHA1

              22882cbecf661c57ded607e205f3f88761c4097f

              SHA256

              2fae77450d746a7bd095f6673a544ca8e0e051476ebd88174c7e60c36eb68374

              SHA512

              789333e9a2c357eaf0ce58567b25919faf8ac6dd2f16fba2a281f14d76e797140e23e316bb8b05f2f46b4c5cc33e234b1a3d3bea0812c54317ddfc5efa0bd208

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71064279.exe

              Filesize

              258KB

              MD5

              05c1f1db110fbe128b0350679740e486

              SHA1

              22882cbecf661c57ded607e205f3f88761c4097f

              SHA256

              2fae77450d746a7bd095f6673a544ca8e0e051476ebd88174c7e60c36eb68374

              SHA512

              789333e9a2c357eaf0ce58567b25919faf8ac6dd2f16fba2a281f14d76e797140e23e316bb8b05f2f46b4c5cc33e234b1a3d3bea0812c54317ddfc5efa0bd208

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482416.exe

              Filesize

              340KB

              MD5

              89b690e3586ba9951548163311521f71

              SHA1

              c85c35ce44dbc7bd39f3fca2d4cf250e642e2f56

              SHA256

              52c30e83af1abbcf1168e30ac7879387f55adbc05260159db7f035380afbfe16

              SHA512

              2dd50837169e850974cc1029b5f20364c937ff5d533601bcde96a7ca3c246ec71ae24762d37c8d1d49c1a2651b13a0a8f06ef62552d9bf4899250f5f7d33a762

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482416.exe

              Filesize

              340KB

              MD5

              89b690e3586ba9951548163311521f71

              SHA1

              c85c35ce44dbc7bd39f3fca2d4cf250e642e2f56

              SHA256

              52c30e83af1abbcf1168e30ac7879387f55adbc05260159db7f035380afbfe16

              SHA512

              2dd50837169e850974cc1029b5f20364c937ff5d533601bcde96a7ca3c246ec71ae24762d37c8d1d49c1a2651b13a0a8f06ef62552d9bf4899250f5f7d33a762

            • memory/1656-1008-0x0000000000760000-0x0000000000788000-memory.dmp

              Filesize

              160KB

            • memory/1656-1009-0x0000000007810000-0x0000000007820000-memory.dmp

              Filesize

              64KB

            • memory/1736-156-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-170-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-151-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-152-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-153-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-158-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-149-0x00000000072E0000-0x0000000007884000-memory.dmp

              Filesize

              5.6MB

            • memory/1736-154-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-160-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-162-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-164-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-166-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-168-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-150-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-172-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-174-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-176-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-178-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-180-0x0000000007250000-0x0000000007263000-memory.dmp

              Filesize

              76KB

            • memory/1736-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1736-182-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-183-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-185-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/1736-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1736-148-0x0000000002C70000-0x0000000002C9D000-memory.dmp

              Filesize

              180KB

            • memory/2920-193-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-229-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-195-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-197-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-199-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-201-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-203-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-205-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-207-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-209-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-211-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-213-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-215-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-217-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-219-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-221-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-223-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-225-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-227-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-192-0x0000000004D30000-0x0000000004D65000-memory.dmp

              Filesize

              212KB

            • memory/2920-232-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-987-0x0000000009C40000-0x000000000A258000-memory.dmp

              Filesize

              6.1MB

            • memory/2920-988-0x000000000A300000-0x000000000A312000-memory.dmp

              Filesize

              72KB

            • memory/2920-989-0x000000000A320000-0x000000000A42A000-memory.dmp

              Filesize

              1.0MB

            • memory/2920-990-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-991-0x000000000A440000-0x000000000A47C000-memory.dmp

              Filesize

              240KB

            • memory/2920-993-0x000000000A740000-0x000000000A7A6000-memory.dmp

              Filesize

              408KB

            • memory/2920-994-0x000000000AE10000-0x000000000AEA2000-memory.dmp

              Filesize

              584KB

            • memory/2920-995-0x000000000AEB0000-0x000000000AF26000-memory.dmp

              Filesize

              472KB

            • memory/2920-996-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-997-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-998-0x000000000AF70000-0x000000000AF8E000-memory.dmp

              Filesize

              120KB

            • memory/2920-999-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/2920-191-0x0000000004560000-0x00000000045A6000-memory.dmp

              Filesize

              280KB

            • memory/2920-1000-0x000000000B000000-0x000000000B050000-memory.dmp

              Filesize

              320KB

            • memory/2920-1001-0x000000000B090000-0x000000000B252000-memory.dmp

              Filesize

              1.8MB

            • memory/2920-1002-0x000000000B270000-0x000000000B79C000-memory.dmp

              Filesize

              5.2MB