Analysis

  • max time kernel
    73s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 17:34

General

  • Target

    cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe

  • Size

    695KB

  • MD5

    a18d285b8e1fedd91d2d85870393fe61

  • SHA1

    6b73d51c2e5c8fa7991150f90e24080c2dc90d5a

  • SHA256

    cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0

  • SHA512

    3fa2940bada3955cacb10ac3911bab3f616436fe3c2e47d1051cae7f90a769a7a49c704bfb1081191de888e4adefe8b5913c6ef4f9bd4d3f15ef98589adfda93

  • SSDEEP

    12288:Ey90SE/2Kj4N159W8i89TpYeO8gl0k118D65VNj7W/evln4b2TFL:Eydikuo1Q8gl0ZKNj7W2vB4qTFL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe
    "C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1708

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe

          Filesize

          136KB

          MD5

          73cae2858379cab7e68b9e5bf751c372

          SHA1

          38c375354bda6e5c8fb2579f1ef0416a6c65929a

          SHA256

          e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

          SHA512

          343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe

          Filesize

          541KB

          MD5

          afc4ab305bcbee75074a3f77bc488e40

          SHA1

          97a7713ae499fdcd77329b3c1a3b7ce4c96e513e

          SHA256

          059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9

          SHA512

          82c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe

          Filesize

          541KB

          MD5

          afc4ab305bcbee75074a3f77bc488e40

          SHA1

          97a7713ae499fdcd77329b3c1a3b7ce4c96e513e

          SHA256

          059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9

          SHA512

          82c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe

          Filesize

          258KB

          MD5

          b07d55e76e5c5fa5e156b9797a14ce6d

          SHA1

          dc88f3b9c1091211958a7df72539c2d26e2e41fc

          SHA256

          cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2

          SHA512

          efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe

          Filesize

          258KB

          MD5

          b07d55e76e5c5fa5e156b9797a14ce6d

          SHA1

          dc88f3b9c1091211958a7df72539c2d26e2e41fc

          SHA256

          cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2

          SHA512

          efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe

          Filesize

          341KB

          MD5

          cfb9116bd5ae93f81e4784f874b985d3

          SHA1

          3fcd4a140b3b4d3e92b94d37a4c8995796a3bafc

          SHA256

          f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640

          SHA512

          a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe

          Filesize

          341KB

          MD5

          cfb9116bd5ae93f81e4784f874b985d3

          SHA1

          3fcd4a140b3b4d3e92b94d37a4c8995796a3bafc

          SHA256

          f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640

          SHA512

          a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b

        • memory/1708-1002-0x0000000000420000-0x0000000000448000-memory.dmp

          Filesize

          160KB

        • memory/1708-1003-0x00000000071A0000-0x00000000071EB000-memory.dmp

          Filesize

          300KB

        • memory/1708-1004-0x0000000002820000-0x0000000002830000-memory.dmp

          Filesize

          64KB

        • memory/1708-1005-0x0000000002820000-0x0000000002830000-memory.dmp

          Filesize

          64KB

        • memory/3364-146-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-160-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-142-0x00000000048C0000-0x00000000048D0000-memory.dmp

          Filesize

          64KB

        • memory/3364-139-0x00000000048C0000-0x00000000048D0000-memory.dmp

          Filesize

          64KB

        • memory/3364-143-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-144-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-140-0x0000000004960000-0x0000000004978000-memory.dmp

          Filesize

          96KB

        • memory/3364-148-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-150-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-152-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-154-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-156-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-158-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-141-0x00000000048C0000-0x00000000048D0000-memory.dmp

          Filesize

          64KB

        • memory/3364-162-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-164-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-166-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-168-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-170-0x0000000004960000-0x0000000004973000-memory.dmp

          Filesize

          76KB

        • memory/3364-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/3364-172-0x00000000048C0000-0x00000000048D0000-memory.dmp

          Filesize

          64KB

        • memory/3364-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/3364-138-0x0000000007330000-0x000000000782E000-memory.dmp

          Filesize

          5.0MB

        • memory/3364-137-0x00000000048A0000-0x00000000048BA000-memory.dmp

          Filesize

          104KB

        • memory/3364-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4120-183-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-977-0x0000000009C30000-0x000000000A236000-memory.dmp

          Filesize

          6.0MB

        • memory/4120-184-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-186-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-185-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-188-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-190-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-192-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-194-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-196-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-198-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-200-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-202-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-204-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-206-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-208-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-210-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-212-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-214-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-216-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-218-0x0000000004B00000-0x0000000004B35000-memory.dmp

          Filesize

          212KB

        • memory/4120-182-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-978-0x0000000004E00000-0x0000000004E12000-memory.dmp

          Filesize

          72KB

        • memory/4120-979-0x000000000A240000-0x000000000A34A000-memory.dmp

          Filesize

          1.0MB

        • memory/4120-980-0x000000000A350000-0x000000000A38E000-memory.dmp

          Filesize

          248KB

        • memory/4120-982-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-981-0x000000000A4C0000-0x000000000A50B000-memory.dmp

          Filesize

          300KB

        • memory/4120-984-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-985-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-986-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-987-0x00000000073A0000-0x00000000073B0000-memory.dmp

          Filesize

          64KB

        • memory/4120-989-0x00000000072C0000-0x0000000007326000-memory.dmp

          Filesize

          408KB

        • memory/4120-990-0x000000000AB90000-0x000000000AC22000-memory.dmp

          Filesize

          584KB

        • memory/4120-991-0x000000000ADA0000-0x000000000AE16000-memory.dmp

          Filesize

          472KB

        • memory/4120-992-0x000000000AE40000-0x000000000AE5E000-memory.dmp

          Filesize

          120KB

        • memory/4120-181-0x0000000002C80000-0x0000000002CC6000-memory.dmp

          Filesize

          280KB

        • memory/4120-180-0x0000000004B00000-0x0000000004B3A000-memory.dmp

          Filesize

          232KB

        • memory/4120-179-0x0000000002F80000-0x0000000002FBC000-memory.dmp

          Filesize

          240KB

        • memory/4120-993-0x000000000AEE0000-0x000000000AF30000-memory.dmp

          Filesize

          320KB

        • memory/4120-995-0x000000000AF30000-0x000000000B0F2000-memory.dmp

          Filesize

          1.8MB

        • memory/4120-996-0x000000000B110000-0x000000000B63C000-memory.dmp

          Filesize

          5.2MB