Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 19:59

General

  • Target

    a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe

  • Size

    695KB

  • MD5

    a25f21b400b2c63dac88c739b609429a

  • SHA1

    762d7636a1921eba03bc88f26262531a69c420e6

  • SHA256

    a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698

  • SHA512

    cff0bd20ceda965664dc951904d05b6047b1cc31cea31ec799c490e0a171e5f5bacc07ee506878e4fd6df5727c6ade57e0710c95501913dcb2e1d041358b977f

  • SSDEEP

    12288:ly90WwSd+CyPYo9JSG42gQq/V22bpX9wQzy6LUimIB1gJs:lyqq+CDkAGzqdXptwQrDT

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe
    "C:\Users\Admin\AppData\Local\Temp\a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1080
          4⤵
          • Program crash
          PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 2044
          4⤵
          • Program crash
          PID:1652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2404
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4792 -ip 4792
    1⤵
      PID:5080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 1072
      1⤵
        PID:3936

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exe

              Filesize

              136KB

              MD5

              73cae2858379cab7e68b9e5bf751c372

              SHA1

              38c375354bda6e5c8fb2579f1ef0416a6c65929a

              SHA256

              e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

              SHA512

              343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exe

              Filesize

              541KB

              MD5

              a72f34246a272a82e15237dffd5bbbfb

              SHA1

              dd63b9775e6694f1221c7dfc1d4a17d9ef639fde

              SHA256

              9a580a7fb1527b14819a397adbee33be68b208e0e710466979a18a3208d79ee4

              SHA512

              d92469dd4354be32e00904db8419904264f8b388534a455f8f7675302d750dd795f6b34f6aaba91530ed5af16a9676d6cb69efe485eb1c5524805541f13475b2

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exe

              Filesize

              541KB

              MD5

              a72f34246a272a82e15237dffd5bbbfb

              SHA1

              dd63b9775e6694f1221c7dfc1d4a17d9ef639fde

              SHA256

              9a580a7fb1527b14819a397adbee33be68b208e0e710466979a18a3208d79ee4

              SHA512

              d92469dd4354be32e00904db8419904264f8b388534a455f8f7675302d750dd795f6b34f6aaba91530ed5af16a9676d6cb69efe485eb1c5524805541f13475b2

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exe

              Filesize

              258KB

              MD5

              d1486d6edfcf705b3ee198a580f575e6

              SHA1

              8b779a76ce9ce7a3ce8e9b371ea06ae93dc78bcf

              SHA256

              89bb127bae4c0ea466d938cdc8ba21765912cf36f194b4b55bee6a9dad8db3c7

              SHA512

              1c5c3bc1eaf12e8134e7224c05669d6bd012e0b3e3544991c23769c455482730b36e33f0986c8a55599674f6245fe6a536c13e5392b1f8339e84926fbf937a61

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exe

              Filesize

              258KB

              MD5

              d1486d6edfcf705b3ee198a580f575e6

              SHA1

              8b779a76ce9ce7a3ce8e9b371ea06ae93dc78bcf

              SHA256

              89bb127bae4c0ea466d938cdc8ba21765912cf36f194b4b55bee6a9dad8db3c7

              SHA512

              1c5c3bc1eaf12e8134e7224c05669d6bd012e0b3e3544991c23769c455482730b36e33f0986c8a55599674f6245fe6a536c13e5392b1f8339e84926fbf937a61

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exe

              Filesize

              340KB

              MD5

              d0fc95e8f372bb49719b78b4b184e58c

              SHA1

              ce2b859d13e7dabf0b24de48648eb9400396c743

              SHA256

              354a47f16ec0cfa85dbc5ce751b61a1cc80e0e096e6ef34c0ae4d38e9b811657

              SHA512

              402e5cc2ae19c52425b9f6ee10914e0c60b19c8cdde41b33d5822bcbd2fde8b66ac6b6d43db67dedaadebb75237ffc35db93072a6a4b38aceb7ec5d4804a633b

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exe

              Filesize

              340KB

              MD5

              d0fc95e8f372bb49719b78b4b184e58c

              SHA1

              ce2b859d13e7dabf0b24de48648eb9400396c743

              SHA256

              354a47f16ec0cfa85dbc5ce751b61a1cc80e0e096e6ef34c0ae4d38e9b811657

              SHA512

              402e5cc2ae19c52425b9f6ee10914e0c60b19c8cdde41b33d5822bcbd2fde8b66ac6b6d43db67dedaadebb75237ffc35db93072a6a4b38aceb7ec5d4804a633b

            • memory/1072-226-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-988-0x000000000A300000-0x000000000A312000-memory.dmp

              Filesize

              72KB

            • memory/1072-998-0x000000000B700000-0x000000000BC2C000-memory.dmp

              Filesize

              5.2MB

            • memory/1072-997-0x000000000B330000-0x000000000B4F2000-memory.dmp

              Filesize

              1.8MB

            • memory/1072-996-0x000000000B110000-0x000000000B12E000-memory.dmp

              Filesize

              120KB

            • memory/1072-995-0x000000000B060000-0x000000000B0D6000-memory.dmp

              Filesize

              472KB

            • memory/1072-994-0x000000000B000000-0x000000000B050000-memory.dmp

              Filesize

              320KB

            • memory/1072-993-0x000000000AF50000-0x000000000AFE2000-memory.dmp

              Filesize

              584KB

            • memory/1072-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

              Filesize

              408KB

            • memory/1072-991-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

              Filesize

              64KB

            • memory/1072-990-0x000000000A440000-0x000000000A47C000-memory.dmp

              Filesize

              240KB

            • memory/1072-989-0x000000000A320000-0x000000000A42A000-memory.dmp

              Filesize

              1.0MB

            • memory/1072-987-0x0000000009C70000-0x000000000A288000-memory.dmp

              Filesize

              6.1MB

            • memory/1072-228-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-224-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-222-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-220-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-218-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-216-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-214-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-212-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-210-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-208-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-192-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-194-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

              Filesize

              64KB

            • memory/1072-197-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

              Filesize

              64KB

            • memory/1072-198-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-196-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

              Filesize

              64KB

            • memory/1072-193-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-191-0x0000000002DF0000-0x0000000002E36000-memory.dmp

              Filesize

              280KB

            • memory/1072-200-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-202-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-204-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/1072-206-0x0000000004D50000-0x0000000004D85000-memory.dmp

              Filesize

              212KB

            • memory/2404-1004-0x00000000005E0000-0x0000000000608000-memory.dmp

              Filesize

              160KB

            • memory/2404-1005-0x00000000076E0000-0x00000000076F0000-memory.dmp

              Filesize

              64KB

            • memory/4792-153-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-149-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

              Filesize

              180KB

            • memory/4792-183-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/4792-182-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/4792-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/4792-180-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-178-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-150-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/4792-176-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-174-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-151-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/4792-172-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-184-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB

            • memory/4792-166-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-170-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-164-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-162-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-160-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-158-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-156-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-154-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-168-0x00000000049F0000-0x0000000004A03000-memory.dmp

              Filesize

              76KB

            • memory/4792-148-0x00000000072E0000-0x0000000007884000-memory.dmp

              Filesize

              5.6MB

            • memory/4792-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/4792-152-0x00000000072D0000-0x00000000072E0000-memory.dmp

              Filesize

              64KB