Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 01:44

General

  • Target

    abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe

  • Size

    694KB

  • MD5

    d81473979e22d358b7a79f8bf54d91e3

  • SHA1

    3048d4d84aa7e40264e96f586e4947b3d924ea72

  • SHA256

    abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb

  • SHA512

    fe846eef96ea8e237888dbf92890bfb49f06b6685cf025548bf55e8d2ab62b64f6614c3db1053aacf00793309101c9d129e0288e02782061aa01c5d0e18319a4

  • SSDEEP

    12288:Ly90IhL9kkK/w6ehFT4j6Zob4AmWj6FR18b2KVA+YijY/:Lyj5MqF+6ZYD6FR18b2Gfc/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe
    "C:\Users\Admin\AppData\Local\Temp\abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 1076
          4⤵
          • Program crash
          PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3328
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1752
          4⤵
          • Program crash
          PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4568 -ip 4568
    1⤵
      PID:424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3328 -ip 3328
      1⤵
        PID:4596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exe

        Filesize

        540KB

        MD5

        24293cb394b9bd11958cdc51e0574621

        SHA1

        48cb4168a76d6c4b36b28f959e62f04b18a122b7

        SHA256

        893cdc84f9321ad6a5e6f1c3c7f545797bdea1cd7dc59a6c0364f35e53360d0e

        SHA512

        4a765ca440d8a7a45ecb78fa3bf41012c9a057464bf51f58d65bc7641e871378343620ca1a1869144bc807b829636b0ef195df3be421441b908e0634358fac88

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exe

        Filesize

        540KB

        MD5

        24293cb394b9bd11958cdc51e0574621

        SHA1

        48cb4168a76d6c4b36b28f959e62f04b18a122b7

        SHA256

        893cdc84f9321ad6a5e6f1c3c7f545797bdea1cd7dc59a6c0364f35e53360d0e

        SHA512

        4a765ca440d8a7a45ecb78fa3bf41012c9a057464bf51f58d65bc7641e871378343620ca1a1869144bc807b829636b0ef195df3be421441b908e0634358fac88

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exe

        Filesize

        258KB

        MD5

        d8e81a62ffa004ba7d04a2351727aca9

        SHA1

        85c6f2568b082a1a96967a69fde1b3d45426f2bc

        SHA256

        cd5629c86ae774540e9fb75dec0c4766fd9502e7d1b5e90926aff2b9f0afd6c0

        SHA512

        406b5e8f84b86342ee4a5379b916e7a8dd8da045b69782e728310c2e6bf32062a0197eca00b6b06259273448adff3cf8497c415e70f567ed09c6f86d5dd8315f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exe

        Filesize

        258KB

        MD5

        d8e81a62ffa004ba7d04a2351727aca9

        SHA1

        85c6f2568b082a1a96967a69fde1b3d45426f2bc

        SHA256

        cd5629c86ae774540e9fb75dec0c4766fd9502e7d1b5e90926aff2b9f0afd6c0

        SHA512

        406b5e8f84b86342ee4a5379b916e7a8dd8da045b69782e728310c2e6bf32062a0197eca00b6b06259273448adff3cf8497c415e70f567ed09c6f86d5dd8315f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exe

        Filesize

        340KB

        MD5

        8d889b5d14176ee1cdfb8e78ea05d99b

        SHA1

        5b26e15b1ebb6283c1021e0c47373635f70a1708

        SHA256

        7c41732fefd627fa922360bcf925ab2ff43ea549568544e39cb7595feb40bc19

        SHA512

        6c7aaa8e0046b898af0dc46b4432c65c974da76886cba7eee509810995529284d59b499963a7ccadb9ece121629f62cc0ba48ae5636fdf13e00617da81b3020e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exe

        Filesize

        340KB

        MD5

        8d889b5d14176ee1cdfb8e78ea05d99b

        SHA1

        5b26e15b1ebb6283c1021e0c47373635f70a1708

        SHA256

        7c41732fefd627fa922360bcf925ab2ff43ea549568544e39cb7595feb40bc19

        SHA512

        6c7aaa8e0046b898af0dc46b4432c65c974da76886cba7eee509810995529284d59b499963a7ccadb9ece121629f62cc0ba48ae5636fdf13e00617da81b3020e

      • memory/2116-1006-0x0000000007950000-0x0000000007960000-memory.dmp

        Filesize

        64KB

      • memory/2116-1005-0x0000000000830000-0x0000000000858000-memory.dmp

        Filesize

        160KB

      • memory/3328-224-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-987-0x0000000009C80000-0x000000000A298000-memory.dmp

        Filesize

        6.1MB

      • memory/3328-999-0x0000000004B40000-0x0000000004B90000-memory.dmp

        Filesize

        320KB

      • memory/3328-997-0x000000000B8C0000-0x000000000B8DE000-memory.dmp

        Filesize

        120KB

      • memory/3328-996-0x000000000B280000-0x000000000B7AC000-memory.dmp

        Filesize

        5.2MB

      • memory/3328-995-0x000000000B0A0000-0x000000000B262000-memory.dmp

        Filesize

        1.8MB

      • memory/3328-994-0x000000000AFD0000-0x000000000B046000-memory.dmp

        Filesize

        472KB

      • memory/3328-993-0x000000000AE00000-0x000000000AE92000-memory.dmp

        Filesize

        584KB

      • memory/3328-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/3328-991-0x0000000004C20000-0x0000000004C30000-memory.dmp

        Filesize

        64KB

      • memory/3328-990-0x000000000A440000-0x000000000A47C000-memory.dmp

        Filesize

        240KB

      • memory/3328-989-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/3328-988-0x000000000A300000-0x000000000A312000-memory.dmp

        Filesize

        72KB

      • memory/3328-228-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-226-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-222-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-220-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-218-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-216-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-214-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-212-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-191-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-192-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-195-0x0000000002CF0000-0x0000000002D36000-memory.dmp

        Filesize

        280KB

      • memory/3328-194-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-196-0x0000000004C20000-0x0000000004C30000-memory.dmp

        Filesize

        64KB

      • memory/3328-199-0x0000000004C20000-0x0000000004C30000-memory.dmp

        Filesize

        64KB

      • memory/3328-201-0x0000000004C20000-0x0000000004C30000-memory.dmp

        Filesize

        64KB

      • memory/3328-202-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-198-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-204-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-206-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-208-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/3328-210-0x0000000004C30000-0x0000000004C65000-memory.dmp

        Filesize

        212KB

      • memory/4568-177-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-151-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4568-185-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-183-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-184-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4568-153-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-180-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-159-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-179-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-178-0x0000000007100000-0x0000000007110000-memory.dmp

        Filesize

        64KB

      • memory/4568-157-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-173-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-155-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-171-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-169-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-167-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-165-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-163-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-161-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-175-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-150-0x00000000076C0000-0x00000000076D3000-memory.dmp

        Filesize

        76KB

      • memory/4568-149-0x0000000007110000-0x00000000076B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4568-148-0x0000000002CE0000-0x0000000002D0D000-memory.dmp

        Filesize

        180KB