Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 01:15

General

  • Target

    03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe

  • Size

    695KB

  • MD5

    a0db386e39a52ca79e56fcbfa097ed67

  • SHA1

    292473d5f2dba90fb1d2f1ffab1bacc45464a327

  • SHA256

    03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c

  • SHA512

    9cea08d0faf9662e48b52b2fab5fe1765936f5fe3e56f68cc3416950b38ff2f3b2123105e5576b22dd9ea4239e58754dc79fca20be1b558777ebf8595bb5001f

  • SSDEEP

    12288:yy90zdBJehjw/ZC/+tZ9COsJdUIx6bseYOJWw6aL18bpKJA+0O2jRbkzkBN:yyEdBJeN0C/+tXCBqm1UN6aL18bpyWV1

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe
    "C:\Users\Admin\AppData\Local\Temp\03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exe

    Filesize

    541KB

    MD5

    d19151933ab1a64a37084f997f99c14c

    SHA1

    601995d72ef56cffdd1709a573c8495c3849f477

    SHA256

    80ad7705b9c156055494e6b7934e3f6d5c5e6a97ad68d5247cc7ac433f07d554

    SHA512

    2e7a4aa63f3a4fad1ad41bc7c4e179062d0f1609047a06e359e45b8d12701a310d29a509e5dd392fee116d784d56f72c73a266ea3b244a8ffe6be44a8d972a0e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exe

    Filesize

    541KB

    MD5

    d19151933ab1a64a37084f997f99c14c

    SHA1

    601995d72ef56cffdd1709a573c8495c3849f477

    SHA256

    80ad7705b9c156055494e6b7934e3f6d5c5e6a97ad68d5247cc7ac433f07d554

    SHA512

    2e7a4aa63f3a4fad1ad41bc7c4e179062d0f1609047a06e359e45b8d12701a310d29a509e5dd392fee116d784d56f72c73a266ea3b244a8ffe6be44a8d972a0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exe

    Filesize

    258KB

    MD5

    82ecc2b466cbc76241cead0b6d18f2f8

    SHA1

    5c989c3d660f0257edd339468ea51f0fbac83ac5

    SHA256

    9b83050102a07d08f6e6adf411f34577aa17673d7df4071e753d5513c755f496

    SHA512

    0468973798814f4f0d4a4965b26c1515aa508b02a7221b60816c71d451ae76eebac256aaf40efbb7908ad5ec99be90aef5532487af98c2a0e0b1f65729c9a7ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exe

    Filesize

    258KB

    MD5

    82ecc2b466cbc76241cead0b6d18f2f8

    SHA1

    5c989c3d660f0257edd339468ea51f0fbac83ac5

    SHA256

    9b83050102a07d08f6e6adf411f34577aa17673d7df4071e753d5513c755f496

    SHA512

    0468973798814f4f0d4a4965b26c1515aa508b02a7221b60816c71d451ae76eebac256aaf40efbb7908ad5ec99be90aef5532487af98c2a0e0b1f65729c9a7ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exe

    Filesize

    340KB

    MD5

    fac1cf339b363d14b0d5fe7a97cb15b6

    SHA1

    d9b47af82ec69ce7d31c883334ebb7f9c1713a19

    SHA256

    50bf6b3b9fc34e3aec57df1c32fec26b80747eb71fa88ced9367fb242f3e134c

    SHA512

    b79b8a4b4109e221abd744ed5f4d5928dff32b8030267b04aaaffc28a595a3548f6ec08a38b21e2702a56523e74d17841d51adf48b16aa664266315b295e544b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exe

    Filesize

    340KB

    MD5

    fac1cf339b363d14b0d5fe7a97cb15b6

    SHA1

    d9b47af82ec69ce7d31c883334ebb7f9c1713a19

    SHA256

    50bf6b3b9fc34e3aec57df1c32fec26b80747eb71fa88ced9367fb242f3e134c

    SHA512

    b79b8a4b4109e221abd744ed5f4d5928dff32b8030267b04aaaffc28a595a3548f6ec08a38b21e2702a56523e74d17841d51adf48b16aa664266315b295e544b

  • memory/2168-471-0x0000000007350000-0x0000000007360000-memory.dmp

    Filesize

    64KB

  • memory/2168-978-0x000000000A1F0000-0x000000000A202000-memory.dmp

    Filesize

    72KB

  • memory/2168-191-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-989-0x0000000004A30000-0x0000000004A80000-memory.dmp

    Filesize

    320KB

  • memory/2168-988-0x000000000B110000-0x000000000B63C000-memory.dmp

    Filesize

    5.2MB

  • memory/2168-987-0x000000000AF40000-0x000000000B102000-memory.dmp

    Filesize

    1.8MB

  • memory/2168-986-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/2168-985-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/2168-984-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/2168-983-0x000000000A650000-0x000000000A6B6000-memory.dmp

    Filesize

    408KB

  • memory/2168-982-0x0000000007350000-0x0000000007360000-memory.dmp

    Filesize

    64KB

  • memory/2168-981-0x000000000A3C0000-0x000000000A40B000-memory.dmp

    Filesize

    300KB

  • memory/2168-980-0x000000000A340000-0x000000000A37E000-memory.dmp

    Filesize

    248KB

  • memory/2168-979-0x000000000A220000-0x000000000A32A000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-977-0x0000000009BE0000-0x000000000A1E6000-memory.dmp

    Filesize

    6.0MB

  • memory/2168-468-0x0000000007350000-0x0000000007360000-memory.dmp

    Filesize

    64KB

  • memory/2168-467-0x0000000007350000-0x0000000007360000-memory.dmp

    Filesize

    64KB

  • memory/2168-215-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-213-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-211-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-193-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-205-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-207-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-203-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-179-0x0000000002BF0000-0x0000000002C36000-memory.dmp

    Filesize

    280KB

  • memory/2168-180-0x0000000004B40000-0x0000000004B7C000-memory.dmp

    Filesize

    240KB

  • memory/2168-181-0x0000000004BC0000-0x0000000004BFA000-memory.dmp

    Filesize

    232KB

  • memory/2168-182-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-183-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-185-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-187-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-189-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-201-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-195-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-209-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-197-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/2168-199-0x0000000004BC0000-0x0000000004BF5000-memory.dmp

    Filesize

    212KB

  • memory/3860-153-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-163-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-139-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3860-173-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3860-172-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3860-170-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3860-169-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3860-168-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3860-137-0x00000000049F0000-0x0000000004A08000-memory.dmp

    Filesize

    96KB

  • memory/3860-167-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3860-166-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3860-141-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-143-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-138-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-159-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-165-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-157-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-155-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-149-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-151-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-161-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-147-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-145-0x00000000049F0000-0x0000000004A03000-memory.dmp

    Filesize

    76KB

  • memory/3860-136-0x0000000007460000-0x000000000795E000-memory.dmp

    Filesize

    5.0MB

  • memory/3860-135-0x0000000003090000-0x00000000030AA000-memory.dmp

    Filesize

    104KB

  • memory/4980-995-0x00000000005C0000-0x00000000005E8000-memory.dmp

    Filesize

    160KB

  • memory/4980-996-0x0000000007340000-0x000000000738B000-memory.dmp

    Filesize

    300KB

  • memory/4980-997-0x0000000007650000-0x0000000007660000-memory.dmp

    Filesize

    64KB