Analysis

  • max time kernel
    90s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 06:26

General

  • Target

    432b6cf710d0fb7d1110a87cbd564aeacf856b0e065526df33303b2508f5f0a1.exe

  • Size

    693KB

  • MD5

    e6937c618a8178d358c6d48f67163474

  • SHA1

    babd3f1a662af138de0dde0b36910d164badf96b

  • SHA256

    432b6cf710d0fb7d1110a87cbd564aeacf856b0e065526df33303b2508f5f0a1

  • SHA512

    4541c9f1590eb9029df26f20490380e39121979434fbeedaf5686d012278d05ed4dd591603f7aa07d32433253e8e193a33e3b346c9caa13fdc0ec49a7ffb8acf

  • SSDEEP

    12288:Gy901pVU9qr9q2GeRpSjrTlzcEz7wX5OkiUmCo6:Gy5mq2Ge2Jcs7IiUmCo6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\432b6cf710d0fb7d1110a87cbd564aeacf856b0e065526df33303b2508f5f0a1.exe
    "C:\Users\Admin\AppData\Local\Temp\432b6cf710d0fb7d1110a87cbd564aeacf856b0e065526df33303b2508f5f0a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308510.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308510.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50388584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50388584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 1080
          4⤵
          • Program crash
          PID:692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk395256.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk395256.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1352
          4⤵
          • Program crash
          PID:4420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si933469.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si933469.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1636 -ip 1636
    1⤵
      PID:4748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1652 -ip 1652
      1⤵
        PID:2588

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si933469.exe

              Filesize

              136KB

              MD5

              bddaadcc91f12566dce088dfba102c2a

              SHA1

              6a141a09619ea3f5bbe2d946df9a8c427beb89f2

              SHA256

              536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

              SHA512

              f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si933469.exe

              Filesize

              136KB

              MD5

              bddaadcc91f12566dce088dfba102c2a

              SHA1

              6a141a09619ea3f5bbe2d946df9a8c427beb89f2

              SHA256

              536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

              SHA512

              f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308510.exe

              Filesize

              540KB

              MD5

              04d0e0245c9775224d7db79de9d96131

              SHA1

              00f6a2ae884f17dd199a3723534cea16da8e4073

              SHA256

              673d6974cabbb917578b5f133435ac4b86a40df81747f7d2b993fb8570c94633

              SHA512

              53bb79662ed0ae9897df0c52f3ac7f2762eeda0b46229b427f8f2d6640042d716d47042b2813c9bedc978087fa06c52cfa7769521177272c285733201cb8f230

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308510.exe

              Filesize

              540KB

              MD5

              04d0e0245c9775224d7db79de9d96131

              SHA1

              00f6a2ae884f17dd199a3723534cea16da8e4073

              SHA256

              673d6974cabbb917578b5f133435ac4b86a40df81747f7d2b993fb8570c94633

              SHA512

              53bb79662ed0ae9897df0c52f3ac7f2762eeda0b46229b427f8f2d6640042d716d47042b2813c9bedc978087fa06c52cfa7769521177272c285733201cb8f230

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50388584.exe

              Filesize

              258KB

              MD5

              fb377752413ffb41b91a5a001351d5bf

              SHA1

              53b10696d34ce9635c2b392612c06c85d0d99c6b

              SHA256

              0101f80ed8b6030bbd3221fa8c2c48313a4a146c481813b534d270abdfb9ed6b

              SHA512

              13d4ffa42ec9d457f301ec43c1822b58ddddc3d8ee866a77e0cce4c8942493ebb257a30d9ac8b3adc983d2064dd4d3c0d3fb934a4e2f4863f9ea87c43aba1fe0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50388584.exe

              Filesize

              258KB

              MD5

              fb377752413ffb41b91a5a001351d5bf

              SHA1

              53b10696d34ce9635c2b392612c06c85d0d99c6b

              SHA256

              0101f80ed8b6030bbd3221fa8c2c48313a4a146c481813b534d270abdfb9ed6b

              SHA512

              13d4ffa42ec9d457f301ec43c1822b58ddddc3d8ee866a77e0cce4c8942493ebb257a30d9ac8b3adc983d2064dd4d3c0d3fb934a4e2f4863f9ea87c43aba1fe0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk395256.exe

              Filesize

              340KB

              MD5

              4888e73f028c36d52bb0e2f5e1debaf1

              SHA1

              18d0335ab3d4d7d08ee258d1b9486fbbb6b1af38

              SHA256

              f4470a7b3181bdf6a0e291a354deabcd1db6b9e5dbb46a3090cdc71d00508322

              SHA512

              d167530814d5b37fa78c6d12cea9695f5f7521e2f733ead81f220c168527882487f5ad5fc3d2ea931440dabfecf3a3f5892c623dc16bc33e3069a041900068e8

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk395256.exe

              Filesize

              340KB

              MD5

              4888e73f028c36d52bb0e2f5e1debaf1

              SHA1

              18d0335ab3d4d7d08ee258d1b9486fbbb6b1af38

              SHA256

              f4470a7b3181bdf6a0e291a354deabcd1db6b9e5dbb46a3090cdc71d00508322

              SHA512

              d167530814d5b37fa78c6d12cea9695f5f7521e2f733ead81f220c168527882487f5ad5fc3d2ea931440dabfecf3a3f5892c623dc16bc33e3069a041900068e8

            • memory/1636-148-0x00000000072A0000-0x0000000007844000-memory.dmp

              Filesize

              5.6MB

            • memory/1636-150-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-151-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-149-0x0000000004670000-0x000000000469D000-memory.dmp

              Filesize

              180KB

            • memory/1636-154-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-153-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-152-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-156-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-160-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-158-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-162-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-164-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-166-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-168-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-170-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-172-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-174-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-176-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-178-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-180-0x0000000004F00000-0x0000000004F13000-memory.dmp

              Filesize

              76KB

            • memory/1636-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1636-182-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-183-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-184-0x0000000004EF0000-0x0000000004F00000-memory.dmp

              Filesize

              64KB

            • memory/1636-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

              Filesize

              39.6MB

            • memory/1652-191-0x00000000046A0000-0x00000000046E6000-memory.dmp

              Filesize

              280KB

            • memory/1652-192-0x0000000007170000-0x0000000007180000-memory.dmp

              Filesize

              64KB

            • memory/1652-194-0x0000000007170000-0x0000000007180000-memory.dmp

              Filesize

              64KB

            • memory/1652-195-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-193-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-196-0x0000000007170000-0x0000000007180000-memory.dmp

              Filesize

              64KB

            • memory/1652-198-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-200-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-202-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-204-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-206-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-208-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-210-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-212-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-214-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-216-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-218-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-220-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-222-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-224-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-226-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-228-0x0000000007730000-0x0000000007765000-memory.dmp

              Filesize

              212KB

            • memory/1652-987-0x0000000009C40000-0x000000000A258000-memory.dmp

              Filesize

              6.1MB

            • memory/1652-988-0x000000000A300000-0x000000000A312000-memory.dmp

              Filesize

              72KB

            • memory/1652-989-0x000000000A320000-0x000000000A42A000-memory.dmp

              Filesize

              1.0MB

            • memory/1652-990-0x0000000007170000-0x0000000007180000-memory.dmp

              Filesize

              64KB

            • memory/1652-991-0x000000000A440000-0x000000000A47C000-memory.dmp

              Filesize

              240KB

            • memory/1652-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

              Filesize

              408KB

            • memory/1652-993-0x000000000AF50000-0x000000000AFE2000-memory.dmp

              Filesize

              584KB

            • memory/1652-994-0x000000000AFF0000-0x000000000B066000-memory.dmp

              Filesize

              472KB

            • memory/1652-995-0x000000000B0B0000-0x000000000B0CE000-memory.dmp

              Filesize

              120KB

            • memory/1652-996-0x000000000B140000-0x000000000B190000-memory.dmp

              Filesize

              320KB

            • memory/1652-997-0x000000000B2D0000-0x000000000B492000-memory.dmp

              Filesize

              1.8MB

            • memory/1652-998-0x000000000B4B0000-0x000000000B9DC000-memory.dmp

              Filesize

              5.2MB

            • memory/3384-1004-0x0000000000510000-0x0000000000538000-memory.dmp

              Filesize

              160KB

            • memory/3384-1005-0x00000000073E0000-0x00000000073F0000-memory.dmp

              Filesize

              64KB