Analysis

  • max time kernel
    49s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-04-2023 08:54

General

  • Target

    c35c5568a760f4b03ad1f0316d56008bd0e42e8f9378a99af8dcddb633c34ea3.exe

  • Size

    697KB

  • MD5

    db68724b043fbb8561de194ab63b83a2

  • SHA1

    45b7d2cfc356a47b10122d1d081a2800ff4e5515

  • SHA256

    c35c5568a760f4b03ad1f0316d56008bd0e42e8f9378a99af8dcddb633c34ea3

  • SHA512

    eec2b90b041be6e18f6c49bc9e57e81618026eb46d0545a3e16b2b5974dec9a6711f72af309048213bf5e1650f440fb74554ac2f0de09a3422ce2e4ca01ca13d

  • SSDEEP

    12288:By90DtDl73tVmetssNWeC7L5ha+VdtGAcZh6SBH2Kkpdr8bgjzlbmW66q:ByUll73tVmetss/W5hRdyVBWKkp18bgO

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c35c5568a760f4b03ad1f0316d56008bd0e42e8f9378a99af8dcddb633c34ea3.exe
    "C:\Users\Admin\AppData\Local\Temp\c35c5568a760f4b03ad1f0316d56008bd0e42e8f9378a99af8dcddb633c34ea3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876387.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37909185.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37909185.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk429865.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk429865.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300723.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300723.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300723.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300723.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876387.exe

    Filesize

    543KB

    MD5

    3a69ada7caab7a53155728bbf901851b

    SHA1

    f927fafd2cacb9fc0c61d6efcca117cf023d227e

    SHA256

    838657c7736bc17ee1bf8e2ff52ee940350a1d13dbc6314ad2d981dcc29d1509

    SHA512

    9ff3277895736a7b78076bad3266a3a976f05970cbecf0af58aace2e3babbeea1abfe182a82bdf1a5ece97c6558c621511b086453f464449a55583d521c497fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876387.exe

    Filesize

    543KB

    MD5

    3a69ada7caab7a53155728bbf901851b

    SHA1

    f927fafd2cacb9fc0c61d6efcca117cf023d227e

    SHA256

    838657c7736bc17ee1bf8e2ff52ee940350a1d13dbc6314ad2d981dcc29d1509

    SHA512

    9ff3277895736a7b78076bad3266a3a976f05970cbecf0af58aace2e3babbeea1abfe182a82bdf1a5ece97c6558c621511b086453f464449a55583d521c497fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37909185.exe

    Filesize

    265KB

    MD5

    ca8c580c3ec4f36d27f2693a6dfcf9a9

    SHA1

    45e402da4e851682a72ce366f406d2d78e61a3af

    SHA256

    e88f0964d8f78472213cad421e5d87232dbbea41bb0a9c3a627e4816e51c6ece

    SHA512

    f36443cabf39ffa13fb526df63689cf3192d931c6ac65612177c32e4a57963ec636566afc8d33f9eeb2b7d73dd1f7d73a66ccf0554009e7223dba55d27e6e42f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37909185.exe

    Filesize

    265KB

    MD5

    ca8c580c3ec4f36d27f2693a6dfcf9a9

    SHA1

    45e402da4e851682a72ce366f406d2d78e61a3af

    SHA256

    e88f0964d8f78472213cad421e5d87232dbbea41bb0a9c3a627e4816e51c6ece

    SHA512

    f36443cabf39ffa13fb526df63689cf3192d931c6ac65612177c32e4a57963ec636566afc8d33f9eeb2b7d73dd1f7d73a66ccf0554009e7223dba55d27e6e42f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk429865.exe

    Filesize

    347KB

    MD5

    591d1fe3e2a52737f4ac889c82acd309

    SHA1

    570d915f262ef639ff85036db304c993ba45eaa8

    SHA256

    bce34d2674b691958c5535c7db76bc73c8635c5d85e79caad4ca050db4c58e19

    SHA512

    3b0f46412cf3892d443b2d25d6a26b58f07d81b52a818a0684144507b702c39314e19331030bf8126983a2b2345d7fe2dc013a7fe7c5443a4b074bf7fa576417

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk429865.exe

    Filesize

    347KB

    MD5

    591d1fe3e2a52737f4ac889c82acd309

    SHA1

    570d915f262ef639ff85036db304c993ba45eaa8

    SHA256

    bce34d2674b691958c5535c7db76bc73c8635c5d85e79caad4ca050db4c58e19

    SHA512

    3b0f46412cf3892d443b2d25d6a26b58f07d81b52a818a0684144507b702c39314e19331030bf8126983a2b2345d7fe2dc013a7fe7c5443a4b074bf7fa576417

  • memory/1720-997-0x0000000007C90000-0x0000000007CA0000-memory.dmp

    Filesize

    64KB

  • memory/1720-996-0x0000000007C20000-0x0000000007C6B000-memory.dmp

    Filesize

    300KB

  • memory/1720-995-0x0000000000EA0000-0x0000000000EC8000-memory.dmp

    Filesize

    160KB

  • memory/3948-227-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/3948-978-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/3948-988-0x0000000004970000-0x00000000049C0000-memory.dmp

    Filesize

    320KB

  • memory/3948-987-0x000000000B260000-0x000000000B78C000-memory.dmp

    Filesize

    5.2MB

  • memory/3948-986-0x000000000B090000-0x000000000B252000-memory.dmp

    Filesize

    1.8MB

  • memory/3948-985-0x000000000AFD0000-0x000000000AFEE000-memory.dmp

    Filesize

    120KB

  • memory/3948-984-0x000000000AF20000-0x000000000AF96000-memory.dmp

    Filesize

    472KB

  • memory/3948-983-0x000000000AD40000-0x000000000ADD2000-memory.dmp

    Filesize

    584KB

  • memory/3948-982-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/3948-981-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/3948-980-0x0000000009DC0000-0x0000000009E0B000-memory.dmp

    Filesize

    300KB

  • memory/3948-979-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/3948-977-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/3948-976-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/3948-216-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-214-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-212-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-210-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-208-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-206-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-204-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-202-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-180-0x0000000004A10000-0x0000000004A4C000-memory.dmp

    Filesize

    240KB

  • memory/3948-181-0x0000000002C50000-0x0000000002C96000-memory.dmp

    Filesize

    280KB

  • memory/3948-182-0x0000000004CC0000-0x0000000004CFA000-memory.dmp

    Filesize

    232KB

  • memory/3948-186-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-184-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-183-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-188-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-190-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-192-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-194-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-196-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-198-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/3948-200-0x0000000004CC0000-0x0000000004CF5000-memory.dmp

    Filesize

    212KB

  • memory/4128-163-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-135-0x0000000004E30000-0x0000000004E4A000-memory.dmp

    Filesize

    104KB

  • memory/4128-141-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-175-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-173-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-174-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-170-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4128-169-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-140-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-167-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-165-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-143-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-172-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4128-142-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-145-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-157-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-155-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-153-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-151-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-149-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-147-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-159-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB

  • memory/4128-139-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4128-138-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

    Filesize

    180KB

  • memory/4128-137-0x0000000007720000-0x0000000007738000-memory.dmp

    Filesize

    96KB

  • memory/4128-136-0x00000000071E0000-0x00000000076DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-161-0x0000000007720000-0x0000000007733000-memory.dmp

    Filesize

    76KB