Analysis

  • max time kernel
    90s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-04-2023 10:10

General

  • Target

    8afbb85ddeb25335b82292457932e1368527255c4e2bfef32ec55f25eff7d586.exe

  • Size

    694KB

  • MD5

    99ab601ca051f854ef8e1181c93ecddd

  • SHA1

    19c8050ee3d483931a3a38e8a6f2bf771689f683

  • SHA256

    8afbb85ddeb25335b82292457932e1368527255c4e2bfef32ec55f25eff7d586

  • SHA512

    ca26b98ea0f9766216e94a4558d0b6025d8fd14a49443e76833f95e738501da14425b71f62fd36bff379134680326624a6b2b59b5c8189db991736c40fc4519a

  • SSDEEP

    12288:wy90Ho33h2Zv0L7ReGc63mbd1sU/fqiK1gmAQ4ZRhuxHv0iD/e7Zk9g9Fd+:wyv33wZc7RT3mZ1sV+mATjec8e7Zka7U

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8afbb85ddeb25335b82292457932e1368527255c4e2bfef32ec55f25eff7d586.exe
    "C:\Users\Admin\AppData\Local\Temp\8afbb85ddeb25335b82292457932e1368527255c4e2bfef32ec55f25eff7d586.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un575681.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un575681.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74521570.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74521570.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk854044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk854044.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073860.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073860.exe

    Filesize

    136KB

    MD5

    e1c805d3cefe221689da30b8a2d944f2

    SHA1

    a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

    SHA256

    32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

    SHA512

    7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si073860.exe

    Filesize

    136KB

    MD5

    e1c805d3cefe221689da30b8a2d944f2

    SHA1

    a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

    SHA256

    32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

    SHA512

    7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un575681.exe

    Filesize

    540KB

    MD5

    828778e2ebef2df890d7bd38f286ed11

    SHA1

    96e0a0a42ee6320287898397d623b9e1d9ab1d7c

    SHA256

    80b6a02506ed6f5d089a0cd18dd642664900f01849e0a301ef6cd355c07f6743

    SHA512

    1d928cb54f0b3ff29f100da6b0514b21a4ec181286a4107d6026a0cd683af7cfe05a2392edb6d52a82d0290968e238a49c2f084fb8c6fd3b12e34b1cd95b824c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un575681.exe

    Filesize

    540KB

    MD5

    828778e2ebef2df890d7bd38f286ed11

    SHA1

    96e0a0a42ee6320287898397d623b9e1d9ab1d7c

    SHA256

    80b6a02506ed6f5d089a0cd18dd642664900f01849e0a301ef6cd355c07f6743

    SHA512

    1d928cb54f0b3ff29f100da6b0514b21a4ec181286a4107d6026a0cd683af7cfe05a2392edb6d52a82d0290968e238a49c2f084fb8c6fd3b12e34b1cd95b824c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74521570.exe

    Filesize

    264KB

    MD5

    05315aca7e8db3fc62b8d8c40ff2f860

    SHA1

    0e2fd6e4b02674c4672f86fd42d5868d02f79c8f

    SHA256

    3f0a33d847a9a423f089eb707ae0b093681e2d31f7e3170407fdde73111e9ab9

    SHA512

    53fc3eb8c2d2786cfecba07421c96479bcf00001f7b6ee665d78f9cc16bc77a3b837393e3e831bcc958aff4da6a91047361e1a516c65951a40db5efe4a5dcb6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74521570.exe

    Filesize

    264KB

    MD5

    05315aca7e8db3fc62b8d8c40ff2f860

    SHA1

    0e2fd6e4b02674c4672f86fd42d5868d02f79c8f

    SHA256

    3f0a33d847a9a423f089eb707ae0b093681e2d31f7e3170407fdde73111e9ab9

    SHA512

    53fc3eb8c2d2786cfecba07421c96479bcf00001f7b6ee665d78f9cc16bc77a3b837393e3e831bcc958aff4da6a91047361e1a516c65951a40db5efe4a5dcb6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk854044.exe

    Filesize

    348KB

    MD5

    138fbd97903dd8cf28fe5f8ed13ce2f3

    SHA1

    56806dfd2f5f0fed5c3ac3fe2f09d8532b4a3d0e

    SHA256

    faed99e5ca7e618171f14459d8892f3aac172a220fc47ada52771fd60552e271

    SHA512

    d479bdc8acb46179d1ff26d5ecf2124a2daabeb058c36a54cd2a0c8ec33267a61f6568e5fb73de9066d5d7ef150edcd61b7d10850a80fa2de0d2ae2900604ba4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk854044.exe

    Filesize

    348KB

    MD5

    138fbd97903dd8cf28fe5f8ed13ce2f3

    SHA1

    56806dfd2f5f0fed5c3ac3fe2f09d8532b4a3d0e

    SHA256

    faed99e5ca7e618171f14459d8892f3aac172a220fc47ada52771fd60552e271

    SHA512

    d479bdc8acb46179d1ff26d5ecf2124a2daabeb058c36a54cd2a0c8ec33267a61f6568e5fb73de9066d5d7ef150edcd61b7d10850a80fa2de0d2ae2900604ba4

  • memory/968-216-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-979-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/968-202-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-200-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-198-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-990-0x000000000B270000-0x000000000B79C000-memory.dmp

    Filesize

    5.2MB

  • memory/968-989-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/968-188-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-988-0x000000000AF50000-0x000000000AFA0000-memory.dmp

    Filesize

    320KB

  • memory/968-987-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/968-986-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/968-985-0x000000000AD40000-0x000000000ADD2000-memory.dmp

    Filesize

    584KB

  • memory/968-984-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/968-190-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-983-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/968-982-0x000000000A4D0000-0x000000000A51B000-memory.dmp

    Filesize

    300KB

  • memory/968-981-0x00000000072A0000-0x00000000072DE000-memory.dmp

    Filesize

    248KB

  • memory/968-192-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-980-0x000000000A280000-0x000000000A38A000-memory.dmp

    Filesize

    1.0MB

  • memory/968-204-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-978-0x0000000009C70000-0x000000000A276000-memory.dmp

    Filesize

    6.0MB

  • memory/968-604-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/968-218-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-214-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-212-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-180-0x0000000004A20000-0x0000000004A5C000-memory.dmp

    Filesize

    240KB

  • memory/968-181-0x0000000002D10000-0x0000000002D56000-memory.dmp

    Filesize

    280KB

  • memory/968-182-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/968-184-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/968-183-0x0000000004BE0000-0x0000000004C1A000-memory.dmp

    Filesize

    232KB

  • memory/968-185-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-186-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-210-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-208-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-206-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-194-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/968-196-0x0000000004BE0000-0x0000000004C15000-memory.dmp

    Filesize

    212KB

  • memory/3980-997-0x0000000000F60000-0x0000000000F88000-memory.dmp

    Filesize

    160KB

  • memory/3980-998-0x0000000007D20000-0x0000000007D6B000-memory.dmp

    Filesize

    300KB

  • memory/3980-999-0x0000000007C90000-0x0000000007CA0000-memory.dmp

    Filesize

    64KB

  • memory/4752-168-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-169-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-165-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-153-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-138-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-139-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-137-0x0000000004D00000-0x0000000004D18000-memory.dmp

    Filesize

    96KB

  • memory/4752-174-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4752-175-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-173-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-172-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-170-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4752-141-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-167-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4752-166-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4752-163-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-161-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-159-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-157-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-155-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-151-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-149-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-136-0x0000000007410000-0x000000000790E000-memory.dmp

    Filesize

    5.0MB

  • memory/4752-135-0x0000000004A60000-0x0000000004A7A000-memory.dmp

    Filesize

    104KB

  • memory/4752-145-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-147-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB

  • memory/4752-143-0x0000000004D00000-0x0000000004D13000-memory.dmp

    Filesize

    76KB