Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 09:30

General

  • Target

    cb304900e55e096354696c56b40bf51722acd4ec00b6feeccf8d0f4cd2e23c85.exe

  • Size

    695KB

  • MD5

    4803213ace367c4ae4906407f263fefd

  • SHA1

    669be67c184370f38361fb7835941c7605be4286

  • SHA256

    cb304900e55e096354696c56b40bf51722acd4ec00b6feeccf8d0f4cd2e23c85

  • SHA512

    c8aa44dd051059f85aa33d0b3dcde2994d377e2fc8cee5761bd7b7a2c1cf80ac6670d491d60d591f709ac6510b9a67d8d57ba4b150bf7a83b72e4b356a0f3375

  • SSDEEP

    12288:by901mBJSw/j1zmyMzPQOtMrLCfOaK1gmkQJZRhucHm0iDue7D5zRoAhXDyrf:bykEb1zPqPQvL7j+mkCjX/Be7D5FFTS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb304900e55e096354696c56b40bf51722acd4ec00b6feeccf8d0f4cd2e23c85.exe
    "C:\Users\Admin\AppData\Local\Temp\cb304900e55e096354696c56b40bf51722acd4ec00b6feeccf8d0f4cd2e23c85.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318158.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11992546.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11992546.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791867.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791867.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867693.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3940

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867693.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867693.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318158.exe

          Filesize

          540KB

          MD5

          976de7405d45ce636410a6b5d63aa6f7

          SHA1

          702486583434a221d37e33a039377bd9e935cb39

          SHA256

          ac91129b169e21eb5827890289ab5ab0f179ae0111e889066bad1c2e3f5e6609

          SHA512

          f065a0b1198371601f4c13b72379870d4a36b0c6877b328a66c9a586003020fcd15721fb5c9387320a885319e31dd7ba777669a0023dbd3f0553759396a5a99c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318158.exe

          Filesize

          540KB

          MD5

          976de7405d45ce636410a6b5d63aa6f7

          SHA1

          702486583434a221d37e33a039377bd9e935cb39

          SHA256

          ac91129b169e21eb5827890289ab5ab0f179ae0111e889066bad1c2e3f5e6609

          SHA512

          f065a0b1198371601f4c13b72379870d4a36b0c6877b328a66c9a586003020fcd15721fb5c9387320a885319e31dd7ba777669a0023dbd3f0553759396a5a99c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11992546.exe

          Filesize

          264KB

          MD5

          ac5341f3f4c03961021630c151150778

          SHA1

          1437c94f3050e3bfe9d3c5c256207ce4fc208775

          SHA256

          3e4eb9c607c8a04a4ef605c064031104622ce702ece7b2f31a478f649dab38f2

          SHA512

          d73ad299468c28c84249d01d8d891152d307ff33503a285b0cd290b5de581ea1fe603a9a4b5ebdb48d14235a5418fd12fb7d2a18ece60ff8190f0c7e2eb76f12

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11992546.exe

          Filesize

          264KB

          MD5

          ac5341f3f4c03961021630c151150778

          SHA1

          1437c94f3050e3bfe9d3c5c256207ce4fc208775

          SHA256

          3e4eb9c607c8a04a4ef605c064031104622ce702ece7b2f31a478f649dab38f2

          SHA512

          d73ad299468c28c84249d01d8d891152d307ff33503a285b0cd290b5de581ea1fe603a9a4b5ebdb48d14235a5418fd12fb7d2a18ece60ff8190f0c7e2eb76f12

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791867.exe

          Filesize

          348KB

          MD5

          7c00e3f3d48a898926c7275ad5e966b6

          SHA1

          b94d481f7f979cecea4b08a3b17101a6f57e21eb

          SHA256

          29002fb70a67a1dda58e8fc7a95046955aa56411888ec7d79462cbc91ccd4365

          SHA512

          a08065084a75cad86bad9a3e3736f527b3f7a7cedc2680aac00376929c67806a7d279d86f2b313d72548b13a0327e52bd8ca277bf1117272eec0e2ff2bd8f0ec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791867.exe

          Filesize

          348KB

          MD5

          7c00e3f3d48a898926c7275ad5e966b6

          SHA1

          b94d481f7f979cecea4b08a3b17101a6f57e21eb

          SHA256

          29002fb70a67a1dda58e8fc7a95046955aa56411888ec7d79462cbc91ccd4365

          SHA512

          a08065084a75cad86bad9a3e3736f527b3f7a7cedc2680aac00376929c67806a7d279d86f2b313d72548b13a0327e52bd8ca277bf1117272eec0e2ff2bd8f0ec

        • memory/1472-207-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-211-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-986-0x00000000049E0000-0x0000000004A30000-memory.dmp

          Filesize

          320KB

        • memory/1472-985-0x000000000B6C0000-0x000000000B6DE000-memory.dmp

          Filesize

          120KB

        • memory/1472-984-0x000000000B080000-0x000000000B5AC000-memory.dmp

          Filesize

          5.2MB

        • memory/1472-983-0x000000000AEA0000-0x000000000B062000-memory.dmp

          Filesize

          1.8MB

        • memory/1472-982-0x000000000ADE0000-0x000000000AE56000-memory.dmp

          Filesize

          472KB

        • memory/1472-981-0x000000000AD40000-0x000000000ADD2000-memory.dmp

          Filesize

          584KB

        • memory/1472-980-0x000000000A660000-0x000000000A6C6000-memory.dmp

          Filesize

          408KB

        • memory/1472-979-0x000000000A3D0000-0x000000000A41B000-memory.dmp

          Filesize

          300KB

        • memory/1472-978-0x000000000A350000-0x000000000A38E000-memory.dmp

          Filesize

          248KB

        • memory/1472-977-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/1472-976-0x000000000A230000-0x000000000A33A000-memory.dmp

          Filesize

          1.0MB

        • memory/1472-975-0x000000000A200000-0x000000000A212000-memory.dmp

          Filesize

          72KB

        • memory/1472-974-0x0000000009BB0000-0x000000000A1B6000-memory.dmp

          Filesize

          6.0MB

        • memory/1472-215-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-183-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-186-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/1472-213-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-193-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-209-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-205-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-203-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-201-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-199-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-176-0x0000000004950000-0x000000000498C000-memory.dmp

          Filesize

          240KB

        • memory/1472-177-0x0000000004BE0000-0x0000000004C1A000-memory.dmp

          Filesize

          232KB

        • memory/1472-178-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-179-0x0000000002D50000-0x0000000002D96000-memory.dmp

          Filesize

          280KB

        • memory/1472-180-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-181-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/1472-184-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/1472-197-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-189-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-195-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-187-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/1472-191-0x0000000004BE0000-0x0000000004C15000-memory.dmp

          Filesize

          212KB

        • memory/2344-164-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-165-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-136-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-134-0x0000000007190000-0x000000000768E000-memory.dmp

          Filesize

          5.0MB

        • memory/2344-135-0x0000000004830000-0x0000000004848000-memory.dmp

          Filesize

          96KB

        • memory/2344-171-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/2344-170-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-168-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-167-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-133-0x0000000004780000-0x000000000479A000-memory.dmp

          Filesize

          104KB

        • memory/2344-166-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/2344-163-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-161-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-159-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-157-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-155-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-153-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-147-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-151-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-149-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-145-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-143-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-141-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-139-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-137-0x0000000004830000-0x0000000004843000-memory.dmp

          Filesize

          76KB

        • memory/2344-132-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2344-131-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/3940-992-0x0000000000840000-0x0000000000868000-memory.dmp

          Filesize

          160KB

        • memory/3940-993-0x00000000075C0000-0x000000000760B000-memory.dmp

          Filesize

          300KB

        • memory/3940-994-0x00000000078E0000-0x00000000078F0000-memory.dmp

          Filesize

          64KB