Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 09:45

General

  • Target

    e6750d729934dd24adeb8e7f902a2caedf9594b07686bbfeae384d6fcee74297.exe

  • Size

    695KB

  • MD5

    47b287fbe0bfc08713ffe5341a5de76f

  • SHA1

    05dec88dd5a37f325cae970477f79a6f6ca8a4e3

  • SHA256

    e6750d729934dd24adeb8e7f902a2caedf9594b07686bbfeae384d6fcee74297

  • SHA512

    a24f207617d329f57ffb6e8b09581490d1a8be59775ed3590ce3b0e293eca318ec2b5b17705a0607dd5fc1f8048aa5db56da8e9c42378f523701cf558aa51488

  • SSDEEP

    12288:/y904TCayK4Jamytl46SzXaBNK1gmqQSZRhudHe0iD9e78yomf:/yVPy8zY6SzK6+mq9jq3Ce78/i

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6750d729934dd24adeb8e7f902a2caedf9594b07686bbfeae384d6fcee74297.exe
    "C:\Users\Admin\AppData\Local\Temp\e6750d729934dd24adeb8e7f902a2caedf9594b07686bbfeae384d6fcee74297.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331205.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95376264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95376264.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 1080
          4⤵
          • Program crash
          PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk247556.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk247556.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1916
          4⤵
          • Program crash
          PID:1664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622968.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622968.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2216
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3376 -ip 3376
    1⤵
      PID:4832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4804 -ip 4804
      1⤵
        PID:1608

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622968.exe

              Filesize

              136KB

              MD5

              e1c805d3cefe221689da30b8a2d944f2

              SHA1

              a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

              SHA256

              32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

              SHA512

              7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622968.exe

              Filesize

              136KB

              MD5

              e1c805d3cefe221689da30b8a2d944f2

              SHA1

              a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

              SHA256

              32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

              SHA512

              7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331205.exe

              Filesize

              541KB

              MD5

              ba4e44b705ad87e9b4948b72e5781b7f

              SHA1

              9c4805f333d66532d6cfd01a214b92c914a0275c

              SHA256

              5fc18c8430a6ff601610210d8df64bd06ed81f99005c78a1aff02ad3ab7f7288

              SHA512

              3532ce0d07135054033bc3bf1f5ccfdc57bcd560bb4645e9c74942e6897b39d0483113c16584a2aeaa25112a004f7657519a85dba779776e75a97beedf2a1559

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331205.exe

              Filesize

              541KB

              MD5

              ba4e44b705ad87e9b4948b72e5781b7f

              SHA1

              9c4805f333d66532d6cfd01a214b92c914a0275c

              SHA256

              5fc18c8430a6ff601610210d8df64bd06ed81f99005c78a1aff02ad3ab7f7288

              SHA512

              3532ce0d07135054033bc3bf1f5ccfdc57bcd560bb4645e9c74942e6897b39d0483113c16584a2aeaa25112a004f7657519a85dba779776e75a97beedf2a1559

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95376264.exe

              Filesize

              264KB

              MD5

              d39e5cdc5967c2d18dbe5cf7403dd0fe

              SHA1

              f28d706cd19175b1f43052185d8652d14d0abf35

              SHA256

              3da2c5428592fa1150fddbab73c4af30f7694ac0ea535295edb696bc8c072c42

              SHA512

              4c58dd2a786ac2fe021943590fe2bc6f001046335980421966572215b8b7a7320fb627e3395af09d6524bf9ea117ed606a5f533182d963acd13a48a176b50d9c

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95376264.exe

              Filesize

              264KB

              MD5

              d39e5cdc5967c2d18dbe5cf7403dd0fe

              SHA1

              f28d706cd19175b1f43052185d8652d14d0abf35

              SHA256

              3da2c5428592fa1150fddbab73c4af30f7694ac0ea535295edb696bc8c072c42

              SHA512

              4c58dd2a786ac2fe021943590fe2bc6f001046335980421966572215b8b7a7320fb627e3395af09d6524bf9ea117ed606a5f533182d963acd13a48a176b50d9c

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk247556.exe

              Filesize

              348KB

              MD5

              a51125e8769a450b03e80a90fefa4ade

              SHA1

              53f71c30e14b4980e1dbc525db32362838ee6afd

              SHA256

              cb5ab867e3066fc2272a2d7516f220b8ec9eed6ba8ea579d47c7fd033f3d8cd5

              SHA512

              b57a43b3397ab663a4c8688ea9251647870e584080cc33bfd732a3d0c506adaf8f1b260a215c956f80cfa4cebe07b80b985f3b0b6a71336e0d259a786ee02586

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk247556.exe

              Filesize

              348KB

              MD5

              a51125e8769a450b03e80a90fefa4ade

              SHA1

              53f71c30e14b4980e1dbc525db32362838ee6afd

              SHA256

              cb5ab867e3066fc2272a2d7516f220b8ec9eed6ba8ea579d47c7fd033f3d8cd5

              SHA512

              b57a43b3397ab663a4c8688ea9251647870e584080cc33bfd732a3d0c506adaf8f1b260a215c956f80cfa4cebe07b80b985f3b0b6a71336e0d259a786ee02586

            • memory/2216-1000-0x00000000007A0000-0x00000000007C8000-memory.dmp

              Filesize

              160KB

            • memory/2216-1001-0x0000000007570000-0x0000000007580000-memory.dmp

              Filesize

              64KB

            • memory/3376-185-0x0000000000400000-0x0000000002B9D000-memory.dmp

              Filesize

              39.6MB

            • memory/3376-151-0x0000000007240000-0x0000000007250000-memory.dmp

              Filesize

              64KB

            • memory/3376-150-0x0000000007250000-0x00000000077F4000-memory.dmp

              Filesize

              5.6MB

            • memory/3376-152-0x0000000007240000-0x0000000007250000-memory.dmp

              Filesize

              64KB

            • memory/3376-153-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-154-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-156-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-158-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-160-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-162-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-164-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-166-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-168-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-170-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-172-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-174-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-176-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-178-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-180-0x0000000004C10000-0x0000000004C23000-memory.dmp

              Filesize

              76KB

            • memory/3376-181-0x0000000000400000-0x0000000002B9D000-memory.dmp

              Filesize

              39.6MB

            • memory/3376-182-0x0000000007240000-0x0000000007250000-memory.dmp

              Filesize

              64KB

            • memory/3376-183-0x0000000007240000-0x0000000007250000-memory.dmp

              Filesize

              64KB

            • memory/3376-149-0x0000000007240000-0x0000000007250000-memory.dmp

              Filesize

              64KB

            • memory/3376-148-0x0000000002CE0000-0x0000000002D0D000-memory.dmp

              Filesize

              180KB

            • memory/4804-196-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-220-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-194-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-191-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-198-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-200-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-202-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-204-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-206-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-208-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-210-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-212-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-214-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-218-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-216-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-192-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-222-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-224-0x0000000007170000-0x00000000071A5000-memory.dmp

              Filesize

              212KB

            • memory/4804-983-0x0000000009C70000-0x000000000A288000-memory.dmp

              Filesize

              6.1MB

            • memory/4804-984-0x000000000A310000-0x000000000A322000-memory.dmp

              Filesize

              72KB

            • memory/4804-985-0x000000000A330000-0x000000000A43A000-memory.dmp

              Filesize

              1.0MB

            • memory/4804-986-0x000000000A450000-0x000000000A48C000-memory.dmp

              Filesize

              240KB

            • memory/4804-987-0x0000000007330000-0x0000000007340000-memory.dmp

              Filesize

              64KB

            • memory/4804-988-0x000000000A750000-0x000000000A7B6000-memory.dmp

              Filesize

              408KB

            • memory/4804-989-0x000000000AE20000-0x000000000AEB2000-memory.dmp

              Filesize

              584KB

            • memory/4804-990-0x000000000AEE0000-0x000000000AF56000-memory.dmp

              Filesize

              472KB

            • memory/4804-991-0x000000000AFC0000-0x000000000B182000-memory.dmp

              Filesize

              1.8MB

            • memory/4804-190-0x0000000002C00000-0x0000000002C46000-memory.dmp

              Filesize

              280KB

            • memory/4804-992-0x000000000B190000-0x000000000B6BC000-memory.dmp

              Filesize

              5.2MB

            • memory/4804-993-0x000000000B740000-0x000000000B75E000-memory.dmp

              Filesize

              120KB

            • memory/4804-994-0x0000000004C80000-0x0000000004CD0000-memory.dmp

              Filesize

              320KB