Analysis

  • max time kernel
    61s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 09:52

General

  • Target

    ed85e8da3d6ae1a18bc93cafe853db31be4e7a2359b9a5d012ab39ff5dd90cc5.exe

  • Size

    643KB

  • MD5

    9dcadb17cacb81279cfc2512209c5b0d

  • SHA1

    f628aaba9e556659abe9ae33ebc12068689d77ac

  • SHA256

    ed85e8da3d6ae1a18bc93cafe853db31be4e7a2359b9a5d012ab39ff5dd90cc5

  • SHA512

    714f9c85c5e5d9dccb7b41bd183999e4815d7cbc894b07acc89f81f7a2a1dcf5b07d749050e024f4f9f8ae5267d3e59ddf8881a82c0e776cb481502e79a44ca2

  • SSDEEP

    12288:py90krz3fvzsKm2iZq7cy+XugRlrgQAZRluzHx0iS3e7fPUq4U3Xbe7b:pyxHtRik7cTXTzcXj+uXe7fPUdU3X67b

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed85e8da3d6ae1a18bc93cafe853db31be4e7a2359b9a5d012ab39ff5dd90cc5.exe
    "C:\Users\Admin\AppData\Local\Temp\ed85e8da3d6ae1a18bc93cafe853db31be4e7a2359b9a5d012ab39ff5dd90cc5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st177748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st177748.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36934114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36934114.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp272399.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp272399.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 340 -s 1328
          4⤵
          • Program crash
          PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr337106.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr337106.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 340 -ip 340
    1⤵
      PID:4900

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr337106.exe

            Filesize

            136KB

            MD5

            e1c805d3cefe221689da30b8a2d944f2

            SHA1

            a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

            SHA256

            32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

            SHA512

            7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr337106.exe

            Filesize

            136KB

            MD5

            e1c805d3cefe221689da30b8a2d944f2

            SHA1

            a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

            SHA256

            32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

            SHA512

            7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st177748.exe

            Filesize

            489KB

            MD5

            17f27f11ad034e726e44f61c9cc3e4cc

            SHA1

            0a94ad700e119e73422db9f362c906980395f39d

            SHA256

            3bc87f1998a05e3e8d77db0b1456edac1c9996660a7b4e1852310aadc8506085

            SHA512

            d389a49028088e2e04985cb2070dad3d9795648936d51a2b3f480362e0233f53555bb83499a5e6dc0e7c2e7fb5a42811ce3b5887df11eebdc251662d7c250d09

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st177748.exe

            Filesize

            489KB

            MD5

            17f27f11ad034e726e44f61c9cc3e4cc

            SHA1

            0a94ad700e119e73422db9f362c906980395f39d

            SHA256

            3bc87f1998a05e3e8d77db0b1456edac1c9996660a7b4e1852310aadc8506085

            SHA512

            d389a49028088e2e04985cb2070dad3d9795648936d51a2b3f480362e0233f53555bb83499a5e6dc0e7c2e7fb5a42811ce3b5887df11eebdc251662d7c250d09

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36934114.exe

            Filesize

            175KB

            MD5

            3d10b67208452d7a91d7bd7066067676

            SHA1

            e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

            SHA256

            5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

            SHA512

            b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36934114.exe

            Filesize

            175KB

            MD5

            3d10b67208452d7a91d7bd7066067676

            SHA1

            e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

            SHA256

            5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

            SHA512

            b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp272399.exe

            Filesize

            348KB

            MD5

            8972eee576f09a4f173a96786413721c

            SHA1

            08fb44393df63d2f802280693bff338d400cfd0d

            SHA256

            87ca1a99cfdf50d28caf74fa1e7855b3977e32ead42be575a85d68bff4bfe152

            SHA512

            2c0968ad6851e5b4142058bd26474171c4ed7f6c352286c6350e5501b1faea553bc244ec2e75148c52f2e6f5a9d7a782f157f67a8270b12ec710ceea9a6c8e89

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp272399.exe

            Filesize

            348KB

            MD5

            8972eee576f09a4f173a96786413721c

            SHA1

            08fb44393df63d2f802280693bff338d400cfd0d

            SHA256

            87ca1a99cfdf50d28caf74fa1e7855b3977e32ead42be575a85d68bff4bfe152

            SHA512

            2c0968ad6851e5b4142058bd26474171c4ed7f6c352286c6350e5501b1faea553bc244ec2e75148c52f2e6f5a9d7a782f157f67a8270b12ec710ceea9a6c8e89

          • memory/340-333-0x0000000004C20000-0x0000000004C30000-memory.dmp

            Filesize

            64KB

          • memory/340-983-0x0000000009C80000-0x000000000A298000-memory.dmp

            Filesize

            6.1MB

          • memory/340-994-0x000000000B970000-0x000000000B98E000-memory.dmp

            Filesize

            120KB

          • memory/340-993-0x000000000B1F0000-0x000000000B71C000-memory.dmp

            Filesize

            5.2MB

          • memory/340-992-0x000000000B020000-0x000000000B1E2000-memory.dmp

            Filesize

            1.8MB

          • memory/340-991-0x000000000AF30000-0x000000000AFA6000-memory.dmp

            Filesize

            472KB

          • memory/340-990-0x000000000AEC0000-0x000000000AF10000-memory.dmp

            Filesize

            320KB

          • memory/340-989-0x000000000AE10000-0x000000000AEA2000-memory.dmp

            Filesize

            584KB

          • memory/340-988-0x000000000A750000-0x000000000A7B6000-memory.dmp

            Filesize

            408KB

          • memory/340-987-0x0000000004C20000-0x0000000004C30000-memory.dmp

            Filesize

            64KB

          • memory/340-986-0x000000000A490000-0x000000000A4CC000-memory.dmp

            Filesize

            240KB

          • memory/340-985-0x000000000A330000-0x000000000A43A000-memory.dmp

            Filesize

            1.0MB

          • memory/340-984-0x000000000A310000-0x000000000A322000-memory.dmp

            Filesize

            72KB

          • memory/340-337-0x0000000004C20000-0x0000000004C30000-memory.dmp

            Filesize

            64KB

          • memory/340-336-0x0000000004C20000-0x0000000004C30000-memory.dmp

            Filesize

            64KB

          • memory/340-332-0x0000000002CD0000-0x0000000002D16000-memory.dmp

            Filesize

            280KB

          • memory/340-222-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-220-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-216-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-218-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-187-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-188-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-190-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-192-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-194-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-196-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-198-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-200-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-202-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-204-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-208-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-206-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-210-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-212-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/340-214-0x0000000007780000-0x00000000077B5000-memory.dmp

            Filesize

            212KB

          • memory/1620-168-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-178-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-181-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-180-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-179-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-150-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-170-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-176-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-152-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-174-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-151-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-172-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-160-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-166-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-164-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-162-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-149-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-158-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-156-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-154-0x0000000002350000-0x0000000002363000-memory.dmp

            Filesize

            76KB

          • memory/1620-148-0x0000000004C10000-0x0000000004C20000-memory.dmp

            Filesize

            64KB

          • memory/1620-147-0x0000000004C20000-0x00000000051C4000-memory.dmp

            Filesize

            5.6MB

          • memory/3640-1000-0x0000000000280000-0x00000000002A8000-memory.dmp

            Filesize

            160KB

          • memory/3640-1001-0x0000000007020000-0x0000000007030000-memory.dmp

            Filesize

            64KB