Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 18:00

General

  • Target

    94e5061b68fabeb4bc860c8947f3671335636228e7a766803565c9cc9d352c13.exe

  • Size

    653KB

  • MD5

    dd37ad41e459abe8e42233a21e5f8f3e

  • SHA1

    1337fc94726d1dea557dab93b377d75b0c715a6e

  • SHA256

    94e5061b68fabeb4bc860c8947f3671335636228e7a766803565c9cc9d352c13

  • SHA512

    56cbb4b24dc65b155144a6b7ad1f63e505c99220e4873b3868c527789f552ec1c4a88d80c1c597a633e610a463857b0b56a5d658d1f21bb23512c6a5ca78bd04

  • SSDEEP

    12288:yy90eawgg3hl2LbekRJh2s+uHedpe2PGzE3vNBlZOWgB0to:yygwTIP7Ysnedk2/vNwWzo

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94e5061b68fabeb4bc860c8947f3671335636228e7a766803565c9cc9d352c13.exe
    "C:\Users\Admin\AppData\Local\Temp\94e5061b68fabeb4bc860c8947f3671335636228e7a766803565c9cc9d352c13.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st210038.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st210038.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51280066.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51280066.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683770.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683770.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3756

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683770.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683770.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st210038.exe

          Filesize

          499KB

          MD5

          2915c1e096d40718a145fbd4cca48db7

          SHA1

          15d842da63290bd8643f859cad9fa9b77231e83e

          SHA256

          837aacff5db95b10d8406199e743db4a5debefec159ecca993a83ff59ee59bfe

          SHA512

          1352fb60cd11254a573667399227fbf9e88f4af65e35182510aa1d9d9795bda61a6996d7281fff5a713e7c7af00a655668e2738269559135070f704884e19190

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st210038.exe

          Filesize

          499KB

          MD5

          2915c1e096d40718a145fbd4cca48db7

          SHA1

          15d842da63290bd8643f859cad9fa9b77231e83e

          SHA256

          837aacff5db95b10d8406199e743db4a5debefec159ecca993a83ff59ee59bfe

          SHA512

          1352fb60cd11254a573667399227fbf9e88f4af65e35182510aa1d9d9795bda61a6996d7281fff5a713e7c7af00a655668e2738269559135070f704884e19190

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51280066.exe

          Filesize

          175KB

          MD5

          3d10b67208452d7a91d7bd7066067676

          SHA1

          e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

          SHA256

          5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

          SHA512

          b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51280066.exe

          Filesize

          175KB

          MD5

          3d10b67208452d7a91d7bd7066067676

          SHA1

          e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

          SHA256

          5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

          SHA512

          b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe

          Filesize

          342KB

          MD5

          0fbf7109e2f72e7ba0d9ae0b5b93e4cf

          SHA1

          6b4bd69f0f24427929bd8fed83dc5d3389b9a12f

          SHA256

          313fd08c4d24db51fc298376f08199c31d91bc260009afd1988ede7991d4facc

          SHA512

          fd164a28718f3fab15011487838e29848e92272de3f66a83698b08045fbf7c805ade58fdd530c4b1c5e87df402569639c2d0cfb093ef5b385d93d654a6c33fda

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe

          Filesize

          342KB

          MD5

          0fbf7109e2f72e7ba0d9ae0b5b93e4cf

          SHA1

          6b4bd69f0f24427929bd8fed83dc5d3389b9a12f

          SHA256

          313fd08c4d24db51fc298376f08199c31d91bc260009afd1988ede7991d4facc

          SHA512

          fd164a28718f3fab15011487838e29848e92272de3f66a83698b08045fbf7c805ade58fdd530c4b1c5e87df402569639c2d0cfb093ef5b385d93d654a6c33fda

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp956299.exe

          Filesize

          342KB

          MD5

          0fbf7109e2f72e7ba0d9ae0b5b93e4cf

          SHA1

          6b4bd69f0f24427929bd8fed83dc5d3389b9a12f

          SHA256

          313fd08c4d24db51fc298376f08199c31d91bc260009afd1988ede7991d4facc

          SHA512

          fd164a28718f3fab15011487838e29848e92272de3f66a83698b08045fbf7c805ade58fdd530c4b1c5e87df402569639c2d0cfb093ef5b385d93d654a6c33fda

        • memory/888-219-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-226-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-1010-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/888-1006-0x0000000002320000-0x0000000002330000-memory.dmp

          Filesize

          64KB

        • memory/888-236-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-234-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-232-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-230-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-228-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-224-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-221-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-217-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-214-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-212-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-209-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-206-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-198-0x0000000002320000-0x0000000002330000-memory.dmp

          Filesize

          64KB

        • memory/888-200-0x0000000002320000-0x0000000002330000-memory.dmp

          Filesize

          64KB

        • memory/888-204-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-202-0x0000000002320000-0x0000000002330000-memory.dmp

          Filesize

          64KB

        • memory/888-187-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/888-201-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-190-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/888-191-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/888-199-0x0000000002440000-0x0000000002475000-memory.dmp

          Filesize

          212KB

        • memory/888-197-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/1624-189-0x00000000005E0000-0x0000000000627000-memory.dmp

          Filesize

          284KB

        • memory/3756-223-0x0000000007710000-0x000000000774C000-memory.dmp

          Filesize

          240KB

        • memory/3756-215-0x00000000077B0000-0x00000000078BA000-memory.dmp

          Filesize

          1.0MB

        • memory/3756-196-0x0000000000970000-0x0000000000998000-memory.dmp

          Filesize

          160KB

        • memory/3756-1004-0x00000000088C0000-0x0000000008910000-memory.dmp

          Filesize

          320KB

        • memory/3756-462-0x0000000008860000-0x000000000887E000-memory.dmp

          Filesize

          120KB

        • memory/3756-449-0x00000000097A0000-0x0000000009CCC000-memory.dmp

          Filesize

          5.2MB

        • memory/3756-439-0x00000000090A0000-0x0000000009262000-memory.dmp

          Filesize

          1.8MB

        • memory/3756-422-0x00000000087A0000-0x0000000008816000-memory.dmp

          Filesize

          472KB

        • memory/3756-208-0x0000000007BF0000-0x0000000008208000-memory.dmp

          Filesize

          6.1MB

        • memory/3756-409-0x0000000008620000-0x00000000086B2000-memory.dmp

          Filesize

          584KB

        • memory/3756-211-0x0000000007680000-0x0000000007692000-memory.dmp

          Filesize

          72KB

        • memory/3756-369-0x0000000007A40000-0x0000000007AA6000-memory.dmp

          Filesize

          408KB

        • memory/3756-239-0x00000000076C0000-0x00000000076D0000-memory.dmp

          Filesize

          64KB

        • memory/4340-179-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-160-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-147-0x0000000004C30000-0x00000000051D4000-memory.dmp

          Filesize

          5.6MB

        • memory/4340-148-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-149-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-170-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-154-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-168-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-166-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-164-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-162-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-174-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-176-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-178-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-172-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-180-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-181-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-151-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-152-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-150-0x0000000004C20000-0x0000000004C30000-memory.dmp

          Filesize

          64KB

        • memory/4340-158-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB

        • memory/4340-156-0x0000000004A90000-0x0000000004AA3000-memory.dmp

          Filesize

          76KB