Analysis

  • max time kernel
    48s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 19:31

General

  • Target

    107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe

  • Size

    690KB

  • MD5

    86244b0c111c78e78003db951b64660e

  • SHA1

    03290f5cd8e47d877c684e9434e7a2dd66e0055a

  • SHA256

    107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb

  • SHA512

    f2def6b542a2deec5f2b2d0627d86f1bf75ac0a4d883b21e841a7da6caba715bcaa129f77bd60d5961f49644116f8021a7c8f06d98d0dc90b95ef0a448ac5d5f

  • SSDEEP

    12288:gy90qublJjrM90ejI2NepAcYagnGeghG1niNtm7bODhet+:gyIHrA+HYagnGeSNMON8+

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe
    "C:\Users\Admin\AppData\Local\Temp\107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3804

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe

          Filesize

          536KB

          MD5

          44ffe560c43334e177151e12eb5f996e

          SHA1

          21ac8603e25ac13e77e66744d68d384a1b15b878

          SHA256

          55fe79d251f1bb5ad4ba108ed1ee38722c28f08ab48527b759aee9cc637df484

          SHA512

          79d4cb879d388a18720995abdefe6fa89f2893d7e968b2c26deeefae6e239e2f965c6a7324953f49a30a4551e958330930120459148261423598192326887c4d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe

          Filesize

          536KB

          MD5

          44ffe560c43334e177151e12eb5f996e

          SHA1

          21ac8603e25ac13e77e66744d68d384a1b15b878

          SHA256

          55fe79d251f1bb5ad4ba108ed1ee38722c28f08ab48527b759aee9cc637df484

          SHA512

          79d4cb879d388a18720995abdefe6fa89f2893d7e968b2c26deeefae6e239e2f965c6a7324953f49a30a4551e958330930120459148261423598192326887c4d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe

          Filesize

          258KB

          MD5

          b51b733e2d6583673adce95ea8f1f65c

          SHA1

          c471b8da0115d01e9180deb6cb521d825cdcc5b1

          SHA256

          51f353c272f6a25c40dda473b60ccbb0ee19320ec3b17a86ae8ff7d89803e94a

          SHA512

          d8fa2bc0bda23520d69f3dbaa6c263201c3928e2fe879ad3fadc44097721c15b082b805fd7e0d2b03ac8eabee9de45e9ee47f0ae0a5db8e9d81927d9cbf40dd5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe

          Filesize

          258KB

          MD5

          b51b733e2d6583673adce95ea8f1f65c

          SHA1

          c471b8da0115d01e9180deb6cb521d825cdcc5b1

          SHA256

          51f353c272f6a25c40dda473b60ccbb0ee19320ec3b17a86ae8ff7d89803e94a

          SHA512

          d8fa2bc0bda23520d69f3dbaa6c263201c3928e2fe879ad3fadc44097721c15b082b805fd7e0d2b03ac8eabee9de45e9ee47f0ae0a5db8e9d81927d9cbf40dd5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe

          Filesize

          341KB

          MD5

          de3ab3ff2ccc7391e54c2aeda180ff69

          SHA1

          ddac9b86a03af865ea04b8cae589f8e331d2bfb9

          SHA256

          b99c8e3874a418fe9c46f066928b8b5a9206f6f4c44f114b8df7c39f956ac5f5

          SHA512

          345e1f4261f43048b11e4982f34e3e96a96dd4cd312831cbf45878b1d61abc01e3afc95ee1edc810172609b72a3d8f3e7e4d844faba302e4199ff46f3d6a4fca

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe

          Filesize

          341KB

          MD5

          de3ab3ff2ccc7391e54c2aeda180ff69

          SHA1

          ddac9b86a03af865ea04b8cae589f8e331d2bfb9

          SHA256

          b99c8e3874a418fe9c46f066928b8b5a9206f6f4c44f114b8df7c39f956ac5f5

          SHA512

          345e1f4261f43048b11e4982f34e3e96a96dd4cd312831cbf45878b1d61abc01e3afc95ee1edc810172609b72a3d8f3e7e4d844faba302e4199ff46f3d6a4fca

        • memory/2708-218-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-979-0x0000000007BB0000-0x00000000081B6000-memory.dmp

          Filesize

          6.0MB

        • memory/2708-206-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-204-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-202-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-992-0x0000000002310000-0x0000000002360000-memory.dmp

          Filesize

          320KB

        • memory/2708-990-0x0000000009080000-0x000000000909E000-memory.dmp

          Filesize

          120KB

        • memory/2708-989-0x0000000008A30000-0x0000000008F5C000-memory.dmp

          Filesize

          5.2MB

        • memory/2708-988-0x0000000008850000-0x0000000008A12000-memory.dmp

          Filesize

          1.8MB

        • memory/2708-987-0x0000000008790000-0x0000000008806000-memory.dmp

          Filesize

          472KB

        • memory/2708-986-0x00000000085F0000-0x0000000008682000-memory.dmp

          Filesize

          584KB

        • memory/2708-985-0x0000000007900000-0x0000000007966000-memory.dmp

          Filesize

          408KB

        • memory/2708-984-0x00000000077B0000-0x00000000077FB000-memory.dmp

          Filesize

          300KB

        • memory/2708-983-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/2708-982-0x0000000004C50000-0x0000000004C8E000-memory.dmp

          Filesize

          248KB

        • memory/2708-981-0x00000000075A0000-0x00000000076AA000-memory.dmp

          Filesize

          1.0MB

        • memory/2708-192-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-194-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-980-0x0000000004C20000-0x0000000004C32000-memory.dmp

          Filesize

          72KB

        • memory/2708-209-0x00000000004D0000-0x0000000000516000-memory.dmp

          Filesize

          280KB

        • memory/2708-220-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-216-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-215-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/2708-212-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/2708-213-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-181-0x0000000002150000-0x000000000218C000-memory.dmp

          Filesize

          240KB

        • memory/2708-182-0x00000000024C0000-0x00000000024FA000-memory.dmp

          Filesize

          232KB

        • memory/2708-183-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-184-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-186-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-188-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-190-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-211-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/2708-196-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-208-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-198-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/2708-200-0x00000000024C0000-0x00000000024F5000-memory.dmp

          Filesize

          212KB

        • memory/3804-998-0x0000000000910000-0x0000000000938000-memory.dmp

          Filesize

          160KB

        • memory/3804-999-0x0000000002B90000-0x0000000002BA0000-memory.dmp

          Filesize

          64KB

        • memory/3804-1000-0x00000000076A0000-0x00000000076EB000-memory.dmp

          Filesize

          300KB

        • memory/4928-168-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-170-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-141-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB

        • memory/4928-139-0x0000000002420000-0x0000000002438000-memory.dmp

          Filesize

          96KB

        • memory/4928-140-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB

        • memory/4928-176-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/4928-138-0x0000000004C70000-0x000000000516E000-memory.dmp

          Filesize

          5.0MB

        • memory/4928-174-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB

        • memory/4928-173-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB

        • memory/4928-172-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB

        • memory/4928-171-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/4928-166-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-164-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-162-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-160-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-158-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-156-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-154-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-152-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-150-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-148-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-146-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-137-0x0000000002060000-0x000000000207A000-memory.dmp

          Filesize

          104KB

        • memory/4928-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4928-144-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-143-0x0000000002420000-0x0000000002433000-memory.dmp

          Filesize

          76KB

        • memory/4928-142-0x0000000004C60000-0x0000000004C70000-memory.dmp

          Filesize

          64KB