Analysis

  • max time kernel
    53s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 19:38

General

  • Target

    f2ed2ac5b78703d4966d77cf7847128353bd51fe44c37f0c9fedd06953d62631.exe

  • Size

    690KB

  • MD5

    0ccd0b27fef24186a11022e49e7d205a

  • SHA1

    26f0b76e5d8188f57f90dccce40590294d6c1ecd

  • SHA256

    f2ed2ac5b78703d4966d77cf7847128353bd51fe44c37f0c9fedd06953d62631

  • SHA512

    ef0d6f166164b3264adcea193218b498e0d412e0dd6464196720cec04dd5a52a7f0998ed38184c67132cfeb96c91f118e48d8e8e81e41037f4d7d18067d43eef

  • SSDEEP

    12288:4y90aG4os2TKUbnFTmrtVfepqGMygGfniNwmBRX/fIEg7mWh:4yPG4osyj4tVkwNXX3IEg6Wh

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2ed2ac5b78703d4966d77cf7847128353bd51fe44c37f0c9fedd06953d62631.exe
    "C:\Users\Admin\AppData\Local\Temp\f2ed2ac5b78703d4966d77cf7847128353bd51fe44c37f0c9fedd06953d62631.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106321.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18979164.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18979164.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk420478.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk420478.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767369.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767369.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2080

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767369.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767369.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106321.exe

          Filesize

          536KB

          MD5

          ebc109999fe12b9218d0bc7f448c845f

          SHA1

          cf316d2a38317d3f492a656e0eb120d26bf604c1

          SHA256

          01982e7259ca5fa5578ea8dbf0ea19318a2e004ac3f1a7ee0f4d9967eb8202b4

          SHA512

          ce237bf4d33bb3fe3f30a16f1245383ab1ebe6bc8c39c21770b78f5f30cd2976f0f2edce5d19f1bb8ad919b52d8464a756edaa8c826508c347ea1db95a6218aa

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106321.exe

          Filesize

          536KB

          MD5

          ebc109999fe12b9218d0bc7f448c845f

          SHA1

          cf316d2a38317d3f492a656e0eb120d26bf604c1

          SHA256

          01982e7259ca5fa5578ea8dbf0ea19318a2e004ac3f1a7ee0f4d9967eb8202b4

          SHA512

          ce237bf4d33bb3fe3f30a16f1245383ab1ebe6bc8c39c21770b78f5f30cd2976f0f2edce5d19f1bb8ad919b52d8464a756edaa8c826508c347ea1db95a6218aa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18979164.exe

          Filesize

          258KB

          MD5

          00d5064fc5f22f2d1f1bbc92ba8fe60b

          SHA1

          1f691e92b3cfeb98d3ba5dc4363713a20ca7f0f9

          SHA256

          86b2761b627c593fde62e0b3d20bb99c57632ae840285ea56c8775560a516ff3

          SHA512

          75ab6de0ebed9b755a9b4054bedc260d108d4fb4e8161c49a39bb9ff93174a0a3a301aed43122f08ef3ea960a5f1642968db9f92a0929bba92560345642522d7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18979164.exe

          Filesize

          258KB

          MD5

          00d5064fc5f22f2d1f1bbc92ba8fe60b

          SHA1

          1f691e92b3cfeb98d3ba5dc4363713a20ca7f0f9

          SHA256

          86b2761b627c593fde62e0b3d20bb99c57632ae840285ea56c8775560a516ff3

          SHA512

          75ab6de0ebed9b755a9b4054bedc260d108d4fb4e8161c49a39bb9ff93174a0a3a301aed43122f08ef3ea960a5f1642968db9f92a0929bba92560345642522d7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk420478.exe

          Filesize

          341KB

          MD5

          76da484b11c14ace5cead39d0c51af03

          SHA1

          b4b48a2a523d9f6dc59b08999235140c4b479967

          SHA256

          c6bce63c470c0469e83cd3cbb1259473f2529bb9214db827505f07f72b08a97f

          SHA512

          c443403660d59a9a83deeb9edb62ca7d07c4d4664aec99bae4141fb122b3982064fd3fd551798fb3d59b9070f2ccf727a011cf603b77066d7cb5e84c8ad25845

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk420478.exe

          Filesize

          341KB

          MD5

          76da484b11c14ace5cead39d0c51af03

          SHA1

          b4b48a2a523d9f6dc59b08999235140c4b479967

          SHA256

          c6bce63c470c0469e83cd3cbb1259473f2529bb9214db827505f07f72b08a97f

          SHA512

          c443403660d59a9a83deeb9edb62ca7d07c4d4664aec99bae4141fb122b3982064fd3fd551798fb3d59b9070f2ccf727a011cf603b77066d7cb5e84c8ad25845

        • memory/952-971-0x0000000007490000-0x0000000007A96000-memory.dmp

          Filesize

          6.0MB

        • memory/952-972-0x0000000007AB0000-0x0000000007AC2000-memory.dmp

          Filesize

          72KB

        • memory/952-983-0x00000000020B0000-0x0000000002100000-memory.dmp

          Filesize

          320KB

        • memory/952-982-0x0000000008F90000-0x0000000008FAE000-memory.dmp

          Filesize

          120KB

        • memory/952-981-0x0000000008930000-0x0000000008E5C000-memory.dmp

          Filesize

          5.2MB

        • memory/952-980-0x0000000008750000-0x0000000008912000-memory.dmp

          Filesize

          1.8MB

        • memory/952-979-0x0000000008690000-0x0000000008706000-memory.dmp

          Filesize

          472KB

        • memory/952-978-0x00000000085F0000-0x0000000008682000-memory.dmp

          Filesize

          584KB

        • memory/952-977-0x0000000007F10000-0x0000000007F76000-memory.dmp

          Filesize

          408KB

        • memory/952-976-0x0000000007C80000-0x0000000007CCB000-memory.dmp

          Filesize

          300KB

        • memory/952-975-0x0000000002740000-0x0000000002750000-memory.dmp

          Filesize

          64KB

        • memory/952-974-0x0000000007C00000-0x0000000007C3E000-memory.dmp

          Filesize

          248KB

        • memory/952-973-0x0000000007AE0000-0x0000000007BEA000-memory.dmp

          Filesize

          1.0MB

        • memory/952-186-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-237-0x0000000002740000-0x0000000002750000-memory.dmp

          Filesize

          64KB

        • memory/952-235-0x0000000002740000-0x0000000002750000-memory.dmp

          Filesize

          64KB

        • memory/952-232-0x0000000002740000-0x0000000002750000-memory.dmp

          Filesize

          64KB

        • memory/952-231-0x0000000000580000-0x00000000005C6000-memory.dmp

          Filesize

          280KB

        • memory/952-208-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-190-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-204-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-202-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-173-0x0000000002140000-0x000000000217C000-memory.dmp

          Filesize

          240KB

        • memory/952-174-0x0000000002580000-0x00000000025BA000-memory.dmp

          Filesize

          232KB

        • memory/952-176-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-178-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-175-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-180-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-182-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-184-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-200-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-192-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-206-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-188-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-194-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-196-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/952-198-0x0000000002580000-0x00000000025B5000-memory.dmp

          Filesize

          212KB

        • memory/2080-989-0x00000000009D0000-0x00000000009F8000-memory.dmp

          Filesize

          160KB

        • memory/2080-991-0x00000000077B0000-0x00000000077C0000-memory.dmp

          Filesize

          64KB

        • memory/2080-990-0x0000000007750000-0x000000000779B000-memory.dmp

          Filesize

          300KB

        • memory/4816-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4816-150-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-165-0x0000000004960000-0x0000000004970000-memory.dmp

          Filesize

          64KB

        • memory/4816-164-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-162-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-160-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-133-0x0000000004960000-0x0000000004970000-memory.dmp

          Filesize

          64KB

        • memory/4816-158-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-136-0x0000000004940000-0x0000000004958000-memory.dmp

          Filesize

          96KB

        • memory/4816-156-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-168-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/4816-166-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/4816-148-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-146-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-144-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-142-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-140-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-138-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-137-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-154-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-131-0x0000000002170000-0x000000000218A000-memory.dmp

          Filesize

          104KB

        • memory/4816-152-0x0000000004940000-0x0000000004953000-memory.dmp

          Filesize

          76KB

        • memory/4816-135-0x0000000004970000-0x0000000004E6E000-memory.dmp

          Filesize

          5.0MB

        • memory/4816-134-0x0000000004960000-0x0000000004970000-memory.dmp

          Filesize

          64KB