Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 20:39

General

  • Target

    b6fadb96222a98a47d26771e4149f8f344290f186a79e7b58270cb7f61577cc4.exe

  • Size

    690KB

  • MD5

    7a852d49e8b2c954a865cc7e71463a1c

  • SHA1

    73e641823f67c102bf42ffb05ece6c275c3b548f

  • SHA256

    b6fadb96222a98a47d26771e4149f8f344290f186a79e7b58270cb7f61577cc4

  • SHA512

    dcc2f8ed56f46936220dfb81a63aba0de9f99502781c80da3c8699304618827cc8f1cd65020c9ac280f9a7cd543f96af7d92e1c91fd3ce1edc23d910a9f023fd

  • SSDEEP

    12288:7y908axVWxVBkfRk/LCRfz6DkaGiniNjm3JWit8UaA/2:7y4x4jGRwCRL6k3Nqx6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6fadb96222a98a47d26771e4149f8f344290f186a79e7b58270cb7f61577cc4.exe
    "C:\Users\Admin\AppData\Local\Temp\b6fadb96222a98a47d26771e4149f8f344290f186a79e7b58270cb7f61577cc4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132014.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132014.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97872417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97872417.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk245286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk245286.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420129.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420129.exe

    Filesize

    136KB

    MD5

    a953cc19a185562f06b0adce0759c529

    SHA1

    a16a8de56d60debdade34f6cc5d12c61108ea5f3

    SHA256

    9606b81e315089a88b32a208ef6103c654cc2e36a19e331a43912365bd87f383

    SHA512

    f4d34902caa9fcda3194b5b8ae01260f15091514983354c1f04700b71c5b83589686dee2fd6fbe7f3258dd283cac92916afe316e801a0c1d2194b2636a8517ed

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si420129.exe

    Filesize

    136KB

    MD5

    a953cc19a185562f06b0adce0759c529

    SHA1

    a16a8de56d60debdade34f6cc5d12c61108ea5f3

    SHA256

    9606b81e315089a88b32a208ef6103c654cc2e36a19e331a43912365bd87f383

    SHA512

    f4d34902caa9fcda3194b5b8ae01260f15091514983354c1f04700b71c5b83589686dee2fd6fbe7f3258dd283cac92916afe316e801a0c1d2194b2636a8517ed

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132014.exe

    Filesize

    536KB

    MD5

    6fae8e2bd4fa7814edddd6151cfd0d3e

    SHA1

    cb83e42e5aaa92ccc94e2f7636e866f8946916d0

    SHA256

    8d57858e43586c998b53b720e924adde240ef3b4cd86b9f2b7cab5c87679b004

    SHA512

    e027fedd7aef030921e0e5828cc571b3cf115376fde422e91eb2964ac6b783631def6724dc2288e80ae37d91a9616288555e856b9a5de690e7fc8eccdcab7388

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un132014.exe

    Filesize

    536KB

    MD5

    6fae8e2bd4fa7814edddd6151cfd0d3e

    SHA1

    cb83e42e5aaa92ccc94e2f7636e866f8946916d0

    SHA256

    8d57858e43586c998b53b720e924adde240ef3b4cd86b9f2b7cab5c87679b004

    SHA512

    e027fedd7aef030921e0e5828cc571b3cf115376fde422e91eb2964ac6b783631def6724dc2288e80ae37d91a9616288555e856b9a5de690e7fc8eccdcab7388

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97872417.exe

    Filesize

    258KB

    MD5

    f17b8a6c175a4c19c9bb72b03f7aacd1

    SHA1

    732b132567f222d22aab3b886273bb7eece2f966

    SHA256

    034e8b0aa8c2d0a763a9365e8088b6f2d36cbc30dc066b45dee7aa4d7cfea69a

    SHA512

    2cb17ec6569a8b2e378b7d8297fa182cf772506f46b44710baf33dbe20c408e2640ec0501524649f929b1b196696fe775c034194d01df4d95351645160dedd29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97872417.exe

    Filesize

    258KB

    MD5

    f17b8a6c175a4c19c9bb72b03f7aacd1

    SHA1

    732b132567f222d22aab3b886273bb7eece2f966

    SHA256

    034e8b0aa8c2d0a763a9365e8088b6f2d36cbc30dc066b45dee7aa4d7cfea69a

    SHA512

    2cb17ec6569a8b2e378b7d8297fa182cf772506f46b44710baf33dbe20c408e2640ec0501524649f929b1b196696fe775c034194d01df4d95351645160dedd29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk245286.exe

    Filesize

    341KB

    MD5

    9245462f1c371ed69efc8609afd259cb

    SHA1

    30a9f8ad7077744b94c879127d07ac3e1a8cce57

    SHA256

    a3da94d94ea1261d55ec3b46a2a30573428bc6280fe101b5b44efde202f7e352

    SHA512

    1725fe3ac92e54240985f0af2a3226882108ac75683caf14b34c8459102afd7fbfd5e94c1ac91051e06a0c08fc94c5b9fda789b1d032209eb4417b20bbbe7573

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk245286.exe

    Filesize

    341KB

    MD5

    9245462f1c371ed69efc8609afd259cb

    SHA1

    30a9f8ad7077744b94c879127d07ac3e1a8cce57

    SHA256

    a3da94d94ea1261d55ec3b46a2a30573428bc6280fe101b5b44efde202f7e352

    SHA512

    1725fe3ac92e54240985f0af2a3226882108ac75683caf14b34c8459102afd7fbfd5e94c1ac91051e06a0c08fc94c5b9fda789b1d032209eb4417b20bbbe7573

  • memory/1804-998-0x0000000007BE0000-0x0000000007BF0000-memory.dmp

    Filesize

    64KB

  • memory/1804-997-0x0000000007BF0000-0x0000000007C3B000-memory.dmp

    Filesize

    300KB

  • memory/1804-996-0x0000000000E30000-0x0000000000E58000-memory.dmp

    Filesize

    160KB

  • memory/3740-217-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-979-0x0000000007AB0000-0x0000000007AC2000-memory.dmp

    Filesize

    72KB

  • memory/3740-990-0x0000000008B80000-0x00000000090AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3740-989-0x00000000089B0000-0x0000000008B72000-memory.dmp

    Filesize

    1.8MB

  • memory/3740-988-0x0000000008870000-0x000000000888E000-memory.dmp

    Filesize

    120KB

  • memory/3740-987-0x00000000086E0000-0x0000000008756000-memory.dmp

    Filesize

    472KB

  • memory/3740-986-0x0000000008690000-0x00000000086E0000-memory.dmp

    Filesize

    320KB

  • memory/3740-985-0x00000000085F0000-0x0000000008682000-memory.dmp

    Filesize

    584KB

  • memory/3740-984-0x0000000007F10000-0x0000000007F76000-memory.dmp

    Filesize

    408KB

  • memory/3740-983-0x0000000007C80000-0x0000000007CCB000-memory.dmp

    Filesize

    300KB

  • memory/3740-982-0x0000000007C00000-0x0000000007C3E000-memory.dmp

    Filesize

    248KB

  • memory/3740-981-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3740-980-0x0000000007AE0000-0x0000000007BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3740-978-0x0000000007410000-0x0000000007A16000-memory.dmp

    Filesize

    6.0MB

  • memory/3740-219-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-215-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-213-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-211-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-209-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-207-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-205-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-203-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-181-0x0000000002510000-0x000000000254C000-memory.dmp

    Filesize

    240KB

  • memory/3740-182-0x0000000000720000-0x0000000000766000-memory.dmp

    Filesize

    280KB

  • memory/3740-183-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3740-185-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3740-184-0x0000000004F10000-0x0000000004F4A000-memory.dmp

    Filesize

    232KB

  • memory/3740-186-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-187-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-189-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-191-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-193-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-195-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-197-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-199-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/3740-201-0x0000000004F10000-0x0000000004F45000-memory.dmp

    Filesize

    212KB

  • memory/4248-166-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4248-176-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4248-174-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-173-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-172-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-171-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4248-142-0x0000000004990000-0x00000000049A8000-memory.dmp

    Filesize

    96KB

  • memory/4248-164-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-168-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-144-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-160-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-143-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-141-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-170-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-158-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-156-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-154-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-152-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-150-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-148-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-146-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-139-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-140-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/4248-162-0x0000000004990000-0x00000000049A3000-memory.dmp

    Filesize

    76KB

  • memory/4248-137-0x00000000049F0000-0x0000000004EEE000-memory.dmp

    Filesize

    5.0MB

  • memory/4248-136-0x00000000006A0000-0x00000000006BA000-memory.dmp

    Filesize

    104KB