Analysis

  • max time kernel
    149s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-05-2023 14:43

General

  • Target

    4caf5468e8a46f74f7b83ae0dec18df6e3b429514865535826eaad39d7317e5a.exe

  • Size

    599KB

  • MD5

    5f9e6d79f4e98b44738e71f8ec152577

  • SHA1

    f893ea9940a4e78933384a67665227dbb39ab578

  • SHA256

    4caf5468e8a46f74f7b83ae0dec18df6e3b429514865535826eaad39d7317e5a

  • SHA512

    683ab2550b499201ef98df7347eb170fe4a1f87876e184df083146f4c415acc9e7b6059e16f17947c54a67857a47414a3a0b46146abc063b043f8cc0a1852138

  • SSDEEP

    12288:rMrxy90qmFurzmXK1WH6dIuegNyTWmH+mAMBp+CuugbwHWyizvRW:eyKWmwiDueg4TWocSbfg82VzvU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4caf5468e8a46f74f7b83ae0dec18df6e3b429514865535826eaad39d7317e5a.exe
    "C:\Users\Admin\AppData\Local\Temp\4caf5468e8a46f74f7b83ae0dec18df6e3b429514865535826eaad39d7317e5a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3447823.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3447823.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5522078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5522078.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7701350.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7701350.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1481779.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1481779.exe
      2⤵
      • Executes dropped EXE
      PID:3540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 624
        3⤵
        • Program crash
        PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 704
        3⤵
        • Program crash
        PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 844
        3⤵
        • Program crash
        PID:4176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 852
        3⤵
        • Program crash
        PID:4132
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 880
        3⤵
        • Program crash
        PID:3240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 844
        3⤵
        • Program crash
        PID:2704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 1128
        3⤵
        • Program crash
        PID:4412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 1200
        3⤵
        • Program crash
        PID:4436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 1076
        3⤵
        • Program crash
        PID:4884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1481779.exe

    Filesize

    340KB

    MD5

    ee9ff7e04fe8bfd0ab3b16c2af330b74

    SHA1

    d8484bb6a70de4390464132614aea9f10f29f7d0

    SHA256

    c9c9769523898d67eeb24cd6f672108964767f11d49e01b969510660fa2a4e0e

    SHA512

    cb84a0e0e6b57213eb59bbc45d58bb0f3c44160394de05554fe5fa045ae1d76439ce8252ed305937239b54c5d4f92c8515d31dd212e909491cdf5bc02624b4a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1481779.exe

    Filesize

    340KB

    MD5

    ee9ff7e04fe8bfd0ab3b16c2af330b74

    SHA1

    d8484bb6a70de4390464132614aea9f10f29f7d0

    SHA256

    c9c9769523898d67eeb24cd6f672108964767f11d49e01b969510660fa2a4e0e

    SHA512

    cb84a0e0e6b57213eb59bbc45d58bb0f3c44160394de05554fe5fa045ae1d76439ce8252ed305937239b54c5d4f92c8515d31dd212e909491cdf5bc02624b4a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3447823.exe

    Filesize

    307KB

    MD5

    ab5f79f642f7b6411382c26856d33ce7

    SHA1

    d8311f6698530feaa52b36d575b17616adf93b43

    SHA256

    82a302bfaeadafbaa47d422474fa737e92e8aeea217c6ce78adfde089e44e840

    SHA512

    cd7e553dee1210c9a900404e52cee16ae59e81671468b00c84016b9e4a563462365ef91064d2eb25500c6a286ff603c3c1960c9d8fddc61de93202a9bd4cfe7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3447823.exe

    Filesize

    307KB

    MD5

    ab5f79f642f7b6411382c26856d33ce7

    SHA1

    d8311f6698530feaa52b36d575b17616adf93b43

    SHA256

    82a302bfaeadafbaa47d422474fa737e92e8aeea217c6ce78adfde089e44e840

    SHA512

    cd7e553dee1210c9a900404e52cee16ae59e81671468b00c84016b9e4a563462365ef91064d2eb25500c6a286ff603c3c1960c9d8fddc61de93202a9bd4cfe7e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5522078.exe

    Filesize

    136KB

    MD5

    b54a4b8de94e97f6095c6b8061429bf1

    SHA1

    812a90de2b2f334906ca0c851d21d0a1c9526610

    SHA256

    f071d4000bbd9c4518ceb4a746f5730f6e5f6c92bd72be2de8c94c64afb85afb

    SHA512

    a24472f653cc0af485cddc9d9e27fabed890add49a6ac2de350dbbd6f44365334dfb829ce5c6257b02edd50555d117a6e0723ab280969c1f79229e7bbb9e904b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5522078.exe

    Filesize

    136KB

    MD5

    b54a4b8de94e97f6095c6b8061429bf1

    SHA1

    812a90de2b2f334906ca0c851d21d0a1c9526610

    SHA256

    f071d4000bbd9c4518ceb4a746f5730f6e5f6c92bd72be2de8c94c64afb85afb

    SHA512

    a24472f653cc0af485cddc9d9e27fabed890add49a6ac2de350dbbd6f44365334dfb829ce5c6257b02edd50555d117a6e0723ab280969c1f79229e7bbb9e904b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7701350.exe

    Filesize

    175KB

    MD5

    5b80d66346eb624a726cfbff2b060e91

    SHA1

    6061c09ca04ace351574f14e3eec0552e426006a

    SHA256

    0a53d847c5f0f1ef960cb259d1b718eaf3bb392fff80797829ce1607ff24e122

    SHA512

    90d338a1f8e2cb86802f3219e367f3ed1703e956ae47ebdeef47b91a1e198ec329a4a0452872f4ced7b961a5fb6ec093b339d24cb3c0be7209748a7a01ff0475

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7701350.exe

    Filesize

    175KB

    MD5

    5b80d66346eb624a726cfbff2b060e91

    SHA1

    6061c09ca04ace351574f14e3eec0552e426006a

    SHA256

    0a53d847c5f0f1ef960cb259d1b718eaf3bb392fff80797829ce1607ff24e122

    SHA512

    90d338a1f8e2cb86802f3219e367f3ed1703e956ae47ebdeef47b91a1e198ec329a4a0452872f4ced7b961a5fb6ec093b339d24cb3c0be7209748a7a01ff0475

  • memory/2792-167-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/2792-178-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-182-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-171-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/2792-174-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-176-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-180-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-172-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-170-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/2792-168-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-165-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-163-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-161-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-150-0x0000000002010000-0x000000000202A000-memory.dmp

    Filesize

    104KB

  • memory/2792-151-0x00000000023C0000-0x00000000023D8000-memory.dmp

    Filesize

    96KB

  • memory/2792-153-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-152-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-155-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-157-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2792-159-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/3540-188-0x00000000006F0000-0x0000000000725000-memory.dmp

    Filesize

    212KB

  • memory/3540-189-0x0000000000400000-0x00000000006EF000-memory.dmp

    Filesize

    2.9MB

  • memory/4992-136-0x0000000007880000-0x00000000078CB000-memory.dmp

    Filesize

    300KB

  • memory/4992-140-0x0000000008740000-0x00000000087D2000-memory.dmp

    Filesize

    584KB

  • memory/4992-143-0x0000000008800000-0x000000000881E000-memory.dmp

    Filesize

    120KB

  • memory/4992-133-0x00000000077B0000-0x00000000077C2000-memory.dmp

    Filesize

    72KB

  • memory/4992-142-0x0000000008890000-0x0000000008906000-memory.dmp

    Filesize

    472KB

  • memory/4992-141-0x00000000086F0000-0x0000000008740000-memory.dmp

    Filesize

    320KB

  • memory/4992-134-0x00000000078E0000-0x00000000079EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4992-144-0x0000000009230000-0x00000000093F2000-memory.dmp

    Filesize

    1.8MB

  • memory/4992-139-0x0000000008B60000-0x000000000905E000-memory.dmp

    Filesize

    5.0MB

  • memory/4992-138-0x0000000007B70000-0x0000000007BD6000-memory.dmp

    Filesize

    408KB

  • memory/4992-137-0x00000000077F0000-0x0000000007800000-memory.dmp

    Filesize

    64KB

  • memory/4992-132-0x0000000007D10000-0x0000000008316000-memory.dmp

    Filesize

    6.0MB

  • memory/4992-131-0x0000000000AD0000-0x0000000000AF8000-memory.dmp

    Filesize

    160KB

  • memory/4992-145-0x0000000009930000-0x0000000009E5C000-memory.dmp

    Filesize

    5.2MB

  • memory/4992-135-0x0000000007840000-0x000000000787E000-memory.dmp

    Filesize

    248KB