Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2023 16:15

General

  • Target

    6df2db1e539063d39d23b4efa97966ac1a568b4d1e6dd17e351b48ecd170d5f0.exe

  • Size

    353KB

  • MD5

    0d9edf4d071ffcdda7a8c68bd21c0d45

  • SHA1

    21912d2e4610644ce689eda447ce4773c8d5b50f

  • SHA256

    6df2db1e539063d39d23b4efa97966ac1a568b4d1e6dd17e351b48ecd170d5f0

  • SHA512

    cf6b382280f49d87b833624ae65d5942ac62dc33b17a80edf3f481458664d745abaa8310e23850d0c3cfb296d2515e6b44fbdb4644335632d5bf3703e96999e6

  • SSDEEP

    6144:MkeQ1VK2AnUnlRESnLE2bV0m3XqVwTPcJRCD1yjirZ4QnQ:J1V7qQDESL/vkJPQ6QQ

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6df2db1e539063d39d23b4efa97966ac1a568b4d1e6dd17e351b48ecd170d5f0.exe
    "C:\Users\Admin\AppData\Local\Temp\6df2db1e539063d39d23b4efa97966ac1a568b4d1e6dd17e351b48ecd170d5f0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 1664
      2⤵
      • Program crash
      PID:4024
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4560 -ip 4560
    1⤵
      PID:116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4560-134-0x0000000002E60000-0x0000000002F60000-memory.dmp

      Filesize

      1024KB

    • memory/4560-135-0x0000000002E10000-0x0000000002E4D000-memory.dmp

      Filesize

      244KB

    • memory/4560-136-0x0000000000400000-0x0000000002B64000-memory.dmp

      Filesize

      39.4MB

    • memory/4560-137-0x0000000074790000-0x0000000074F40000-memory.dmp

      Filesize

      7.7MB

    • memory/4560-138-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/4560-139-0x00000000073E0000-0x0000000007984000-memory.dmp

      Filesize

      5.6MB

    • memory/4560-140-0x0000000007990000-0x0000000007FA8000-memory.dmp

      Filesize

      6.1MB

    • memory/4560-141-0x0000000007330000-0x0000000007342000-memory.dmp

      Filesize

      72KB

    • memory/4560-142-0x0000000007FB0000-0x00000000080BA000-memory.dmp

      Filesize

      1.0MB

    • memory/4560-143-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/4560-144-0x0000000007390000-0x00000000073CC000-memory.dmp

      Filesize

      240KB

    • memory/4560-145-0x0000000002E60000-0x0000000002F60000-memory.dmp

      Filesize

      1024KB

    • memory/4560-147-0x0000000008350000-0x00000000083B6000-memory.dmp

      Filesize

      408KB

    • memory/4560-146-0x0000000000400000-0x0000000002B64000-memory.dmp

      Filesize

      39.4MB

    • memory/4560-148-0x0000000002E10000-0x0000000002E4D000-memory.dmp

      Filesize

      244KB

    • memory/4560-149-0x0000000008B50000-0x0000000008BE2000-memory.dmp

      Filesize

      584KB

    • memory/4560-150-0x0000000074790000-0x0000000074F40000-memory.dmp

      Filesize

      7.7MB

    • memory/4560-151-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/4560-152-0x0000000008C30000-0x0000000008CA6000-memory.dmp

      Filesize

      472KB

    • memory/4560-153-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/4560-154-0x0000000008CE0000-0x0000000008CFE000-memory.dmp

      Filesize

      120KB

    • memory/4560-155-0x0000000008D90000-0x0000000008F52000-memory.dmp

      Filesize

      1.8MB

    • memory/4560-156-0x0000000008F80000-0x00000000094AC000-memory.dmp

      Filesize

      5.2MB

    • memory/4560-157-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/4560-159-0x0000000000400000-0x0000000002B64000-memory.dmp

      Filesize

      39.4MB

    • memory/4560-161-0x0000000074790000-0x0000000074F40000-memory.dmp

      Filesize

      7.7MB