Analysis
-
max time kernel
292s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/04/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe
Resource
win7-20230220-en
General
-
Target
a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe
-
Size
942KB
-
MD5
8c1f2edf0dc7219da7010a77fe30d912
-
SHA1
80be7a6f9852caf3b97534ac468a43ca3db2fbf3
-
SHA256
a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c
-
SHA512
5f2a18a6c4f823727d25d1b1e73487654959d5a67c8d86ff32ce8a6e1e706946e31bac9a794f90c0ee54bfd1d3af2978eeef7d1ae1092784f098b4e0da9e5dde
-
SSDEEP
24576:Zy46RBgqejFKOjzBKJ9tnTHCRSFZl0g7HQPO:M4sBekOxiLPl0uQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it248063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it248063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it248063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it248063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it248063.exe -
Executes dropped EXE 6 IoCs
pid Process 1584 ziRv6854.exe 1820 zibt8045.exe 2036 it248063.exe 4428 jr066369.exe 68 kp437963.exe 1588 lr115480.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it248063.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zibt8045.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRv6854.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRv6854.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zibt8045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4424 1588 WerFault.exe 72 1556 1588 WerFault.exe 72 2876 1588 WerFault.exe 72 3884 1588 WerFault.exe 72 4796 1588 WerFault.exe 72 4856 1588 WerFault.exe 72 4596 1588 WerFault.exe 72 1512 1588 WerFault.exe 72 4284 1588 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 it248063.exe 2036 it248063.exe 4428 jr066369.exe 4428 jr066369.exe 68 kp437963.exe 68 kp437963.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2036 it248063.exe Token: SeDebugPrivilege 4428 jr066369.exe Token: SeDebugPrivilege 68 kp437963.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1584 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 66 PID 4952 wrote to memory of 1584 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 66 PID 4952 wrote to memory of 1584 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 66 PID 1584 wrote to memory of 1820 1584 ziRv6854.exe 67 PID 1584 wrote to memory of 1820 1584 ziRv6854.exe 67 PID 1584 wrote to memory of 1820 1584 ziRv6854.exe 67 PID 1820 wrote to memory of 2036 1820 zibt8045.exe 68 PID 1820 wrote to memory of 2036 1820 zibt8045.exe 68 PID 1820 wrote to memory of 4428 1820 zibt8045.exe 69 PID 1820 wrote to memory of 4428 1820 zibt8045.exe 69 PID 1820 wrote to memory of 4428 1820 zibt8045.exe 69 PID 1584 wrote to memory of 68 1584 ziRv6854.exe 71 PID 1584 wrote to memory of 68 1584 ziRv6854.exe 71 PID 1584 wrote to memory of 68 1584 ziRv6854.exe 71 PID 4952 wrote to memory of 1588 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 72 PID 4952 wrote to memory of 1588 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 72 PID 4952 wrote to memory of 1588 4952 a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe"C:\Users\Admin\AppData\Local\Temp\a1f4a75bf71db2ca8a590c616f6cc3fd72bb37747bd1bdafa8c22047d0208c4c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRv6854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRv6854.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibt8045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibt8045.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it248063.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it248063.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr066369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr066369.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp437963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp437963.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:68
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr115480.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr115480.exe2⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 6203⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7003⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 8003⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 8483⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9003⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 8683⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 11283⤵
- Program crash
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 11603⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 10723⤵
- Program crash
PID:4284
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5da8fa27c0d1e7ee3855aef315957461e
SHA13b847d83099e3c3ff4628549deb0ff98712fafc9
SHA256fe1fa4271fa2e955d24e7efe6115a7a99080112fc9b404810b24696b001e672a
SHA512d39c93d770aaf9492bd4f0c2857c9bb760bef1d86419206916c37bdd812c7d173fe2808710b6e9f9e5caf73bb0d53e8804f54ce1706d0e3eebf311cdaae88bc8
-
Filesize
396KB
MD5da8fa27c0d1e7ee3855aef315957461e
SHA13b847d83099e3c3ff4628549deb0ff98712fafc9
SHA256fe1fa4271fa2e955d24e7efe6115a7a99080112fc9b404810b24696b001e672a
SHA512d39c93d770aaf9492bd4f0c2857c9bb760bef1d86419206916c37bdd812c7d173fe2808710b6e9f9e5caf73bb0d53e8804f54ce1706d0e3eebf311cdaae88bc8
-
Filesize
620KB
MD5313bbae1fe7d0a2f0e7f16a6281636c9
SHA149e3c41a9dd2c171a2ae953d66597475db21987f
SHA25609b87f1b4b9acfa1e938120773a39548bde2f9ccf4a081770340ab218f6525db
SHA5129dffdd2f5539db0b4e48dec8f3721c36c65f623e5983a69d5329532fd811460139109c930e32ed0a0509382184366edd864bc17049ae35ce3e0ccd3bc129c560
-
Filesize
620KB
MD5313bbae1fe7d0a2f0e7f16a6281636c9
SHA149e3c41a9dd2c171a2ae953d66597475db21987f
SHA25609b87f1b4b9acfa1e938120773a39548bde2f9ccf4a081770340ab218f6525db
SHA5129dffdd2f5539db0b4e48dec8f3721c36c65f623e5983a69d5329532fd811460139109c930e32ed0a0509382184366edd864bc17049ae35ce3e0ccd3bc129c560
-
Filesize
136KB
MD5e7ae347f87257ec8c1177220be5cbfc1
SHA1d721e86ae2c268a7e42662987bfcd9ffe11ca0f2
SHA256733ccbf30055b9a527cc190ef42c803e4cb757572e24bae502298b09361bfd76
SHA5128b61ab2ba8646293e8f279ceed7044136f5a51c93b6af715ead76a6d82b8b39d05440771adae7d407d9458de1df45d7c430b8b8251c1ca69461ea9b555480f78
-
Filesize
136KB
MD5e7ae347f87257ec8c1177220be5cbfc1
SHA1d721e86ae2c268a7e42662987bfcd9ffe11ca0f2
SHA256733ccbf30055b9a527cc190ef42c803e4cb757572e24bae502298b09361bfd76
SHA5128b61ab2ba8646293e8f279ceed7044136f5a51c93b6af715ead76a6d82b8b39d05440771adae7d407d9458de1df45d7c430b8b8251c1ca69461ea9b555480f78
-
Filesize
466KB
MD5a8a42256b24eba2d410ec111770f9992
SHA19c2783478dc3e06288ca93f4152899d58a5d1d9f
SHA2568a8920270e5be7ea4ea6d60911765ed1e3c6e00dc2f2283356cdd6bcdaa94b2c
SHA512094d61113a2613e705a2150f5145885b7a4f403672bf613872d975b313e19e94eedf77040390afa542c226726d3441ef5d68ddabf4497d38606cae950207bf80
-
Filesize
466KB
MD5a8a42256b24eba2d410ec111770f9992
SHA19c2783478dc3e06288ca93f4152899d58a5d1d9f
SHA2568a8920270e5be7ea4ea6d60911765ed1e3c6e00dc2f2283356cdd6bcdaa94b2c
SHA512094d61113a2613e705a2150f5145885b7a4f403672bf613872d975b313e19e94eedf77040390afa542c226726d3441ef5d68ddabf4497d38606cae950207bf80
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD5af3e73334d677475e8b855bd9a2e4bc7
SHA104f928072a1fb2c8f4679f16afa62952b0c0604f
SHA256eaca8ce359f4193036584d018fc6cf13b8b1e3b836ac9ba810da80713942e08c
SHA5125ebaaba72c625b6a526624dcce492a30ce56c9d4253cafa580b4812587c16e1b262c6346991afa3a7663c2a3a39cfa90b23060a8af487eea21f32d8c81608a9c
-
Filesize
486KB
MD5af3e73334d677475e8b855bd9a2e4bc7
SHA104f928072a1fb2c8f4679f16afa62952b0c0604f
SHA256eaca8ce359f4193036584d018fc6cf13b8b1e3b836ac9ba810da80713942e08c
SHA5125ebaaba72c625b6a526624dcce492a30ce56c9d4253cafa580b4812587c16e1b262c6346991afa3a7663c2a3a39cfa90b23060a8af487eea21f32d8c81608a9c