Analysis
-
max time kernel
147s -
max time network
94s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
17/04/2023, 02:50
Static task
static1
General
-
Target
1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe
-
Size
952KB
-
MD5
61cd0d501349d416cefb89e186a8a590
-
SHA1
e8ea21acdfea55be1ce8fa43858e330ee06d59fe
-
SHA256
1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970
-
SHA512
21dcc770a6b679b9c87157091f14ba928116b50c0a983adad777b7930097a4bff642fefc3e87b8996f723a75bdaa966d515749ff08d4c64898e9e4efabeca8af
-
SSDEEP
24576:9yI+4g+kKR5mwq9CKCAodA4ppZXaTMPaNBcA/2Z1p:Yc3fmJUzAo5rYqQA
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it139336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it139336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it139336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it139336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it139336.exe -
Executes dropped EXE 6 IoCs
pid Process 2564 zisO8839.exe 3088 ziZI0220.exe 4876 it139336.exe 5100 jr765399.exe 2288 kp518023.exe 4084 lr050917.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it139336.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisO8839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisO8839.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZI0220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziZI0220.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 428 4084 WerFault.exe 72 2496 4084 WerFault.exe 72 4872 4084 WerFault.exe 72 3552 4084 WerFault.exe 72 3948 4084 WerFault.exe 72 4568 4084 WerFault.exe 72 4604 4084 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4876 it139336.exe 4876 it139336.exe 5100 jr765399.exe 5100 jr765399.exe 2288 kp518023.exe 2288 kp518023.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4876 it139336.exe Token: SeDebugPrivilege 5100 jr765399.exe Token: SeDebugPrivilege 2288 kp518023.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2564 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 66 PID 2476 wrote to memory of 2564 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 66 PID 2476 wrote to memory of 2564 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 66 PID 2564 wrote to memory of 3088 2564 zisO8839.exe 67 PID 2564 wrote to memory of 3088 2564 zisO8839.exe 67 PID 2564 wrote to memory of 3088 2564 zisO8839.exe 67 PID 3088 wrote to memory of 4876 3088 ziZI0220.exe 68 PID 3088 wrote to memory of 4876 3088 ziZI0220.exe 68 PID 3088 wrote to memory of 5100 3088 ziZI0220.exe 69 PID 3088 wrote to memory of 5100 3088 ziZI0220.exe 69 PID 3088 wrote to memory of 5100 3088 ziZI0220.exe 69 PID 2564 wrote to memory of 2288 2564 zisO8839.exe 71 PID 2564 wrote to memory of 2288 2564 zisO8839.exe 71 PID 2564 wrote to memory of 2288 2564 zisO8839.exe 71 PID 2476 wrote to memory of 4084 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 72 PID 2476 wrote to memory of 4084 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 72 PID 2476 wrote to memory of 4084 2476 1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe"C:\Users\Admin\AppData\Local\Temp\1f11ac69bf303e1859b93870461eb4f1c5d8dc3e673baabb20de3aa1917d1970.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisO8839.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisO8839.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziZI0220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziZI0220.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it139336.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it139336.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr765399.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr765399.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp518023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp518023.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr050917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr050917.exe2⤵
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 1923⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7003⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8363⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8483⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8843⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7403⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 10603⤵
- Program crash
PID:4604
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5b54f44726399ff80bda16cb45c3c3173
SHA1edd872b8a16b8845728084174a73d96362e85179
SHA256300097deea9d2f2e51f3cae1ca3e9c3d2af9e34e02ea7ef9b26df4fc474937be
SHA51222265dadaf203228d3ad9cecfe5402f67efa907bd4db50033710843bfa4cb38b449374ba75d8599a194c243f4d668ec368043bfa335f0e3660be3231008124f2
-
Filesize
395KB
MD5b54f44726399ff80bda16cb45c3c3173
SHA1edd872b8a16b8845728084174a73d96362e85179
SHA256300097deea9d2f2e51f3cae1ca3e9c3d2af9e34e02ea7ef9b26df4fc474937be
SHA51222265dadaf203228d3ad9cecfe5402f67efa907bd4db50033710843bfa4cb38b449374ba75d8599a194c243f4d668ec368043bfa335f0e3660be3231008124f2
-
Filesize
624KB
MD5d568829f9ea1152f46596650f3986c09
SHA1fae985dbd268f8d2383968b62fa655688421842d
SHA25687600a3373dd413486282ca124462553ad226fdb97f3206a47f7485c69bb6df2
SHA512a7f67f1d00710038495c31d15e1771da4847a87250a90acdf557291a017c17641d1019252a4b18627e4d701d77c0591f412709fe9ab7a0b326a75b75e04a18ca
-
Filesize
624KB
MD5d568829f9ea1152f46596650f3986c09
SHA1fae985dbd268f8d2383968b62fa655688421842d
SHA25687600a3373dd413486282ca124462553ad226fdb97f3206a47f7485c69bb6df2
SHA512a7f67f1d00710038495c31d15e1771da4847a87250a90acdf557291a017c17641d1019252a4b18627e4d701d77c0591f412709fe9ab7a0b326a75b75e04a18ca
-
Filesize
136KB
MD5359db2338ae0f977dcf10e90cf9816fb
SHA194126cb670e5f434e555c991c967e0ee98fae552
SHA2565f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc
SHA512d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc
-
Filesize
136KB
MD5359db2338ae0f977dcf10e90cf9816fb
SHA194126cb670e5f434e555c991c967e0ee98fae552
SHA2565f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc
SHA512d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc
-
Filesize
470KB
MD5d06d29320b371463f4e60138be988026
SHA1d5eab7c94711e40b1645cf0cd4fa468519772f1d
SHA25676a174033a1c8948d0d0ea545b26528ed77058d00ddb971ab716fdbaed80bd41
SHA51240d6adc78d841c6ae9a4787f861df3fcf80f813b529f928f20c8c017ecfbdaf1237804d3dd23db0af0b2510120be03c7a911c1b0d4b72ad8685cba96b89fd082
-
Filesize
470KB
MD5d06d29320b371463f4e60138be988026
SHA1d5eab7c94711e40b1645cf0cd4fa468519772f1d
SHA25676a174033a1c8948d0d0ea545b26528ed77058d00ddb971ab716fdbaed80bd41
SHA51240d6adc78d841c6ae9a4787f861df3fcf80f813b529f928f20c8c017ecfbdaf1237804d3dd23db0af0b2510120be03c7a911c1b0d4b72ad8685cba96b89fd082
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD5eca02c3627603cd84f2c9f4a4deffbe7
SHA1cb3f24477c98df97ead7f35f6ed0b7ad6b6ec69d
SHA2567f401fb7d98908fef97ca9cf85a1d77aa04847655c628e0388e7431981150f0b
SHA512785deb0f0a8b00ed8754e2aad52639d0f93e3c03de2e6debe43341d2f619201bb29bab868c0ed487d42b863ba0470897fc7d9e56b1038f0eb4a716140a38ef0f
-
Filesize
486KB
MD5eca02c3627603cd84f2c9f4a4deffbe7
SHA1cb3f24477c98df97ead7f35f6ed0b7ad6b6ec69d
SHA2567f401fb7d98908fef97ca9cf85a1d77aa04847655c628e0388e7431981150f0b
SHA512785deb0f0a8b00ed8754e2aad52639d0f93e3c03de2e6debe43341d2f619201bb29bab868c0ed487d42b863ba0470897fc7d9e56b1038f0eb4a716140a38ef0f