Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 02:36
Static task
static1
General
-
Target
a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe
-
Size
843KB
-
MD5
3b246add624f430ecb66e0d44c25b179
-
SHA1
53bb9370a265269343b822bb60453cab55d2f1a0
-
SHA256
a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4
-
SHA512
f8b37fdd2003fc84c786cae91657ed3a54aa12e9e342565896c1bfaf8c939178ba4be5bddc9c7daa312ba72f3fe69e85c5ef722d61abb289ab666c67322b623f
-
SSDEEP
24576:hy3lwKDjh7Hcue4rZ39bL36nRevVY/mYS:UCKD1y4939P6svOD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it808358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it808358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it808358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it808358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it808358.exe -
Executes dropped EXE 4 IoCs
pid Process 2508 zigJ5807.exe 2552 ziDy8395.exe 2996 it808358.exe 3900 jr841237.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it808358.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDy8395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDy8395.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigJ5807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigJ5807.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2996 it808358.exe 2996 it808358.exe 3900 jr841237.exe 3900 jr841237.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2996 it808358.exe Token: SeDebugPrivilege 3900 jr841237.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2508 2156 a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe 66 PID 2156 wrote to memory of 2508 2156 a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe 66 PID 2156 wrote to memory of 2508 2156 a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe 66 PID 2508 wrote to memory of 2552 2508 zigJ5807.exe 67 PID 2508 wrote to memory of 2552 2508 zigJ5807.exe 67 PID 2508 wrote to memory of 2552 2508 zigJ5807.exe 67 PID 2552 wrote to memory of 2996 2552 ziDy8395.exe 68 PID 2552 wrote to memory of 2996 2552 ziDy8395.exe 68 PID 2552 wrote to memory of 3900 2552 ziDy8395.exe 69 PID 2552 wrote to memory of 3900 2552 ziDy8395.exe 69 PID 2552 wrote to memory of 3900 2552 ziDy8395.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe"C:\Users\Admin\AppData\Local\Temp\a6ff42c1b0cacd1008382a5a62c52dbb065a7518e7aa5f63d3db0642b53d52b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigJ5807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigJ5807.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDy8395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDy8395.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it808358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it808358.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr841237.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr841237.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5588155679f7f77fa632c88204b962786
SHA127bec88c92bd69396c3bed0d6457b396c91dd7af
SHA256ed3a205289adbad87f38b6d276a2eee6fb07f4af59b13a62cda488b728e6b01e
SHA51235f37c7a11a39fc83a1645bc7893fb70c78af6a782fdc492e1ae15c17c267f35596c876f2aa121622292da383a9190a8ba5969ac16cad783a4e8ca6025d5be6b
-
Filesize
569KB
MD5588155679f7f77fa632c88204b962786
SHA127bec88c92bd69396c3bed0d6457b396c91dd7af
SHA256ed3a205289adbad87f38b6d276a2eee6fb07f4af59b13a62cda488b728e6b01e
SHA51235f37c7a11a39fc83a1645bc7893fb70c78af6a782fdc492e1ae15c17c267f35596c876f2aa121622292da383a9190a8ba5969ac16cad783a4e8ca6025d5be6b
-
Filesize
414KB
MD5e088a2a31ea4c8536950d11e76522c7e
SHA13060bfae91a080bd7fd91ba04a40ad132cfc7031
SHA256670be04d5d838c0c7bd7a7c3dda3178bb5a9da5f29285a95e72ae6c264563f94
SHA51282fcd0ecc68d0cbb9184379990abb82f4150df089290691f76508823085cfe89fa5a49dac8db6575921bdb403981453b8e3d454323bed124e69bb5d8ba4bc32c
-
Filesize
414KB
MD5e088a2a31ea4c8536950d11e76522c7e
SHA13060bfae91a080bd7fd91ba04a40ad132cfc7031
SHA256670be04d5d838c0c7bd7a7c3dda3178bb5a9da5f29285a95e72ae6c264563f94
SHA51282fcd0ecc68d0cbb9184379990abb82f4150df089290691f76508823085cfe89fa5a49dac8db6575921bdb403981453b8e3d454323bed124e69bb5d8ba4bc32c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD58a9a1257ec9a9fa8affae9f83491fc09
SHA1a9681bb711bd72d532de0aaf735c7e64c96869d5
SHA2564ad6ff00d049544b8f52ac892a5c14013d6539a0942393f1d5fd144d6f568cac
SHA512a3267b708f354f6586cd5a9e2cc599492644213eea4cbd7fce5e67660bb2f083d0b6f9045a9077ffb3b8ab55866400de2316297d590a8b959ac2c0e275fb4b97
-
Filesize
360KB
MD58a9a1257ec9a9fa8affae9f83491fc09
SHA1a9681bb711bd72d532de0aaf735c7e64c96869d5
SHA2564ad6ff00d049544b8f52ac892a5c14013d6539a0942393f1d5fd144d6f568cac
SHA512a3267b708f354f6586cd5a9e2cc599492644213eea4cbd7fce5e67660bb2f083d0b6f9045a9077ffb3b8ab55866400de2316297d590a8b959ac2c0e275fb4b97