Analysis
-
max time kernel
147s -
max time network
94s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 15:40
Static task
static1
General
-
Target
c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe
-
Size
938KB
-
MD5
7b6d20daf8022865d9202f70082a6e6a
-
SHA1
5133a4d60e51365ab5c242c4e2c77e26423b1f5e
-
SHA256
c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812
-
SHA512
fb07d634417251fe81f71eaf026a07a4ee1458007dc679918cb10d2561abec8638d3454b7c80c7248194a5fec2c8d1d7d24bad049a3c4650664eb44f43db245e
-
SSDEEP
24576:Iyi9zGqT22AIiNqwNIb+w3it1eeTjZOWY:PUzGc22DiNpIbotkeXkW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it717193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it717193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it717193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it717193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it717193.exe -
Executes dropped EXE 6 IoCs
pid Process 2592 zihm7247.exe 4392 ziyE7177.exe 4372 it717193.exe 1700 jr815395.exe 4180 kp130712.exe 3268 lr651506.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it717193.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihm7247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihm7247.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyE7177.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziyE7177.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4188 3268 WerFault.exe 72 4952 3268 WerFault.exe 72 4408 3268 WerFault.exe 72 4396 3268 WerFault.exe 72 68 3268 WerFault.exe 72 4384 3268 WerFault.exe 72 4500 3268 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4372 it717193.exe 4372 it717193.exe 1700 jr815395.exe 1700 jr815395.exe 4180 kp130712.exe 4180 kp130712.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4372 it717193.exe Token: SeDebugPrivilege 1700 jr815395.exe Token: SeDebugPrivilege 4180 kp130712.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2592 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 66 PID 3508 wrote to memory of 2592 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 66 PID 3508 wrote to memory of 2592 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 66 PID 2592 wrote to memory of 4392 2592 zihm7247.exe 67 PID 2592 wrote to memory of 4392 2592 zihm7247.exe 67 PID 2592 wrote to memory of 4392 2592 zihm7247.exe 67 PID 4392 wrote to memory of 4372 4392 ziyE7177.exe 68 PID 4392 wrote to memory of 4372 4392 ziyE7177.exe 68 PID 4392 wrote to memory of 1700 4392 ziyE7177.exe 69 PID 4392 wrote to memory of 1700 4392 ziyE7177.exe 69 PID 4392 wrote to memory of 1700 4392 ziyE7177.exe 69 PID 2592 wrote to memory of 4180 2592 zihm7247.exe 71 PID 2592 wrote to memory of 4180 2592 zihm7247.exe 71 PID 2592 wrote to memory of 4180 2592 zihm7247.exe 71 PID 3508 wrote to memory of 3268 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 72 PID 3508 wrote to memory of 3268 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 72 PID 3508 wrote to memory of 3268 3508 c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe"C:\Users\Admin\AppData\Local\Temp\c047a706773c518d59f2c2e0918b66261ea0ef7327933e11390a18f5cc5e4812.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7247.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyE7177.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it717193.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr815395.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp130712.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr651506.exe2⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 6243⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 7083⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 8443⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 8523⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 8803⤵
- Program crash
PID:68
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 8923⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10763⤵
- Program crash
PID:4500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
623KB
MD59fe7cf49f1bea7611b67f3b026bb8000
SHA1989db8075d6e0cca7cb6f0c78ad5e1baf6caff58
SHA256cb1c4e40386d183ecd8359ff41c061049632daf68f4a12c5b6b2401c92980370
SHA512c4c869a8cdc3463ae645ee26442301d64cdd649aaf3edee5dbd0012cc78b4358dfbc754928fced0a5cee959916f6e4e3260152a465e3608a55f8a45fecbbbdba
-
Filesize
623KB
MD59fe7cf49f1bea7611b67f3b026bb8000
SHA1989db8075d6e0cca7cb6f0c78ad5e1baf6caff58
SHA256cb1c4e40386d183ecd8359ff41c061049632daf68f4a12c5b6b2401c92980370
SHA512c4c869a8cdc3463ae645ee26442301d64cdd649aaf3edee5dbd0012cc78b4358dfbc754928fced0a5cee959916f6e4e3260152a465e3608a55f8a45fecbbbdba
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
469KB
MD57a9df90eb50724800431a27af60ca63d
SHA19363280e0aa0f1b680c8b1504193a87c5ddfd5ab
SHA256e168092014997a8ce0558f17ea2625974c5b351b9474c77ac74011c623a0a02b
SHA5124afc7861892edbb3cb6fa7379bc05aa9ce2c973a58dd66695c197f18c6b18743c6ef689f5aa22d1fad32f3489b2c3dbb550564b44b02e79d87f3820535081d4f
-
Filesize
469KB
MD57a9df90eb50724800431a27af60ca63d
SHA19363280e0aa0f1b680c8b1504193a87c5ddfd5ab
SHA256e168092014997a8ce0558f17ea2625974c5b351b9474c77ac74011c623a0a02b
SHA5124afc7861892edbb3cb6fa7379bc05aa9ce2c973a58dd66695c197f18c6b18743c6ef689f5aa22d1fad32f3489b2c3dbb550564b44b02e79d87f3820535081d4f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD592d10405fb365f6fa5aa9499a8661b59
SHA1066f64d5d097a2baee2624b4923a21cdf7f0ad59
SHA2567ef5a8299bfb47a1bc22f30bb5ac8de10c793458155592e024acf6322e424233
SHA5126a5dce6200a6f18ba3f76a1a19ae33a3a42f338490a1398876f3673e4906eb98d7dd6be7b6ce932b04abab848e3dfc4dbc0ac92146a96e085cfa3c5af71e0503
-
Filesize
485KB
MD592d10405fb365f6fa5aa9499a8661b59
SHA1066f64d5d097a2baee2624b4923a21cdf7f0ad59
SHA2567ef5a8299bfb47a1bc22f30bb5ac8de10c793458155592e024acf6322e424233
SHA5126a5dce6200a6f18ba3f76a1a19ae33a3a42f338490a1398876f3673e4906eb98d7dd6be7b6ce932b04abab848e3dfc4dbc0ac92146a96e085cfa3c5af71e0503