Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 16:48
Static task
static1
General
-
Target
abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe
-
Size
939KB
-
MD5
b91bf8420d94dcc8a07a54a68930a48a
-
SHA1
81b2516999b9fa2d3cfa0229709f938378e3208e
-
SHA256
abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c
-
SHA512
8f5bf26df1a8d74edcc7986643502d8a95f4e4d7e4c508ff98fc9291017716989ae2043eb809730315c0f1491c87c4e8679163894bb22780614bac8c08735f27
-
SSDEEP
24576:IyMH53k74N4qrAEyyWn3XwF5pGvWNKtl0oxv:PMH+qMEueevWotl0o
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it098531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it098531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it098531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it098531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it098531.exe -
Executes dropped EXE 6 IoCs
pid Process 3608 ziwV4474.exe 3268 zigL3368.exe 2884 it098531.exe 3652 jr545353.exe 3164 kp772357.exe 2924 lr090109.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it098531.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwV4474.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigL3368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zigL3368.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwV4474.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3020 2924 WerFault.exe 72 2412 2924 WerFault.exe 72 3852 2924 WerFault.exe 72 3168 2924 WerFault.exe 72 3840 2924 WerFault.exe 72 1748 2924 WerFault.exe 72 1888 2924 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2884 it098531.exe 2884 it098531.exe 3652 jr545353.exe 3652 jr545353.exe 3164 kp772357.exe 3164 kp772357.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2884 it098531.exe Token: SeDebugPrivilege 3652 jr545353.exe Token: SeDebugPrivilege 3164 kp772357.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3608 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 66 PID 3304 wrote to memory of 3608 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 66 PID 3304 wrote to memory of 3608 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 66 PID 3608 wrote to memory of 3268 3608 ziwV4474.exe 67 PID 3608 wrote to memory of 3268 3608 ziwV4474.exe 67 PID 3608 wrote to memory of 3268 3608 ziwV4474.exe 67 PID 3268 wrote to memory of 2884 3268 zigL3368.exe 68 PID 3268 wrote to memory of 2884 3268 zigL3368.exe 68 PID 3268 wrote to memory of 3652 3268 zigL3368.exe 69 PID 3268 wrote to memory of 3652 3268 zigL3368.exe 69 PID 3268 wrote to memory of 3652 3268 zigL3368.exe 69 PID 3608 wrote to memory of 3164 3608 ziwV4474.exe 71 PID 3608 wrote to memory of 3164 3608 ziwV4474.exe 71 PID 3608 wrote to memory of 3164 3608 ziwV4474.exe 71 PID 3304 wrote to memory of 2924 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 72 PID 3304 wrote to memory of 2924 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 72 PID 3304 wrote to memory of 2924 3304 abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe"C:\Users\Admin\AppData\Local\Temp\abd6cb19839b66fe2198251724cc02bf48f227a92fff19648c992e4e5452443c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV4474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigL3368.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098531.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr545353.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp772357.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090109.exe2⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 6203⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 7003⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 8403⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 8283⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 8763⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 8963⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 10763⤵
- Program crash
PID:1888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
624KB
MD5b2cac1e5c2904faf0577fa12f8ba7145
SHA10165d875d24cf52c83332c025d698703db5acb65
SHA256eb729a397dfbcea508f06ed10c7fa8bd9a0533eefe56b7b2c475e8e930e36727
SHA512c99da5ea81d6b1f4ab3482d447095f158e9f39ae40b721fd826cf6664b4abe90e3a2eca52c90171acac4af0f129d5ca287aae9e511dcbdb5725443fc7e8ea894
-
Filesize
624KB
MD5b2cac1e5c2904faf0577fa12f8ba7145
SHA10165d875d24cf52c83332c025d698703db5acb65
SHA256eb729a397dfbcea508f06ed10c7fa8bd9a0533eefe56b7b2c475e8e930e36727
SHA512c99da5ea81d6b1f4ab3482d447095f158e9f39ae40b721fd826cf6664b4abe90e3a2eca52c90171acac4af0f129d5ca287aae9e511dcbdb5725443fc7e8ea894
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
469KB
MD5e8597cba69da512abbcdc409f8ea423b
SHA1d2162bd0e9418500994d283760b473e7b7b1a07f
SHA2567d60857e514174f831427d4d18084d300f97b2b9f9af278680b5cb2dfa0aff76
SHA51250b071355492efa9dca2cc6fc0bf565fe31e06e9acfeceb35394809a67410d1d329e9ddc01a3740ce074cc1bcb5fc27fc53d81f515d8e71f8c03dd259bbf4a95
-
Filesize
469KB
MD5e8597cba69da512abbcdc409f8ea423b
SHA1d2162bd0e9418500994d283760b473e7b7b1a07f
SHA2567d60857e514174f831427d4d18084d300f97b2b9f9af278680b5cb2dfa0aff76
SHA51250b071355492efa9dca2cc6fc0bf565fe31e06e9acfeceb35394809a67410d1d329e9ddc01a3740ce074cc1bcb5fc27fc53d81f515d8e71f8c03dd259bbf4a95
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD51786a8cfb6ef2b360c0641dcfcd639d4
SHA1553aed7c6d4249bcbd5c034fcfbeb06bfa83f299
SHA2563732c7d88193f70ebf881d9c07bdfc15771ef3f8f61f11250589a1b588cec84a
SHA5123b587046024429dcaa29cbd3b09f9a1a5d29d14cba41a077e93f5a21ca6a992085b1cd2c1f4021587bd792b457e96ced244b3fbdc8567f8124c822bc8a508af2
-
Filesize
485KB
MD51786a8cfb6ef2b360c0641dcfcd639d4
SHA1553aed7c6d4249bcbd5c034fcfbeb06bfa83f299
SHA2563732c7d88193f70ebf881d9c07bdfc15771ef3f8f61f11250589a1b588cec84a
SHA5123b587046024429dcaa29cbd3b09f9a1a5d29d14cba41a077e93f5a21ca6a992085b1cd2c1f4021587bd792b457e96ced244b3fbdc8567f8124c822bc8a508af2