Analysis
-
max time kernel
147s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 18:00
Static task
static1
General
-
Target
d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe
-
Size
938KB
-
MD5
9ffe8b57e0f779ae39ae8a6674fca5df
-
SHA1
3873c0a9c86a6c7bf54bf948f1d263ae42c17c16
-
SHA256
d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8
-
SHA512
d7bf0819c9ebef7a48b907978d0b42214867d843ff0aefc549e5b8dd7eb765200da270d1461b138a265c86cd36afdaab61dcb82ab668a29c39c7f6d11eb90834
-
SSDEEP
24576:qyyrjok2/mDKnVOymPpIi+qqcHTgOkfpRn71BK:xy4jLVOyCpL93AR7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it339384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it339384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it339384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it339384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it339384.exe -
Executes dropped EXE 6 IoCs
pid Process 2508 zipu1134.exe 2980 ziex4686.exe 3244 it339384.exe 2088 jr793738.exe 1864 kp136410.exe 2616 lr111350.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it339384.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipu1134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipu1134.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziex4686.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziex4686.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3420 2616 WerFault.exe 72 4848 2616 WerFault.exe 72 3892 2616 WerFault.exe 72 3652 2616 WerFault.exe 72 1288 2616 WerFault.exe 72 2880 2616 WerFault.exe 72 4180 2616 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3244 it339384.exe 3244 it339384.exe 2088 jr793738.exe 2088 jr793738.exe 1864 kp136410.exe 1864 kp136410.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3244 it339384.exe Token: SeDebugPrivilege 2088 jr793738.exe Token: SeDebugPrivilege 1864 kp136410.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2508 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 66 PID 2468 wrote to memory of 2508 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 66 PID 2468 wrote to memory of 2508 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 66 PID 2508 wrote to memory of 2980 2508 zipu1134.exe 67 PID 2508 wrote to memory of 2980 2508 zipu1134.exe 67 PID 2508 wrote to memory of 2980 2508 zipu1134.exe 67 PID 2980 wrote to memory of 3244 2980 ziex4686.exe 68 PID 2980 wrote to memory of 3244 2980 ziex4686.exe 68 PID 2980 wrote to memory of 2088 2980 ziex4686.exe 69 PID 2980 wrote to memory of 2088 2980 ziex4686.exe 69 PID 2980 wrote to memory of 2088 2980 ziex4686.exe 69 PID 2508 wrote to memory of 1864 2508 zipu1134.exe 71 PID 2508 wrote to memory of 1864 2508 zipu1134.exe 71 PID 2508 wrote to memory of 1864 2508 zipu1134.exe 71 PID 2468 wrote to memory of 2616 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 72 PID 2468 wrote to memory of 2616 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 72 PID 2468 wrote to memory of 2616 2468 d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe"C:\Users\Admin\AppData\Local\Temp\d04646e43bc475be1844c4dc543b5b4589eb78373217b99ad5a6bdc23f224fa8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu1134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu1134.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziex4686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziex4686.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it339384.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it339384.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793738.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793738.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp136410.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp136410.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr111350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr111350.exe2⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 6163⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 6963⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 8403⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 8563⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 9083⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 8843⤵
- Program crash
PID:2880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 10723⤵
- Program crash
PID:4180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
623KB
MD5f10a8a9634fa4d53708c18d560fe23cb
SHA1e9f2ffd184d51059492aa63f516b74d9f9673fc2
SHA256cfd5878e6b02db889ee2c36ae9af0a1dabd03de10b9c16e1f3bbc285e017b73c
SHA512d65f923f7d7839ef6898e08fa696dcd1fb17213a808f27fa336a1c70b8a1c74b441621a8c0df830c45ac7a6b6c1a040055e6cab846df34227b4d154f7a61905f
-
Filesize
623KB
MD5f10a8a9634fa4d53708c18d560fe23cb
SHA1e9f2ffd184d51059492aa63f516b74d9f9673fc2
SHA256cfd5878e6b02db889ee2c36ae9af0a1dabd03de10b9c16e1f3bbc285e017b73c
SHA512d65f923f7d7839ef6898e08fa696dcd1fb17213a808f27fa336a1c70b8a1c74b441621a8c0df830c45ac7a6b6c1a040055e6cab846df34227b4d154f7a61905f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
469KB
MD5613730c8219861bf8276aef921655f6a
SHA19d82c6f7f6c345a14d93cb33e1221408ceef31ab
SHA256d893730807ba193fe81a6ddffcf29b23a24c8e68461e581e5cf30aa011b72d37
SHA5122899fe37d9de69211aa20b193ec35b3fcc5a7d327a0b92c5b9a25837fcc506a82e5e53cca1e046b6e6d51c35aca66b59c6580fe5437a7f3f7fac8682fe80f6bb
-
Filesize
469KB
MD5613730c8219861bf8276aef921655f6a
SHA19d82c6f7f6c345a14d93cb33e1221408ceef31ab
SHA256d893730807ba193fe81a6ddffcf29b23a24c8e68461e581e5cf30aa011b72d37
SHA5122899fe37d9de69211aa20b193ec35b3fcc5a7d327a0b92c5b9a25837fcc506a82e5e53cca1e046b6e6d51c35aca66b59c6580fe5437a7f3f7fac8682fe80f6bb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD5cf663fc97672d63ab84f60bb3a3b1d95
SHA180aa0aa07c8ad35e9c2b40b2339d0748fd459e43
SHA256f8d8e563171a3cb4ddd46295461f80497c449a00e0ab18ca3a9f145e8885d6ea
SHA512bff271d6bf24ad1dc2e925fe9260ce1953226759014bba4e11b07977ff226d1a1b93aa6ed0a0daf52452447c7d5e71eec2d22653267ee362e517148a31a0bf92
-
Filesize
485KB
MD5cf663fc97672d63ab84f60bb3a3b1d95
SHA180aa0aa07c8ad35e9c2b40b2339d0748fd459e43
SHA256f8d8e563171a3cb4ddd46295461f80497c449a00e0ab18ca3a9f145e8885d6ea
SHA512bff271d6bf24ad1dc2e925fe9260ce1953226759014bba4e11b07977ff226d1a1b93aa6ed0a0daf52452447c7d5e71eec2d22653267ee362e517148a31a0bf92