Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/04/2023, 22:57
Static task
static1
General
-
Target
d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe
-
Size
966KB
-
MD5
634cb513c1d44c510ab88cd8db9c5595
-
SHA1
413a72ab0c3c22bdf807fe2b230ec30ea828c5d3
-
SHA256
d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3
-
SHA512
af17f33d8d769336cea75f22640f7e0d7d257e98be3f632d3289880e92f5551aef9fcc1b0c6c7fad18514cea37bf56a3e73b66b859723ad3817c9fb6fa2a13a9
-
SSDEEP
24576:jyzaVFShrd3nZhSg5Z3ThQrbAygDfAWbGjfnP:2zc8l7ThQrbkbGjv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr787673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr787673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr787673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr787673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr787673.exe -
Executes dropped EXE 6 IoCs
pid Process 2488 un407331.exe 2128 un984864.exe 4420 pr787673.exe 3816 qu565233.exe 3556 rk021988.exe 4120 si452708.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr787673.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr787673.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un407331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un407331.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un984864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un984864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 2116 4120 WerFault.exe 72 4228 4120 WerFault.exe 72 1448 4120 WerFault.exe 72 5116 4120 WerFault.exe 72 420 4120 WerFault.exe 72 2584 4120 WerFault.exe 72 1416 4120 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4420 pr787673.exe 4420 pr787673.exe 3816 qu565233.exe 3816 qu565233.exe 3556 rk021988.exe 3556 rk021988.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4420 pr787673.exe Token: SeDebugPrivilege 3816 qu565233.exe Token: SeDebugPrivilege 3556 rk021988.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4204 wrote to memory of 2488 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 66 PID 4204 wrote to memory of 2488 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 66 PID 4204 wrote to memory of 2488 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 66 PID 2488 wrote to memory of 2128 2488 un407331.exe 67 PID 2488 wrote to memory of 2128 2488 un407331.exe 67 PID 2488 wrote to memory of 2128 2488 un407331.exe 67 PID 2128 wrote to memory of 4420 2128 un984864.exe 68 PID 2128 wrote to memory of 4420 2128 un984864.exe 68 PID 2128 wrote to memory of 4420 2128 un984864.exe 68 PID 2128 wrote to memory of 3816 2128 un984864.exe 69 PID 2128 wrote to memory of 3816 2128 un984864.exe 69 PID 2128 wrote to memory of 3816 2128 un984864.exe 69 PID 2488 wrote to memory of 3556 2488 un407331.exe 71 PID 2488 wrote to memory of 3556 2488 un407331.exe 71 PID 2488 wrote to memory of 3556 2488 un407331.exe 71 PID 4204 wrote to memory of 4120 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 72 PID 4204 wrote to memory of 4120 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 72 PID 4204 wrote to memory of 4120 4204 d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe"C:\Users\Admin\AppData\Local\Temp\d08bfe369b715b7a3c22e883edde12a57bce69344f1f61460eec0645c7a226b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un407331.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984864.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr787673.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu565233.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk021988.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452708.exe2⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 6163⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 6963⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 8363⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 8443⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 8723⤵
- Program crash
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 8803⤵
- Program crash
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 10803⤵
- Program crash
PID:1416
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ad50cc02fb3a0932062380925ed9343c
SHA15ef1ef4c68b51ec8a2bfed8783459e71514a352a
SHA256d0523344b3626a44049e6519b21685cdf255d414ea9fc6b3b4590617019462f8
SHA5129ec5d3c97dcd83b5938ea8c57a2e35a8f2479b8b13f3661f3dd22fc1d29f5df9166a5315bbb1ad7f35c8b29b19d59e27bee4ec78a6a96ae0afae2484689d69b0
-
Filesize
256KB
MD5ad50cc02fb3a0932062380925ed9343c
SHA15ef1ef4c68b51ec8a2bfed8783459e71514a352a
SHA256d0523344b3626a44049e6519b21685cdf255d414ea9fc6b3b4590617019462f8
SHA5129ec5d3c97dcd83b5938ea8c57a2e35a8f2479b8b13f3661f3dd22fc1d29f5df9166a5315bbb1ad7f35c8b29b19d59e27bee4ec78a6a96ae0afae2484689d69b0
-
Filesize
707KB
MD54a0821bcbaf123f4107a7f505e1f25ff
SHA107866d37d20519ee1dc5b31291e980ee2cb85e09
SHA256762d0673edc6c0598c225da8dfc233204894c55a4434b49ba6e77dfef3da087a
SHA5124c1f6b3a38516bc9e2d43b16eb354a24f0daac8bcc17def0168ed9e2f79e2bf853f4dd1fde2858b9b4983c7c566b5658ff52e6544a042bb10d28430c9e088828
-
Filesize
707KB
MD54a0821bcbaf123f4107a7f505e1f25ff
SHA107866d37d20519ee1dc5b31291e980ee2cb85e09
SHA256762d0673edc6c0598c225da8dfc233204894c55a4434b49ba6e77dfef3da087a
SHA5124c1f6b3a38516bc9e2d43b16eb354a24f0daac8bcc17def0168ed9e2f79e2bf853f4dd1fde2858b9b4983c7c566b5658ff52e6544a042bb10d28430c9e088828
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
553KB
MD5773f345869b5518247365c2f125e939a
SHA17f26f97c7edb7cc2b41edeaac03e76796e9a2406
SHA256d1907107fe8258f456203d75a1b328a337f07f0993bbf36e382e824b7eee5b35
SHA512b864b6d0eb5bf1ee900a853edef5f4a6e2d734ddebe3186545502479c880c21f3da2a44ab91bd4ab49ff65f6f21cf75018342effe2e61c5fb2fa88e44cf34f50
-
Filesize
553KB
MD5773f345869b5518247365c2f125e939a
SHA17f26f97c7edb7cc2b41edeaac03e76796e9a2406
SHA256d1907107fe8258f456203d75a1b328a337f07f0993bbf36e382e824b7eee5b35
SHA512b864b6d0eb5bf1ee900a853edef5f4a6e2d734ddebe3186545502479c880c21f3da2a44ab91bd4ab49ff65f6f21cf75018342effe2e61c5fb2fa88e44cf34f50
-
Filesize
278KB
MD557cf9306fe86e434aef3cbc7fcb00f30
SHA121f8f99747ff062543933b9e7cf8fa1b1b48c3b5
SHA2560a986735fa5c8e531026be8e47bfce9658a4ac8b215ca44034cecd6d0584a271
SHA512abfa8591618763508533615ee15ceb3d609e7fc7e11068459a5a47a93ad1fb1c9f654ee123a12285658a9a57200052b522670e36fddd1fc38f7e905dacd2dff2
-
Filesize
278KB
MD557cf9306fe86e434aef3cbc7fcb00f30
SHA121f8f99747ff062543933b9e7cf8fa1b1b48c3b5
SHA2560a986735fa5c8e531026be8e47bfce9658a4ac8b215ca44034cecd6d0584a271
SHA512abfa8591618763508533615ee15ceb3d609e7fc7e11068459a5a47a93ad1fb1c9f654ee123a12285658a9a57200052b522670e36fddd1fc38f7e905dacd2dff2
-
Filesize
360KB
MD5839f2209725bd532889cefe4d58eab1b
SHA14a745e5d180bb262f1dbe5622772954e17cedf1a
SHA256b43e4032e5fef4d33fdc3bfa53cf80459afbf472c971d0f2e8ab599e126b7531
SHA512653c25c5747b579abb53d8ae3f42c95e89587761fa11d699a8be751082ddda45cb98c6abaa96a8580af3f9c60ab53b87d5f3104c4adab8777b7e104b3813d06b
-
Filesize
360KB
MD5839f2209725bd532889cefe4d58eab1b
SHA14a745e5d180bb262f1dbe5622772954e17cedf1a
SHA256b43e4032e5fef4d33fdc3bfa53cf80459afbf472c971d0f2e8ab599e126b7531
SHA512653c25c5747b579abb53d8ae3f42c95e89587761fa11d699a8be751082ddda45cb98c6abaa96a8580af3f9c60ab53b87d5f3104c4adab8777b7e104b3813d06b