Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/04/2023, 13:24
Static task
static1
General
-
Target
35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe
-
Size
830KB
-
MD5
359bff00aaaec31d18dd79bf7141ff0f
-
SHA1
a54168d5d07e6629a1819eb14735050d7e0e0d58
-
SHA256
35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa
-
SHA512
627e8a8d6187b490b9b8bc42055fc137fc5fdff06012d493e9992c29f035ead86862c9bb6625fb0afd0fac615c1ce24e72c2dec799a97e536abf77741e6f4b77
-
SSDEEP
24576:ZyFUktEPHAsqtqrRKKK89eN2501pXkK9K0R4EUmKJzD2VI:MFUkt6HAsqtEg2cN250DUIR4PmKZ2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it606870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it606870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it606870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it606870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it606870.exe -
Executes dropped EXE 6 IoCs
pid Process 4236 ziJU2167.exe 4208 zisV4970.exe 1692 it606870.exe 4780 jr683887.exe 2436 kp844254.exe 2000 lr717541.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it606870.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJU2167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJU2167.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisV4970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zisV4970.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3556 2000 WerFault.exe 72 3356 2000 WerFault.exe 72 3312 2000 WerFault.exe 72 2140 2000 WerFault.exe 72 1472 2000 WerFault.exe 72 4776 2000 WerFault.exe 72 4812 2000 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1692 it606870.exe 1692 it606870.exe 4780 jr683887.exe 4780 jr683887.exe 2436 kp844254.exe 2436 kp844254.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1692 it606870.exe Token: SeDebugPrivilege 4780 jr683887.exe Token: SeDebugPrivilege 2436 kp844254.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4236 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 66 PID 4064 wrote to memory of 4236 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 66 PID 4064 wrote to memory of 4236 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 66 PID 4236 wrote to memory of 4208 4236 ziJU2167.exe 67 PID 4236 wrote to memory of 4208 4236 ziJU2167.exe 67 PID 4236 wrote to memory of 4208 4236 ziJU2167.exe 67 PID 4208 wrote to memory of 1692 4208 zisV4970.exe 68 PID 4208 wrote to memory of 1692 4208 zisV4970.exe 68 PID 4208 wrote to memory of 4780 4208 zisV4970.exe 69 PID 4208 wrote to memory of 4780 4208 zisV4970.exe 69 PID 4208 wrote to memory of 4780 4208 zisV4970.exe 69 PID 4236 wrote to memory of 2436 4236 ziJU2167.exe 71 PID 4236 wrote to memory of 2436 4236 ziJU2167.exe 71 PID 4236 wrote to memory of 2436 4236 ziJU2167.exe 71 PID 4064 wrote to memory of 2000 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 72 PID 4064 wrote to memory of 2000 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 72 PID 4064 wrote to memory of 2000 4064 35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe"C:\Users\Admin\AppData\Local\Temp\35ddbb997d8649768b6d5ef4944884ee0ec495425099633ee08d5e7e949a92aa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU2167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU2167.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisV4970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisV4970.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it606870.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it606870.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr683887.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr683887.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844254.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr717541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr717541.exe2⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6363⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 7123⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 7723⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 8483⤵
- Program crash
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 8763⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9323⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 10843⤵
- Program crash
PID:4812
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD515bf42eaf3eac81d63b5a4dc5ff08a25
SHA1b46d435407c1faea10c7d31f630dcdd3c3ddada8
SHA256765eab139d2a31dc5c4d3f67d81c8335608b0fa6ce50b7166adf366910cc1a09
SHA512fe41787f67fab9a566ea922548a37f7597ab780b998b8b18ba4b92abbaaeaa22d486624c63fc964f529307afab28b4d4f4126b8b8633111155ef7614a19fdc49
-
Filesize
256KB
MD515bf42eaf3eac81d63b5a4dc5ff08a25
SHA1b46d435407c1faea10c7d31f630dcdd3c3ddada8
SHA256765eab139d2a31dc5c4d3f67d81c8335608b0fa6ce50b7166adf366910cc1a09
SHA512fe41787f67fab9a566ea922548a37f7597ab780b998b8b18ba4b92abbaaeaa22d486624c63fc964f529307afab28b4d4f4126b8b8633111155ef7614a19fdc49
-
Filesize
569KB
MD5593c355d06a9ec421e4513e95efdff92
SHA1bf7636a1d802d56431ef9781206226001f7da97c
SHA2562df7503fdf18385817589a1e5deb348376d72dac5973c9671b9029b1217b888c
SHA5126de8ea6e14b24652dcc34f6c251a6cc6d347366557025a9775ffa83e9b2ade9b0d96919f3958f1fb9ccc291d2c2330046b17a94b8eaf10353d3c7ef2da98283d
-
Filesize
569KB
MD5593c355d06a9ec421e4513e95efdff92
SHA1bf7636a1d802d56431ef9781206226001f7da97c
SHA2562df7503fdf18385817589a1e5deb348376d72dac5973c9671b9029b1217b888c
SHA5126de8ea6e14b24652dcc34f6c251a6cc6d347366557025a9775ffa83e9b2ade9b0d96919f3958f1fb9ccc291d2c2330046b17a94b8eaf10353d3c7ef2da98283d
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
415KB
MD56b2b803b7e41175454b152de83f9dd43
SHA1461c3e049e0fa6d4a60173777caf8f15f11b2402
SHA256d6fa2c152f7f8cbf10499fad8bc539bc8a6d48f9b675ce8dfca927a1860cb9bd
SHA512bb7fe713eaea8f8b1745d9e5c19bc68546b2f88d1131f819eba1b5ee5d0d43326b4bf95681a2c77a2f00faa7c80bab13d1ea97a10a48a33f9ab5152f9be64239
-
Filesize
415KB
MD56b2b803b7e41175454b152de83f9dd43
SHA1461c3e049e0fa6d4a60173777caf8f15f11b2402
SHA256d6fa2c152f7f8cbf10499fad8bc539bc8a6d48f9b675ce8dfca927a1860cb9bd
SHA512bb7fe713eaea8f8b1745d9e5c19bc68546b2f88d1131f819eba1b5ee5d0d43326b4bf95681a2c77a2f00faa7c80bab13d1ea97a10a48a33f9ab5152f9be64239
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5c5517d7fdb05515b1e30c5f345e2a0cb
SHA17d804870dc43aa49388add45ef330b166dcaf77a
SHA256a997357110a935c3055c1f5467ed506de21df9af95593b9048a8ad9f6712d458
SHA5127274942d035d32a949ec8fa7943535ca27b9a66d1425d7c1b643f6531ff7a8630886e3508e8d3f9b7488130c073b9bd06df2af5ff75bc5df6b2906635b56d304
-
Filesize
360KB
MD5c5517d7fdb05515b1e30c5f345e2a0cb
SHA17d804870dc43aa49388add45ef330b166dcaf77a
SHA256a997357110a935c3055c1f5467ed506de21df9af95593b9048a8ad9f6712d458
SHA5127274942d035d32a949ec8fa7943535ca27b9a66d1425d7c1b643f6531ff7a8630886e3508e8d3f9b7488130c073b9bd06df2af5ff75bc5df6b2906635b56d304