Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/04/2023, 19:42
Static task
static1
General
-
Target
336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe
-
Size
827KB
-
MD5
107837646e29c57d42ad08401c27a9f8
-
SHA1
fb487821c3b61b106b6c0400f1fe2c7dcf2e3cc7
-
SHA256
336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e
-
SHA512
ceb9af7fb686569deaf878ddb975d9c1fabe862d335784baf8fb74911b008f44db4758e8a8cbf1d241ce2c5d952ccd53d48d7922dea60f5cc9d30f435104dbef
-
SSDEEP
24576:/ykT01c8GI6J2+C4ily6rxFanYKCdkC0vP:K8YON2+Ilh1Y1CdkC0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it813946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it813946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it813946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it813946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it813946.exe -
Executes dropped EXE 6 IoCs
pid Process 1868 ziWu2380.exe 2088 ziTX2237.exe 2344 it813946.exe 2596 jr980232.exe 1460 kp883251.exe 4064 lr178089.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it813946.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWu2380.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTX2237.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziTX2237.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWu2380.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1548 4064 WerFault.exe 72 2608 4064 WerFault.exe 72 2344 4064 WerFault.exe 72 2688 4064 WerFault.exe 72 1008 4064 WerFault.exe 72 4960 4064 WerFault.exe 72 448 4064 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2344 it813946.exe 2344 it813946.exe 2596 jr980232.exe 2596 jr980232.exe 1460 kp883251.exe 1460 kp883251.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 it813946.exe Token: SeDebugPrivilege 2596 jr980232.exe Token: SeDebugPrivilege 1460 kp883251.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1868 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 66 PID 1680 wrote to memory of 1868 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 66 PID 1680 wrote to memory of 1868 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 66 PID 1868 wrote to memory of 2088 1868 ziWu2380.exe 67 PID 1868 wrote to memory of 2088 1868 ziWu2380.exe 67 PID 1868 wrote to memory of 2088 1868 ziWu2380.exe 67 PID 2088 wrote to memory of 2344 2088 ziTX2237.exe 68 PID 2088 wrote to memory of 2344 2088 ziTX2237.exe 68 PID 2088 wrote to memory of 2596 2088 ziTX2237.exe 69 PID 2088 wrote to memory of 2596 2088 ziTX2237.exe 69 PID 2088 wrote to memory of 2596 2088 ziTX2237.exe 69 PID 1868 wrote to memory of 1460 1868 ziWu2380.exe 71 PID 1868 wrote to memory of 1460 1868 ziWu2380.exe 71 PID 1868 wrote to memory of 1460 1868 ziWu2380.exe 71 PID 1680 wrote to memory of 4064 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 72 PID 1680 wrote to memory of 4064 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 72 PID 1680 wrote to memory of 4064 1680 336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe"C:\Users\Admin\AppData\Local\Temp\336329370a9694b9be2267ea827dae8cafc793c74b5d7104a61ad4da1d23212e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWu2380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTX2237.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it813946.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr980232.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp883251.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr178089.exe2⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6203⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7003⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 8403⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 8283⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 8763⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 9243⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 10843⤵
- Program crash
PID:448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5239b363b76feae91bec4c1e21e9bbf26
SHA18f046cc07a11d45423e00cf7ac68c8925c0b1f45
SHA2568ca23ab8b93690d7ebec564585c8550f828bec2ca9b162f36c8c66733c33984c
SHA51267d3586ae4bcaf74fe8367321255ba63b29a16172458ee0c69022c879519ca27e698cf46f495de8104e47422b6a3f87e43ca9f206baba7876a288a831aeab15f
-
Filesize
256KB
MD5239b363b76feae91bec4c1e21e9bbf26
SHA18f046cc07a11d45423e00cf7ac68c8925c0b1f45
SHA2568ca23ab8b93690d7ebec564585c8550f828bec2ca9b162f36c8c66733c33984c
SHA51267d3586ae4bcaf74fe8367321255ba63b29a16172458ee0c69022c879519ca27e698cf46f495de8104e47422b6a3f87e43ca9f206baba7876a288a831aeab15f
-
Filesize
569KB
MD5b75bf00bad8660c367459cb100fe63c5
SHA131a0a73e659d5aafde62940cf12ade97b9b80f4d
SHA256454c954a569e50f8f9c5fba73864589ace400faaf76847a33af8f8d23caa17f8
SHA51221ba703bd734fe4dd27be2cc09822455fc92f5c83047b6cdbd5d045875cfd3a19d18f8630f0cc7e071bcb3547332fd13c3656aebe38bfc63c0e2ff16f8ec8005
-
Filesize
569KB
MD5b75bf00bad8660c367459cb100fe63c5
SHA131a0a73e659d5aafde62940cf12ade97b9b80f4d
SHA256454c954a569e50f8f9c5fba73864589ace400faaf76847a33af8f8d23caa17f8
SHA51221ba703bd734fe4dd27be2cc09822455fc92f5c83047b6cdbd5d045875cfd3a19d18f8630f0cc7e071bcb3547332fd13c3656aebe38bfc63c0e2ff16f8ec8005
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
415KB
MD55556aaee77680e1a97702074dc6feb08
SHA13d823fc065e5d3b1199682bef58b7e1305d38558
SHA256c9c7298630db257e763099089821369972712cba1c03ebab656a54e5e0f8b325
SHA512c36408c237740563a28a3d6d6c627977334020bc06bf8f756985c23b403608bfcc729c1fcb33d057972efe65a634e78499151472603ceaab78415799cdf250e2
-
Filesize
415KB
MD55556aaee77680e1a97702074dc6feb08
SHA13d823fc065e5d3b1199682bef58b7e1305d38558
SHA256c9c7298630db257e763099089821369972712cba1c03ebab656a54e5e0f8b325
SHA512c36408c237740563a28a3d6d6c627977334020bc06bf8f756985c23b403608bfcc729c1fcb33d057972efe65a634e78499151472603ceaab78415799cdf250e2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5cccc4f5b898d768340bb1bd81d80df6a
SHA13130a913c4784ee2c244ab1c90e8630a753a7b8a
SHA2563308d97cb7292c34daa3cf62345c4af02da264fe43925efe4e4be9cea565bab5
SHA512458c262b2c4b2f32d5b763073639aaaf354a2492431ccc98cda0d9f764ed5d452f71e03361fa53b172734b55a9543f99b3d8f0ee309f4e878aae0a05aa41e299
-
Filesize
360KB
MD5cccc4f5b898d768340bb1bd81d80df6a
SHA13130a913c4784ee2c244ab1c90e8630a753a7b8a
SHA2563308d97cb7292c34daa3cf62345c4af02da264fe43925efe4e4be9cea565bab5
SHA512458c262b2c4b2f32d5b763073639aaaf354a2492431ccc98cda0d9f764ed5d452f71e03361fa53b172734b55a9543f99b3d8f0ee309f4e878aae0a05aa41e299