Analysis
-
max time kernel
145s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/04/2023, 22:23
Static task
static1
General
-
Target
d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe
-
Size
1.0MB
-
MD5
6a7fa8ac6c6f71cdaf2715f917f3abab
-
SHA1
2eabb155b7cf2ad244815d89a91a49feffa3ddc3
-
SHA256
d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6
-
SHA512
781310debcf82d801222753efbc51845bff101bd3cf27433c9a0fc7b6b758011c18b14168cad31b09e122cfec45b772780e8e01a16a3b8ce03d8a8fc459da39b
-
SSDEEP
24576:8yVG5AygOFd2JCAoSx8tjCqRUKhrL6VaVD2VMTcaAI:rVGOygid2JTx3HaVSVMT7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr156144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr156144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr156144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr156144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr156144.exe -
Executes dropped EXE 6 IoCs
pid Process 3540 un882030.exe 4672 un122469.exe 1420 pr156144.exe 1956 qu234036.exe 4568 rk354711.exe 420 si153988.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr156144.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr156144.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un882030.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un882030.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un122469.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un122469.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 3840 420 WerFault.exe 72 3844 420 WerFault.exe 72 3092 420 WerFault.exe 72 1320 420 WerFault.exe 72 3748 420 WerFault.exe 72 1128 420 WerFault.exe 72 1568 420 WerFault.exe 72 1560 420 WerFault.exe 72 4500 420 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 pr156144.exe 1420 pr156144.exe 1956 qu234036.exe 1956 qu234036.exe 4568 rk354711.exe 4568 rk354711.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1420 pr156144.exe Token: SeDebugPrivilege 1956 qu234036.exe Token: SeDebugPrivilege 4568 rk354711.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 420 si153988.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3540 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 66 PID 2112 wrote to memory of 3540 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 66 PID 2112 wrote to memory of 3540 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 66 PID 3540 wrote to memory of 4672 3540 un882030.exe 67 PID 3540 wrote to memory of 4672 3540 un882030.exe 67 PID 3540 wrote to memory of 4672 3540 un882030.exe 67 PID 4672 wrote to memory of 1420 4672 un122469.exe 68 PID 4672 wrote to memory of 1420 4672 un122469.exe 68 PID 4672 wrote to memory of 1420 4672 un122469.exe 68 PID 4672 wrote to memory of 1956 4672 un122469.exe 69 PID 4672 wrote to memory of 1956 4672 un122469.exe 69 PID 4672 wrote to memory of 1956 4672 un122469.exe 69 PID 3540 wrote to memory of 4568 3540 un882030.exe 71 PID 3540 wrote to memory of 4568 3540 un882030.exe 71 PID 3540 wrote to memory of 4568 3540 un882030.exe 71 PID 2112 wrote to memory of 420 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 72 PID 2112 wrote to memory of 420 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 72 PID 2112 wrote to memory of 420 2112 d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe"C:\Users\Admin\AppData\Local\Temp\d4eb4b12202a90369e14027a10ec8e08b5e3f360508f677df89857f55876e2a6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882030.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un122469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un122469.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr156144.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr156144.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu234036.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu234036.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354711.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354711.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si153988.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si153988.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 6203⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 7003⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 8363⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 8203⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 8803⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 8843⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 11203⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 11603⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 11763⤵
- Program crash
PID:4500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD55c26d70a6aafc14cb22ef442a01b81f5
SHA159ac56e665aa945b9281c884ea3b3ae0ea97a562
SHA2561cb14d86393d38a231198112391484412836ad9d31294141a81a0b4973b109db
SHA512eb182ea07018b0a4594c0340c8db75f202305c4c5aec6cfb398d56e7f999fe1841a45c1c963a01e845d8530f4c22bf72542debde144aab1f07db062ba28888fd
-
Filesize
367KB
MD55c26d70a6aafc14cb22ef442a01b81f5
SHA159ac56e665aa945b9281c884ea3b3ae0ea97a562
SHA2561cb14d86393d38a231198112391484412836ad9d31294141a81a0b4973b109db
SHA512eb182ea07018b0a4594c0340c8db75f202305c4c5aec6cfb398d56e7f999fe1841a45c1c963a01e845d8530f4c22bf72542debde144aab1f07db062ba28888fd
-
Filesize
749KB
MD5d5cb45fd66f22ba545e3711dd90f38c1
SHA189d8909e29775b739a0610a22d41786386e40698
SHA2569c242d0d65214201ceafaed879c1cf0da415d6afed63eaa8ca7e7eb2aba8ee93
SHA512333ea2ead8d9db93cd8c0082086d7d6e18bfc7b18080c10c907e4966521c9ebe35ab58612ee373b186d0d18b1d606fa155d05fa392e5ade4cdf8e340b7c271a0
-
Filesize
749KB
MD5d5cb45fd66f22ba545e3711dd90f38c1
SHA189d8909e29775b739a0610a22d41786386e40698
SHA2569c242d0d65214201ceafaed879c1cf0da415d6afed63eaa8ca7e7eb2aba8ee93
SHA512333ea2ead8d9db93cd8c0082086d7d6e18bfc7b18080c10c907e4966521c9ebe35ab58612ee373b186d0d18b1d606fa155d05fa392e5ade4cdf8e340b7c271a0
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
595KB
MD539680d55ccff87ddd1283a129c4bbe52
SHA123070933694dae7c56dfdbb6359aeb94f60b41be
SHA25636e20e89b13a9c09164c0bea3636f08f2e82892f35443f20486225bda6342a04
SHA51294a579485054a780fe0ba4601f9c9806a746e79219d7e76bba74ca4582dad936764f2e92248a6e339fdee137de2ea58b99e62ff479f09e839a9f99d5ca3cf4b9
-
Filesize
595KB
MD539680d55ccff87ddd1283a129c4bbe52
SHA123070933694dae7c56dfdbb6359aeb94f60b41be
SHA25636e20e89b13a9c09164c0bea3636f08f2e82892f35443f20486225bda6342a04
SHA51294a579485054a780fe0ba4601f9c9806a746e79219d7e76bba74ca4582dad936764f2e92248a6e339fdee137de2ea58b99e62ff479f09e839a9f99d5ca3cf4b9
-
Filesize
389KB
MD561fd6c7f236c4d7641a4d1912198fbb8
SHA173f8edbd12f2b22a9e1e9ea1d7cfc37adc18f4dc
SHA2563ac37f72f503d981ae543bd7526638045ec78bc9954ea680d38b37f5b1c4c6a2
SHA512f4db64ae1e95e7e957a0cfdf3b3dff026b31af789d5953bc97e22ce6dbd43b2c605ccc1e822b9c049711b95b9190e3cab42dde64ff18f7493c93b5aadc751091
-
Filesize
389KB
MD561fd6c7f236c4d7641a4d1912198fbb8
SHA173f8edbd12f2b22a9e1e9ea1d7cfc37adc18f4dc
SHA2563ac37f72f503d981ae543bd7526638045ec78bc9954ea680d38b37f5b1c4c6a2
SHA512f4db64ae1e95e7e957a0cfdf3b3dff026b31af789d5953bc97e22ce6dbd43b2c605ccc1e822b9c049711b95b9190e3cab42dde64ff18f7493c93b5aadc751091
-
Filesize
472KB
MD53774def6b7e03d566c352d6ab12cc24d
SHA16a3d1055efbf84a0761b4dd4399a2fe98d1539d8
SHA256c05d07a02fecd6e9794b98d045bf17b13bbe459856c52e522e23424eddb512c1
SHA51249b4257269b5fbeb2f923d216dcbc80593e0e610e98470c2fb74817d6d239caa72ead803924ba58c6cd160175a919ef2dcbbe925727dfe227f9bc6cc98dd5514
-
Filesize
472KB
MD53774def6b7e03d566c352d6ab12cc24d
SHA16a3d1055efbf84a0761b4dd4399a2fe98d1539d8
SHA256c05d07a02fecd6e9794b98d045bf17b13bbe459856c52e522e23424eddb512c1
SHA51249b4257269b5fbeb2f923d216dcbc80593e0e610e98470c2fb74817d6d239caa72ead803924ba58c6cd160175a919ef2dcbbe925727dfe227f9bc6cc98dd5514