Analysis
-
max time kernel
144s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/04/2023, 17:51
Static task
static1
General
-
Target
9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe
-
Size
936KB
-
MD5
9dd8e7817e162376d42f372ec9e832e2
-
SHA1
436919a8b482977c6afc3a9a9b8ebebe4e5e3393
-
SHA256
9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34
-
SHA512
24e83d732e492defa2ce51beb1646a5040553ca31a379873fc3d7f6149d11541e49c3ceb607899efc05ccdf974313ad72a083c6cc2bc8c0aafe223ae58a28bc4
-
SSDEEP
24576:dyYsMnQkYTn8H0AZBQdk1x/kKfzSKd7mCEmCFq3Yz:4YsMnQkSnE0AvQW1C4wJq3Y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it391019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it391019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it391019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it391019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it391019.exe -
Executes dropped EXE 6 IoCs
pid Process 3984 ziJV7374.exe 4904 zizE1099.exe 2116 it391019.exe 4288 jr044385.exe 2580 kp541511.exe 1420 lr042580.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it391019.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJV7374.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJV7374.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizE1099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zizE1099.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 2940 1420 WerFault.exe 72 3488 1420 WerFault.exe 72 5000 1420 WerFault.exe 72 2700 1420 WerFault.exe 72 3096 1420 WerFault.exe 72 68 1420 WerFault.exe 72 4624 1420 WerFault.exe 72 4724 1420 WerFault.exe 72 4804 1420 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2116 it391019.exe 2116 it391019.exe 4288 jr044385.exe 4288 jr044385.exe 2580 kp541511.exe 2580 kp541511.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 it391019.exe Token: SeDebugPrivilege 4288 jr044385.exe Token: SeDebugPrivilege 2580 kp541511.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 lr042580.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3984 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 66 PID 3992 wrote to memory of 3984 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 66 PID 3992 wrote to memory of 3984 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 66 PID 3984 wrote to memory of 4904 3984 ziJV7374.exe 67 PID 3984 wrote to memory of 4904 3984 ziJV7374.exe 67 PID 3984 wrote to memory of 4904 3984 ziJV7374.exe 67 PID 4904 wrote to memory of 2116 4904 zizE1099.exe 68 PID 4904 wrote to memory of 2116 4904 zizE1099.exe 68 PID 4904 wrote to memory of 4288 4904 zizE1099.exe 69 PID 4904 wrote to memory of 4288 4904 zizE1099.exe 69 PID 4904 wrote to memory of 4288 4904 zizE1099.exe 69 PID 3984 wrote to memory of 2580 3984 ziJV7374.exe 71 PID 3984 wrote to memory of 2580 3984 ziJV7374.exe 71 PID 3984 wrote to memory of 2580 3984 ziJV7374.exe 71 PID 3992 wrote to memory of 1420 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 72 PID 3992 wrote to memory of 1420 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 72 PID 3992 wrote to memory of 1420 3992 9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe"C:\Users\Admin\AppData\Local\Temp\9b8877e5b2ed9b700b8a01bfc53e92c84141d5ee63093e3cd0e25b876bf43d34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJV7374.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizE1099.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it391019.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr044385.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp541511.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042580.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 6203⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 7003⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 8403⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 8483⤵
- Program crash
PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 8883⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 9083⤵
- Program crash
PID:68
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 11203⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 11483⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 11523⤵
- Program crash
PID:4804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD53a49ee3205029625fd2acad94128932b
SHA14a7532e0a80e87b77586c86ff8e8a8a4c660a432
SHA256365066ff3d8e9a2296fcaf88a952d92337ca32b39d4701881572b64e805888f2
SHA512c6188c8c0645ea63e39e99d232e2de69dc5de497f5077e43a03992c4840b8397f0ff4f054723e384ca7443af0af1b909c1efb31642d2e6305b48a7efd50b67c0
-
Filesize
384KB
MD53a49ee3205029625fd2acad94128932b
SHA14a7532e0a80e87b77586c86ff8e8a8a4c660a432
SHA256365066ff3d8e9a2296fcaf88a952d92337ca32b39d4701881572b64e805888f2
SHA512c6188c8c0645ea63e39e99d232e2de69dc5de497f5077e43a03992c4840b8397f0ff4f054723e384ca7443af0af1b909c1efb31642d2e6305b48a7efd50b67c0
-
Filesize
623KB
MD5a08fd8c96d5140170609f3db3673bfb6
SHA1ac3eda9330e24231fa13e64a6f1d269523d1a905
SHA256ed43c331de9a891395d1834a8ec7a0cee76e1a2ae694d71ff9a153bc9bae30cd
SHA51257aecdf9b24ff0b1578d8a8b18be02fde62b40a4140dc800161db751371f7af40825d667e5cbd4e60fb46a24c2117f50ae3cbf86c0320043ce70c26d6d5b9198
-
Filesize
623KB
MD5a08fd8c96d5140170609f3db3673bfb6
SHA1ac3eda9330e24231fa13e64a6f1d269523d1a905
SHA256ed43c331de9a891395d1834a8ec7a0cee76e1a2ae694d71ff9a153bc9bae30cd
SHA51257aecdf9b24ff0b1578d8a8b18be02fde62b40a4140dc800161db751371f7af40825d667e5cbd4e60fb46a24c2117f50ae3cbf86c0320043ce70c26d6d5b9198
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
468KB
MD586c6aeb10463b9d5f09a86043162ea5f
SHA15580736fc0626d011706e4665394b2cb245d0231
SHA256c6e1391a38766667955470a788b71ad72938f5c809cfead45c1b8e64d541966d
SHA5121ab94ddfc706cf131bd7991aa0e4296a61a22b5d7680abe92ac567f099a06e121db9f4f623e7d0ae533b7bfb144be897ae695ba57ad51688af9413d5443ba773
-
Filesize
468KB
MD586c6aeb10463b9d5f09a86043162ea5f
SHA15580736fc0626d011706e4665394b2cb245d0231
SHA256c6e1391a38766667955470a788b71ad72938f5c809cfead45c1b8e64d541966d
SHA5121ab94ddfc706cf131bd7991aa0e4296a61a22b5d7680abe92ac567f099a06e121db9f4f623e7d0ae533b7bfb144be897ae695ba57ad51688af9413d5443ba773
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD5127d7e0259c8b1cec9b5558957912bd9
SHA1af003885611f7dc31e9f6dfc81c46d89c5922cb7
SHA256497b739ec48fc0e02c5523add3defd6df6d7a31b76d2509d04bd2ac7383eef79
SHA5128ef27d8a74974d8fa9ea137265479e677e2542f31a3e3c532653f0315102dfe9e1fa6db9db36b83644b487ff944d978ffb532cd53eb8ba6a230ec14879e620d4
-
Filesize
488KB
MD5127d7e0259c8b1cec9b5558957912bd9
SHA1af003885611f7dc31e9f6dfc81c46d89c5922cb7
SHA256497b739ec48fc0e02c5523add3defd6df6d7a31b76d2509d04bd2ac7383eef79
SHA5128ef27d8a74974d8fa9ea137265479e677e2542f31a3e3c532653f0315102dfe9e1fa6db9db36b83644b487ff944d978ffb532cd53eb8ba6a230ec14879e620d4