Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:07
Static task
static1
General
-
Target
fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe
-
Size
558KB
-
MD5
fda43ffec15122a4066810e09ebba9d3
-
SHA1
110a1aa0d36b82d3d0c8d4340a12f141aae96e3c
-
SHA256
fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f
-
SHA512
1538f6008ff17a87975e1409d369b98c4c91af8c2743752cf7b5f4a005be79b22f6ecb10bbfbe88813519b4ae32c67620dec751eb5d19713fcb7bf74e1ffb73e
-
SSDEEP
12288:Ty90pcJaURRu6yEpuI8vDziaixHrcsr+oq:TybJr8vMdgRoq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it229976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it229976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it229976.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it229976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it229976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it229976.exe -
Executes dropped EXE 4 IoCs
pid Process 4324 zicA0275.exe 4432 it229976.exe 208 kp797959.exe 636 lr236678.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it229976.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zicA0275.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicA0275.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 752 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1848 208 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4432 it229976.exe 4432 it229976.exe 208 kp797959.exe 208 kp797959.exe 636 lr236678.exe 636 lr236678.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4432 it229976.exe Token: SeDebugPrivilege 208 kp797959.exe Token: SeDebugPrivilege 636 lr236678.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2604 wrote to memory of 4324 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 84 PID 2604 wrote to memory of 4324 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 84 PID 2604 wrote to memory of 4324 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 84 PID 4324 wrote to memory of 4432 4324 zicA0275.exe 85 PID 4324 wrote to memory of 4432 4324 zicA0275.exe 85 PID 4324 wrote to memory of 208 4324 zicA0275.exe 89 PID 4324 wrote to memory of 208 4324 zicA0275.exe 89 PID 4324 wrote to memory of 208 4324 zicA0275.exe 89 PID 2604 wrote to memory of 636 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 92 PID 2604 wrote to memory of 636 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 92 PID 2604 wrote to memory of 636 2604 fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe"C:\Users\Admin\AppData\Local\Temp\fc651914bb29e775985cb6d5e684344b531a0ec429e730edea43948b9165261f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicA0275.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicA0275.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229976.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229976.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp797959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp797959.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 13204⤵
- Program crash
PID:1848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr236678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr236678.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 208 -ip 2081⤵PID:1276
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
404KB
MD5b5294723e53d432ada626c484adddcfe
SHA157dbeb0b8ca2f365e72b5feaa7510d56aa2517c7
SHA2560dbcbbd6e2977f2576439c454e09aec6ec1d924c677dd9c3c73700ee3b2fb2ac
SHA512ea2cd959c93118973f9a81017852b32415f12346d539b47e845cb5383dc523e888b2e02059a9ddfc339bb7c411675a56cd0cdf29026ba12368a70fb36d5346d2
-
Filesize
404KB
MD5b5294723e53d432ada626c484adddcfe
SHA157dbeb0b8ca2f365e72b5feaa7510d56aa2517c7
SHA2560dbcbbd6e2977f2576439c454e09aec6ec1d924c677dd9c3c73700ee3b2fb2ac
SHA512ea2cd959c93118973f9a81017852b32415f12346d539b47e845cb5383dc523e888b2e02059a9ddfc339bb7c411675a56cd0cdf29026ba12368a70fb36d5346d2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD57d135ff33bc42fe1bedbc696d016318b
SHA1b90a2662f61f9c158e21d1042600b91d887ed8e5
SHA2568fe5096c6af89ebdb0f91e3015bf42dfe41d011ef45b117580a298e03eb7b2bf
SHA5127657be222c3c86069ac34eb81493d721a475c1179c0742fd695bc6cba71f633e0ed434bc5762527027adcaffcdbf1c987445e23f1560695e4cd4a12c914e658b
-
Filesize
361KB
MD57d135ff33bc42fe1bedbc696d016318b
SHA1b90a2662f61f9c158e21d1042600b91d887ed8e5
SHA2568fe5096c6af89ebdb0f91e3015bf42dfe41d011ef45b117580a298e03eb7b2bf
SHA5127657be222c3c86069ac34eb81493d721a475c1179c0742fd695bc6cba71f633e0ed434bc5762527027adcaffcdbf1c987445e23f1560695e4cd4a12c914e658b