Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 22:12
Static task
static1
General
-
Target
71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe
-
Size
694KB
-
MD5
db0a3ab1ecc9016cd406d8ee8d500739
-
SHA1
aca142d0ee07098cea6f1a525a9ce3e683861a8b
-
SHA256
71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb
-
SHA512
3f3ad90a85d52977728f0600158af2da3994af422fbb9c76e2eff5e33455544fc26af09fe6a9c93fb64eb3d4c0b68c22e9f1d2c606d3ff75f77ae573e2e080fe
-
SSDEEP
12288:ay90cmp1cgFePaUeWbEJWa83oMRmNmQT7DllaMxUB5zhZi9SY:ayocSWaUeWbvzoMkNJJXWRY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr478867.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr478867.exe -
Executes dropped EXE 4 IoCs
pid Process 2652 un853150.exe 1196 pr478867.exe 2708 qu456147.exe 4440 si623085.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr478867.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un853150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un853150.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4780 1196 WerFault.exe 85 4752 2708 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1196 pr478867.exe 1196 pr478867.exe 2708 qu456147.exe 2708 qu456147.exe 4440 si623085.exe 4440 si623085.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1196 pr478867.exe Token: SeDebugPrivilege 2708 qu456147.exe Token: SeDebugPrivilege 4440 si623085.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 2652 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 956 wrote to memory of 2652 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 956 wrote to memory of 2652 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 2652 wrote to memory of 1196 2652 un853150.exe 85 PID 2652 wrote to memory of 1196 2652 un853150.exe 85 PID 2652 wrote to memory of 1196 2652 un853150.exe 85 PID 2652 wrote to memory of 2708 2652 un853150.exe 91 PID 2652 wrote to memory of 2708 2652 un853150.exe 91 PID 2652 wrote to memory of 2708 2652 un853150.exe 91 PID 956 wrote to memory of 4440 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 95 PID 956 wrote to memory of 4440 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 95 PID 956 wrote to memory of 4440 956 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10844⤵
- Program crash
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 13324⤵
- Program crash
PID:4752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si623085.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1196 -ip 11961⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2708 -ip 27081⤵PID:4408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
541KB
MD5bcdef6c5da03c91b6c4ee75e21188a2f
SHA161f02c00cd4e163856a7dae3fa482af834af23e1
SHA256e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69
SHA512ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2
-
Filesize
541KB
MD5bcdef6c5da03c91b6c4ee75e21188a2f
SHA161f02c00cd4e163856a7dae3fa482af834af23e1
SHA256e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69
SHA512ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2
-
Filesize
278KB
MD555035719f1967b40a21bd260f4e40da8
SHA13db0f8d1d38a37c525391720b30de411534138c5
SHA256b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7
SHA5127e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985
-
Filesize
278KB
MD555035719f1967b40a21bd260f4e40da8
SHA13db0f8d1d38a37c525391720b30de411534138c5
SHA256b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7
SHA5127e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985
-
Filesize
361KB
MD588d1ca5e656cd3223240e232767762ea
SHA10e52da74d0a30764cd88a2db1b2857f7f6cf971d
SHA256ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a
SHA51224a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c
-
Filesize
361KB
MD588d1ca5e656cd3223240e232767762ea
SHA10e52da74d0a30764cd88a2db1b2857f7f6cf971d
SHA256ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a
SHA51224a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c