Analysis
-
max time kernel
76s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:33
Static task
static1
General
-
Target
6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe
-
Size
558KB
-
MD5
1004eebf7b44d3dac4208fd04b73beb9
-
SHA1
d6736fd753aef4ea734a78cf0a4aa2fe0a91637b
-
SHA256
6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83
-
SHA512
fb04b42d5aa0a5bd9fe382bccb2aa716fb6c28f37a97a189fdfdfa8b95c1f973ef4e05e496cf220c3a6cbc80b6067b98c5914b4cf271f4db506a5344faacf228
-
SSDEEP
12288:Hy90/cUHpWKDkycAyeN1fBy84KpcRL1FmZagVn:HyXMua1pN4Kp+L1Fiaan
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it602635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it602635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it602635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it602635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it602635.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it602635.exe -
Executes dropped EXE 4 IoCs
pid Process 4464 ziJn5128.exe 2360 it602635.exe 4092 kp094202.exe 4584 lr228620.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it602635.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJn5128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJn5128.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 768 4092 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2360 it602635.exe 2360 it602635.exe 4092 kp094202.exe 4092 kp094202.exe 4584 lr228620.exe 4584 lr228620.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2360 it602635.exe Token: SeDebugPrivilege 4092 kp094202.exe Token: SeDebugPrivilege 4584 lr228620.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4464 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 85 PID 1656 wrote to memory of 4464 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 85 PID 1656 wrote to memory of 4464 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 85 PID 4464 wrote to memory of 2360 4464 ziJn5128.exe 86 PID 4464 wrote to memory of 2360 4464 ziJn5128.exe 86 PID 4464 wrote to memory of 4092 4464 ziJn5128.exe 87 PID 4464 wrote to memory of 4092 4464 ziJn5128.exe 87 PID 4464 wrote to memory of 4092 4464 ziJn5128.exe 87 PID 1656 wrote to memory of 4584 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 90 PID 1656 wrote to memory of 4584 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 90 PID 1656 wrote to memory of 4584 1656 6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe"C:\Users\Admin\AppData\Local\Temp\6b23d0bf5ebe1b5add5f2a1642b4c0d2d544a9ed5293072361ad0e3d1eb71a83.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJn5128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJn5128.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it602635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it602635.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp094202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp094202.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 13204⤵
- Program crash
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228620.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4092 -ip 40921⤵PID:3632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
404KB
MD5619c97e9e69f44b2881e12cdda6e1f52
SHA15340f0f98a5acb890118f23c3ab883ce0a66f05e
SHA256291922fa945c97d782ac9021096bffd60e087290de781a8f708107cbdb8a7705
SHA51299a87beec1fb513c3eb9e40599b4219f359d1bd793c280645f3afeacf090c0df6acc7a4648ae53a05c7d0658416796935fd6a7c4ed2b1005ec42ca5ad93ee594
-
Filesize
404KB
MD5619c97e9e69f44b2881e12cdda6e1f52
SHA15340f0f98a5acb890118f23c3ab883ce0a66f05e
SHA256291922fa945c97d782ac9021096bffd60e087290de781a8f708107cbdb8a7705
SHA51299a87beec1fb513c3eb9e40599b4219f359d1bd793c280645f3afeacf090c0df6acc7a4648ae53a05c7d0658416796935fd6a7c4ed2b1005ec42ca5ad93ee594
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD52a37fd7547828e28a92ea42b845a605f
SHA12d1c6adae8dc1c8a075fa7af28b8d909da9d4a63
SHA2561166efcf77e266404c4e5fb238295c17838fbbffc39a5e87a7686a6efc8e2093
SHA512d635aaa3598cb148943ed7125718908a8756bc4719f1b197b5fed280f8b4011b1581eb1725e1641f9683890661e3ffbc0b5ff7748021aae9d3a97f81e293c360
-
Filesize
360KB
MD52a37fd7547828e28a92ea42b845a605f
SHA12d1c6adae8dc1c8a075fa7af28b8d909da9d4a63
SHA2561166efcf77e266404c4e5fb238295c17838fbbffc39a5e87a7686a6efc8e2093
SHA512d635aaa3598cb148943ed7125718908a8756bc4719f1b197b5fed280f8b4011b1581eb1725e1641f9683890661e3ffbc0b5ff7748021aae9d3a97f81e293c360