Analysis
-
max time kernel
145s -
max time network
91s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/04/2023, 16:05
Static task
static1
General
-
Target
2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe
-
Size
808KB
-
MD5
ac5ee19d310ed4119e756e876914718d
-
SHA1
51011b8417b2fc24e7822ac2d711cb787f44021c
-
SHA256
2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0
-
SHA512
0a226772f3188569cd5647b0af4c608dee8a88bea5dcbee659bf26995e5b16230ccc30077e26a8d3f76b93c27dfb4eacb21716ecee49e7fd1b3d1a774f926652
-
SSDEEP
24576:KybXC7MuguZZkUK+ej8tRZ144Y2SRyF+K:RbXi/e+ZY9y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it909656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it909656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it909656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it909656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it909656.exe -
Executes dropped EXE 6 IoCs
pid Process 4092 zihT4131.exe 4148 ziTe1544.exe 4236 it909656.exe 4264 jr152026.exe 2744 kp787154.exe 2124 lr483888.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it909656.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihT4131.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihT4131.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTe1544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziTe1544.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3508 2124 WerFault.exe 72 4100 2124 WerFault.exe 72 4824 2124 WerFault.exe 72 4844 2124 WerFault.exe 72 4276 2124 WerFault.exe 72 1800 2124 WerFault.exe 72 3988 2124 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4236 it909656.exe 4236 it909656.exe 4264 jr152026.exe 4264 jr152026.exe 2744 kp787154.exe 2744 kp787154.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4236 it909656.exe Token: SeDebugPrivilege 4264 jr152026.exe Token: SeDebugPrivilege 2744 kp787154.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 396 wrote to memory of 4092 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 66 PID 396 wrote to memory of 4092 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 66 PID 396 wrote to memory of 4092 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 66 PID 4092 wrote to memory of 4148 4092 zihT4131.exe 67 PID 4092 wrote to memory of 4148 4092 zihT4131.exe 67 PID 4092 wrote to memory of 4148 4092 zihT4131.exe 67 PID 4148 wrote to memory of 4236 4148 ziTe1544.exe 68 PID 4148 wrote to memory of 4236 4148 ziTe1544.exe 68 PID 4148 wrote to memory of 4264 4148 ziTe1544.exe 69 PID 4148 wrote to memory of 4264 4148 ziTe1544.exe 69 PID 4148 wrote to memory of 4264 4148 ziTe1544.exe 69 PID 4092 wrote to memory of 2744 4092 zihT4131.exe 71 PID 4092 wrote to memory of 2744 4092 zihT4131.exe 71 PID 4092 wrote to memory of 2744 4092 zihT4131.exe 71 PID 396 wrote to memory of 2124 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 72 PID 396 wrote to memory of 2124 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 72 PID 396 wrote to memory of 2124 396 2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe"C:\Users\Admin\AppData\Local\Temp\2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exe2⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6203⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 7003⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8403⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8483⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8803⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8883⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 10803⤵
- Program crash
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD51c6a642d9c07eadf9d5858a8d9023f35
SHA1f3416b9bf9a408a57f28f7a1a4cf22a249ab1d8d
SHA25625a3936838b0e0cbe901e148d93f60c513a0ec08f6e8404bbe090041df70e624
SHA512a05f4e11d4c5ccc61307b10244c5e2fb4e8d739a199b87a7f31db692e2024e6ffca92294ed8400b1e0e25dd96c71e76f9916391734b9f6e51fe6a8807433e390
-
Filesize
258KB
MD51c6a642d9c07eadf9d5858a8d9023f35
SHA1f3416b9bf9a408a57f28f7a1a4cf22a249ab1d8d
SHA25625a3936838b0e0cbe901e148d93f60c513a0ec08f6e8404bbe090041df70e624
SHA512a05f4e11d4c5ccc61307b10244c5e2fb4e8d739a199b87a7f31db692e2024e6ffca92294ed8400b1e0e25dd96c71e76f9916391734b9f6e51fe6a8807433e390
-
Filesize
552KB
MD5b68b9697ee4e83db726ce061325e5cae
SHA151bda246684f67867134529ccd1043d7bd472a54
SHA2562c3c63fafa7933c8ab87c5b09f51e3fe38b49c848a65b7d1013f141016f1ffdb
SHA512706ddef7cda30bd92747af8cac94da17cb80f63a02fc5b43cfc62e74e3c28b8154fdbf8fba3531cc68dbeb2675f5d54eac57771ba3908ff27914c5bc03544e71
-
Filesize
552KB
MD5b68b9697ee4e83db726ce061325e5cae
SHA151bda246684f67867134529ccd1043d7bd472a54
SHA2562c3c63fafa7933c8ab87c5b09f51e3fe38b49c848a65b7d1013f141016f1ffdb
SHA512706ddef7cda30bd92747af8cac94da17cb80f63a02fc5b43cfc62e74e3c28b8154fdbf8fba3531cc68dbeb2675f5d54eac57771ba3908ff27914c5bc03544e71
-
Filesize
136KB
MD5e48a471cb7bc4ff6a6b32ae6d192dbbb
SHA1d38181853eccf41490641e35b9f2b13e1f6d1711
SHA256ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c
SHA512dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6
-
Filesize
136KB
MD5e48a471cb7bc4ff6a6b32ae6d192dbbb
SHA1d38181853eccf41490641e35b9f2b13e1f6d1711
SHA256ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c
SHA512dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6
-
Filesize
398KB
MD5a8ad9301f3e0e1ad72c696129b1063d4
SHA15f06b90d2132bab92a0cec5afe2abcd7304411df
SHA256d3d733904238bd9259a23efa190e315ba2d90eadd34303c7c5db7d89666ddfb5
SHA51251d0787239d5b0e484fdbed0058efa535cda308cbd661bca1699945ed49461ee8f1c1250e91d4442add7642d68f0761f34431d4c0d9275d74bb9fd69ed27c314
-
Filesize
398KB
MD5a8ad9301f3e0e1ad72c696129b1063d4
SHA15f06b90d2132bab92a0cec5afe2abcd7304411df
SHA256d3d733904238bd9259a23efa190e315ba2d90eadd34303c7c5db7d89666ddfb5
SHA51251d0787239d5b0e484fdbed0058efa535cda308cbd661bca1699945ed49461ee8f1c1250e91d4442add7642d68f0761f34431d4c0d9275d74bb9fd69ed27c314
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
350KB
MD57f5558bbce577f81e728d7c5fb7d95c0
SHA1b62c19684fd3cc55bc381ada60b047448478a0f1
SHA256c05b51f75d583ce9b9774bcd92002c0ac11dfa6b6d08b3f410658ec9885270bb
SHA512d7a3ddf2d6e19c81c649a4e956cf83f1e42c433e1ae77f5dcbf1f94d21f0aa253af1cd716be30e442eedf303e062082536c0948431226d466349cf704b1f89e9
-
Filesize
350KB
MD57f5558bbce577f81e728d7c5fb7d95c0
SHA1b62c19684fd3cc55bc381ada60b047448478a0f1
SHA256c05b51f75d583ce9b9774bcd92002c0ac11dfa6b6d08b3f410658ec9885270bb
SHA512d7a3ddf2d6e19c81c649a4e956cf83f1e42c433e1ae77f5dcbf1f94d21f0aa253af1cd716be30e442eedf303e062082536c0948431226d466349cf704b1f89e9