Analysis
-
max time kernel
86s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 22:21
Static task
static1
General
-
Target
ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe
-
Size
695KB
-
MD5
1239093211c344fd497ac8ce854a81bb
-
SHA1
56b7d01c64b039dae9d5afc77274c0b982c68b57
-
SHA256
ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179
-
SHA512
547e9713846cae65f861c8e5cf7614e2733d631f0d500ac9a41444b2000a70ee3fd6c4292ad3767f949485819673af482157f838f565617c3911d4d0d2f4abe4
-
SSDEEP
12288:oy904lmpkkpEP2tXjsrV6T7uvYJ66jLTZuYeOcYKM/+6p:oyBdVPUX8V6T7uvYJxjBuYV3np
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr780225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr780225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr780225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr780225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr780225.exe -
Executes dropped EXE 4 IoCs
pid Process 2504 un748169.exe 2960 pr780225.exe 3520 qu545464.exe 1716 si537917.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr780225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr780225.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un748169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un748169.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2960 pr780225.exe 2960 pr780225.exe 3520 qu545464.exe 3520 qu545464.exe 1716 si537917.exe 1716 si537917.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2960 pr780225.exe Token: SeDebugPrivilege 3520 qu545464.exe Token: SeDebugPrivilege 1716 si537917.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2504 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 66 PID 2468 wrote to memory of 2504 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 66 PID 2468 wrote to memory of 2504 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 66 PID 2504 wrote to memory of 2960 2504 un748169.exe 67 PID 2504 wrote to memory of 2960 2504 un748169.exe 67 PID 2504 wrote to memory of 2960 2504 un748169.exe 67 PID 2504 wrote to memory of 3520 2504 un748169.exe 68 PID 2504 wrote to memory of 3520 2504 un748169.exe 68 PID 2504 wrote to memory of 3520 2504 un748169.exe 68 PID 2468 wrote to memory of 1716 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 70 PID 2468 wrote to memory of 1716 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 70 PID 2468 wrote to memory of 1716 2468 ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe"C:\Users\Admin\AppData\Local\Temp\ef33050376d4324a3ecd16997987965f08476497f390da0cd2310027e62b4179.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr780225.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu545464.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si537917.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
542KB
MD5e944f3eb0f3097e99dc4dd30b12d8381
SHA17f81fb412dfddcffa5ee0bbf758ef0fb60a7ea2b
SHA25654ea8a0eb0e35707a94646dcc399525a39726cb9bc8f34d1ba92f478d4935aa5
SHA512d095d4fd528e06aba1cc4da67a8642d44234886f3a0188f2b2c07cc4d8400a57503d43f32d5c36d432f8780dd13ca6b2d74503790ae581d4e5511b903a8d2326
-
Filesize
542KB
MD5e944f3eb0f3097e99dc4dd30b12d8381
SHA17f81fb412dfddcffa5ee0bbf758ef0fb60a7ea2b
SHA25654ea8a0eb0e35707a94646dcc399525a39726cb9bc8f34d1ba92f478d4935aa5
SHA512d095d4fd528e06aba1cc4da67a8642d44234886f3a0188f2b2c07cc4d8400a57503d43f32d5c36d432f8780dd13ca6b2d74503790ae581d4e5511b903a8d2326
-
Filesize
269KB
MD53ac03fb44cf10601101f49a2d78323c2
SHA1b6a93be902ad12757011b0668fdea3ef7de3e1f9
SHA256a96590f40a2db25be04529245265f9649a24eaaf5027654ea44e6d20a09f6790
SHA512c2a622f1f846536c8b8f54643c4b79fb0db03a4bd028b998084a9a52df39226ee4bbefa9536f74cb919c50f16595006a7f49c55eec8e205ca452d47c3514461b
-
Filesize
269KB
MD53ac03fb44cf10601101f49a2d78323c2
SHA1b6a93be902ad12757011b0668fdea3ef7de3e1f9
SHA256a96590f40a2db25be04529245265f9649a24eaaf5027654ea44e6d20a09f6790
SHA512c2a622f1f846536c8b8f54643c4b79fb0db03a4bd028b998084a9a52df39226ee4bbefa9536f74cb919c50f16595006a7f49c55eec8e205ca452d47c3514461b
-
Filesize
351KB
MD5e1fb4b60a0f8ed00fd5d9cdc1b768f2b
SHA1a1e5486bc40cdfd859d8e56eb1f426e4e6441ada
SHA256a8c03a14f8e270a671f35485054be597f401cb3986cce3b165a19105fcbedaf9
SHA512feb0b06af56565840f79e298095039b585d82ca3d5e40333ba78ccd8d3849da25342edb74c7b484667046ed97f30ab52bad1af1e89c8b6ea8ee3440d0309d30f
-
Filesize
351KB
MD5e1fb4b60a0f8ed00fd5d9cdc1b768f2b
SHA1a1e5486bc40cdfd859d8e56eb1f426e4e6441ada
SHA256a8c03a14f8e270a671f35485054be597f401cb3986cce3b165a19105fcbedaf9
SHA512feb0b06af56565840f79e298095039b585d82ca3d5e40333ba78ccd8d3849da25342edb74c7b484667046ed97f30ab52bad1af1e89c8b6ea8ee3440d0309d30f