Analysis
-
max time kernel
55s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 22:35
Static task
static1
General
-
Target
112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe
-
Size
559KB
-
MD5
009fa9d083e4a55495f0e3657e95ee0e
-
SHA1
3220e7f4bebe5aa6cf9d95c3567727f8bebc2fc0
-
SHA256
112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4
-
SHA512
7ba528b3b2e95f5169221300814c4c8b5a28818745cf0d75b25807c59c020db19d9cdaee8a83f25fb0a4680dbc44d3c550fd45d6bd9c05e4e84dedf7b48e68dc
-
SSDEEP
12288:Uy90A+0JeUO3XJFw/ZKo/6ukeEcR/kD/Za+HZ:UyO0J2nw/lCukjzau
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it074449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it074449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it074449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it074449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it074449.exe -
Executes dropped EXE 4 IoCs
pid Process 4076 ziEw6446.exe 4276 it074449.exe 4988 kp381507.exe 2036 lr312733.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it074449.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEw6446.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEw6446.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 it074449.exe 4276 it074449.exe 4988 kp381507.exe 4988 kp381507.exe 2036 lr312733.exe 2036 lr312733.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4276 it074449.exe Token: SeDebugPrivilege 4988 kp381507.exe Token: SeDebugPrivilege 2036 lr312733.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4076 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 66 PID 3648 wrote to memory of 4076 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 66 PID 3648 wrote to memory of 4076 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 66 PID 4076 wrote to memory of 4276 4076 ziEw6446.exe 67 PID 4076 wrote to memory of 4276 4076 ziEw6446.exe 67 PID 4076 wrote to memory of 4988 4076 ziEw6446.exe 68 PID 4076 wrote to memory of 4988 4076 ziEw6446.exe 68 PID 4076 wrote to memory of 4988 4076 ziEw6446.exe 68 PID 3648 wrote to memory of 2036 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 70 PID 3648 wrote to memory of 2036 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 70 PID 3648 wrote to memory of 2036 3648 112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe"C:\Users\Admin\AppData\Local\Temp\112104187337757d7585e26dafd100012ae04405fede8c591d42268cb507bac4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw6446.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it074449.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp381507.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr312733.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
405KB
MD5ee3e42940707f89027331832e1b2fb80
SHA19926722b3360ef6e33aeebdef01673bb1bbbf6c5
SHA256e549a4a022162e63c75a9730f4daa95019258fb1355c20ba5863fd22248b1340
SHA5122df75a0d857d81d1e9f12825843c144f17ba2bdeaac6ab3f680a2bc1edd7198729283e58a09902b820f64a2499bbd3e671b717791c53e0a9a922383057e9e3e0
-
Filesize
405KB
MD5ee3e42940707f89027331832e1b2fb80
SHA19926722b3360ef6e33aeebdef01673bb1bbbf6c5
SHA256e549a4a022162e63c75a9730f4daa95019258fb1355c20ba5863fd22248b1340
SHA5122df75a0d857d81d1e9f12825843c144f17ba2bdeaac6ab3f680a2bc1edd7198729283e58a09902b820f64a2499bbd3e671b717791c53e0a9a922383057e9e3e0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5d93f21c48d46d276af1c36241368cd1f
SHA167bdc564bbad9d44ed1ccf4c0fd986429fcac003
SHA25655df515adcf3061267ccbffd9766afa5be646a97de267c4453b316eef8f562ac
SHA5126034ac7bd18cf41b56e7d1bec3fc8ee6b407de6ee22b922da04a4e263276e87d54100cd4832ca973e5affe4b942b3791e2ea4532ac19a09b332c31d943293ee2
-
Filesize
351KB
MD5d93f21c48d46d276af1c36241368cd1f
SHA167bdc564bbad9d44ed1ccf4c0fd986429fcac003
SHA25655df515adcf3061267ccbffd9766afa5be646a97de267c4453b316eef8f562ac
SHA5126034ac7bd18cf41b56e7d1bec3fc8ee6b407de6ee22b922da04a4e263276e87d54100cd4832ca973e5affe4b942b3791e2ea4532ac19a09b332c31d943293ee2