Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 22:40
Static task
static1
General
-
Target
08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe
-
Size
697KB
-
MD5
42aac73cddd9d225841002cc62eda5a5
-
SHA1
3a7545f5bd9f9a706a6ed982300d8886155ebbed
-
SHA256
08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130
-
SHA512
36d20f8f270e54a525e1058c7f2ec4a7bd4e500886660309d54e877e732450d3e43241a4aa541fdbfb1aa79889ca5c022ff912932315abe06a44e44018f1f6a4
-
SSDEEP
12288:by90TwHkniL1T55O1xHk7AnYigLuYYEcYrqScM30bbh3:by7Hky1/O3kknYiUuY1zcNV3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr862273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr862273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr862273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr862273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr862273.exe -
Executes dropped EXE 4 IoCs
pid Process 3628 un954941.exe 4484 pr862273.exe 3804 qu214826.exe 4112 si087535.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr862273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr862273.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un954941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un954941.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4484 pr862273.exe 4484 pr862273.exe 3804 qu214826.exe 3804 qu214826.exe 4112 si087535.exe 4112 si087535.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4484 pr862273.exe Token: SeDebugPrivilege 3804 qu214826.exe Token: SeDebugPrivilege 4112 si087535.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3628 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 66 PID 3704 wrote to memory of 3628 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 66 PID 3704 wrote to memory of 3628 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 66 PID 3628 wrote to memory of 4484 3628 un954941.exe 67 PID 3628 wrote to memory of 4484 3628 un954941.exe 67 PID 3628 wrote to memory of 4484 3628 un954941.exe 67 PID 3628 wrote to memory of 3804 3628 un954941.exe 68 PID 3628 wrote to memory of 3804 3628 un954941.exe 68 PID 3628 wrote to memory of 3804 3628 un954941.exe 68 PID 3704 wrote to memory of 4112 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 70 PID 3704 wrote to memory of 4112 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 70 PID 3704 wrote to memory of 4112 3704 08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe"C:\Users\Admin\AppData\Local\Temp\08039c3a3d64834516efea538e1ec8dc0d6bd4f0ecfe9798fddf669eac948130.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954941.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr862273.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu214826.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si087535.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
543KB
MD5cb079323feb9ee27865abaa01f875335
SHA17244dda1653d3ddc446c5a7ae284455e47ec71ac
SHA256012ec04a5e9a07d23b951e681bc9550114cf970cc1802d0b7faeda002cf3f86b
SHA512385c5b0de440006e2d89754828bf81d1fad563d989ba89959bfbabd7029b3df8a3ecdfd04884e20d31874064f32bbce9b69b60b34b25c07ab774b8b3fdabbc14
-
Filesize
543KB
MD5cb079323feb9ee27865abaa01f875335
SHA17244dda1653d3ddc446c5a7ae284455e47ec71ac
SHA256012ec04a5e9a07d23b951e681bc9550114cf970cc1802d0b7faeda002cf3f86b
SHA512385c5b0de440006e2d89754828bf81d1fad563d989ba89959bfbabd7029b3df8a3ecdfd04884e20d31874064f32bbce9b69b60b34b25c07ab774b8b3fdabbc14
-
Filesize
269KB
MD50a937ad6cb4e52e45ec2477662aca461
SHA19003c7e8a5d3dfea15a51d83650c684f176ebbd6
SHA2567393f527944364f0136568a02edd4e349db62ecff9ad6e15d257b30e20a2cad2
SHA5125d6fd274b913f2921f66a4da99347a1f79bddf6b145cfbf901e808851be1db022bfe8208e6524c33ea249faee608f31c6ec7e18d2700a7aeac67dfc5e5d0098d
-
Filesize
269KB
MD50a937ad6cb4e52e45ec2477662aca461
SHA19003c7e8a5d3dfea15a51d83650c684f176ebbd6
SHA2567393f527944364f0136568a02edd4e349db62ecff9ad6e15d257b30e20a2cad2
SHA5125d6fd274b913f2921f66a4da99347a1f79bddf6b145cfbf901e808851be1db022bfe8208e6524c33ea249faee608f31c6ec7e18d2700a7aeac67dfc5e5d0098d
-
Filesize
351KB
MD5202297a9155195b49be8ffd303348948
SHA1aab0dee3ea01548e15ebd8ee29d2f3f29593c50a
SHA2569c11d94e789c936b3f4c60cffdd43d491d88463ec3c9e6ab54e27518307f07e0
SHA5122b2072ced9e168cf67a940a40060ac6416345e261a656dc70d58f99e417155d699c18fb8c03f61c7b2c7678deeb888e252b3a0fce8b5bfbcfa8bfc90e8db97ad
-
Filesize
351KB
MD5202297a9155195b49be8ffd303348948
SHA1aab0dee3ea01548e15ebd8ee29d2f3f29593c50a
SHA2569c11d94e789c936b3f4c60cffdd43d491d88463ec3c9e6ab54e27518307f07e0
SHA5122b2072ced9e168cf67a940a40060ac6416345e261a656dc70d58f99e417155d699c18fb8c03f61c7b2c7678deeb888e252b3a0fce8b5bfbcfa8bfc90e8db97ad