Analysis
-
max time kernel
71s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 23:02
Static task
static1
General
-
Target
686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe
-
Size
559KB
-
MD5
ee695932f1c8f73c6bbf266ba6c79e1b
-
SHA1
fe2cc4cd0e48d2db0fca4897f153edf807c0797f
-
SHA256
686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3
-
SHA512
e42f9031b2014047e9b6388822c5a01df255349a5e963e37366a148ed68e31154eaed6c59d8b130c1872f2e00765720e82b34c9aade3131ba39bcd69d652404e
-
SSDEEP
12288:1y902ltczJNnn0k/UAXc6u7lEca/OJm0UjE:1yXczJBn0k/jTu7au+E
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it502296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it502296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it502296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it502296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it502296.exe -
Executes dropped EXE 4 IoCs
pid Process 4180 ziOh6879.exe 3916 it502296.exe 4904 kp060076.exe 2156 lr561203.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it502296.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOh6879.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOh6879.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3916 it502296.exe 3916 it502296.exe 4904 kp060076.exe 4904 kp060076.exe 2156 lr561203.exe 2156 lr561203.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3916 it502296.exe Token: SeDebugPrivilege 4904 kp060076.exe Token: SeDebugPrivilege 2156 lr561203.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4180 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 66 PID 3640 wrote to memory of 4180 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 66 PID 3640 wrote to memory of 4180 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 66 PID 4180 wrote to memory of 3916 4180 ziOh6879.exe 67 PID 4180 wrote to memory of 3916 4180 ziOh6879.exe 67 PID 4180 wrote to memory of 4904 4180 ziOh6879.exe 68 PID 4180 wrote to memory of 4904 4180 ziOh6879.exe 68 PID 4180 wrote to memory of 4904 4180 ziOh6879.exe 68 PID 3640 wrote to memory of 2156 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 70 PID 3640 wrote to memory of 2156 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 70 PID 3640 wrote to memory of 2156 3640 686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe"C:\Users\Admin\AppData\Local\Temp\686471457009d9c7c4d56cd1b3cdd3f4e63509dbe6c11442fea21fa5d14d34c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOh6879.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOh6879.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it502296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it502296.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp060076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp060076.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr561203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr561203.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
405KB
MD5ca00b884f96c5024128f1b0165cefb24
SHA16db50683316331c02100d21f7053219d51bea7da
SHA256779360f58f846cfc3595c06f82a737829e22924dead1bbc548d11e275ac9b270
SHA512801441a894697fedc85024cb3a1004ffa323f8d3b42f3f44b32cb89831706a227abbe19a4327b2bc0567b420800b5dfc3e3e101ef77ada22572c41eb45634bca
-
Filesize
405KB
MD5ca00b884f96c5024128f1b0165cefb24
SHA16db50683316331c02100d21f7053219d51bea7da
SHA256779360f58f846cfc3595c06f82a737829e22924dead1bbc548d11e275ac9b270
SHA512801441a894697fedc85024cb3a1004ffa323f8d3b42f3f44b32cb89831706a227abbe19a4327b2bc0567b420800b5dfc3e3e101ef77ada22572c41eb45634bca
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5743033b8a3ecab52677d732a29246cca
SHA13b3cb4e83cd2dce8e0974174831c2d336fb4a3d7
SHA2566e942bce6a326bb47961b0826be2fdfd8a7e78b768f3376c3d5c34233cc16786
SHA51236dac360c4391f67b9c9e15ccb38984bea5f5e6c493e9d873d048498ebb7e6e330063b027585439b30f85dc1c59d000b32a6e7e4933715ec0679b558a1844e86
-
Filesize
351KB
MD5743033b8a3ecab52677d732a29246cca
SHA13b3cb4e83cd2dce8e0974174831c2d336fb4a3d7
SHA2566e942bce6a326bb47961b0826be2fdfd8a7e78b768f3376c3d5c34233cc16786
SHA51236dac360c4391f67b9c9e15ccb38984bea5f5e6c493e9d873d048498ebb7e6e330063b027585439b30f85dc1c59d000b32a6e7e4933715ec0679b558a1844e86