Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 01:50
Static task
static1
General
-
Target
1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe
-
Size
706KB
-
MD5
e68677134d6806da3463d208a000e4f0
-
SHA1
f4b38693d351a711d8d67f8bcfca12ce137b4b4e
-
SHA256
1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f
-
SHA512
47d74c700d69bddc3f7c4a75742b87575b7118b824254bde197c9d3796e55f458a4ee64bbc9936ae4ed204762a0a820f837a17847184501be0a7a4b9cbc49bc1
-
SSDEEP
12288:py90lzrm1rN7j+0eAhnO8E5j71grAiUYOvDoEp67vJr:pyQrm1rNTA8i8UY4yBr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr091931.exe -
Executes dropped EXE 4 IoCs
pid Process 4704 un571843.exe 4548 pr091931.exe 5112 qu420161.exe 2996 si450391.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr091931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr091931.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un571843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un571843.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 448 4548 WerFault.exe 85 2480 5112 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4548 pr091931.exe 4548 pr091931.exe 5112 qu420161.exe 5112 qu420161.exe 2996 si450391.exe 2996 si450391.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4548 pr091931.exe Token: SeDebugPrivilege 5112 qu420161.exe Token: SeDebugPrivilege 2996 si450391.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4704 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 84 PID 5032 wrote to memory of 4704 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 84 PID 5032 wrote to memory of 4704 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 84 PID 4704 wrote to memory of 4548 4704 un571843.exe 85 PID 4704 wrote to memory of 4548 4704 un571843.exe 85 PID 4704 wrote to memory of 4548 4704 un571843.exe 85 PID 4704 wrote to memory of 5112 4704 un571843.exe 91 PID 4704 wrote to memory of 5112 4704 un571843.exe 91 PID 4704 wrote to memory of 5112 4704 un571843.exe 91 PID 5032 wrote to memory of 2996 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 94 PID 5032 wrote to memory of 2996 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 94 PID 5032 wrote to memory of 2996 5032 1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe"C:\Users\Admin\AppData\Local\Temp\1a489cb01f9e0ff8257e385ceab0ffac862d933f27bdd51c09763c83d34ccf4f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571843.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571843.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr091931.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr091931.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10804⤵
- Program crash
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu420161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu420161.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 20724⤵
- Program crash
PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450391.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4548 -ip 45481⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5112 -ip 51121⤵PID:2248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD51d05e40c880c6be64ceb6f2a9e5d836e
SHA1ca63bfb296a61c02fa08e20b2edbf82a3d681b3f
SHA2563a50ca79d3dd7bcc25bcbac248213972738e4d01a39e4d6736405a7b35c6b2df
SHA512af7a5f2ad63a9001aaf01ee1d26ceb456a7c413e86127ca22b2f91303af776c7e17aa5ff797e3d0f1ad9c109218ea42712d9662d16ec8317f0e3d11214a22832
-
Filesize
552KB
MD51d05e40c880c6be64ceb6f2a9e5d836e
SHA1ca63bfb296a61c02fa08e20b2edbf82a3d681b3f
SHA2563a50ca79d3dd7bcc25bcbac248213972738e4d01a39e4d6736405a7b35c6b2df
SHA512af7a5f2ad63a9001aaf01ee1d26ceb456a7c413e86127ca22b2f91303af776c7e17aa5ff797e3d0f1ad9c109218ea42712d9662d16ec8317f0e3d11214a22832
-
Filesize
299KB
MD589e54b667d5a476b4f559b0ae2ee9a51
SHA1de3040df8943e41a7ad971c7503c47f72e18c12d
SHA256363c1cbf6f6424cfab5b694aae27192d97e681e2f9d3fce8e1a4e955980f3b32
SHA512d3ebe17463fe53193b2bd636ce5820be0166132384d1b571efa96d693206152d5a21ea862427bbd6fb9f3aa953f7e9f9a09c8e0ce28cc1590a41b14e11b1e702
-
Filesize
299KB
MD589e54b667d5a476b4f559b0ae2ee9a51
SHA1de3040df8943e41a7ad971c7503c47f72e18c12d
SHA256363c1cbf6f6424cfab5b694aae27192d97e681e2f9d3fce8e1a4e955980f3b32
SHA512d3ebe17463fe53193b2bd636ce5820be0166132384d1b571efa96d693206152d5a21ea862427bbd6fb9f3aa953f7e9f9a09c8e0ce28cc1590a41b14e11b1e702
-
Filesize
381KB
MD534db97f74bd9340fcc04459fff436554
SHA141900e05cdaf0e90115b1e3bf1ddd3f2a908d050
SHA25670ae5dd724eb7e3419f719514ed07ea21e7c9f01c42deb4bee4ab085e84d3df5
SHA51293ff72877829d20e9cc1b595c2895b7f7231e4a3e870ad0a2e2a7c497dda1867f820d67fd9eb521f5c6154ce4887c18c330cde27b5f59baddd68169711721bcd
-
Filesize
381KB
MD534db97f74bd9340fcc04459fff436554
SHA141900e05cdaf0e90115b1e3bf1ddd3f2a908d050
SHA25670ae5dd724eb7e3419f719514ed07ea21e7c9f01c42deb4bee4ab085e84d3df5
SHA51293ff72877829d20e9cc1b595c2895b7f7231e4a3e870ad0a2e2a7c497dda1867f820d67fd9eb521f5c6154ce4887c18c330cde27b5f59baddd68169711721bcd