Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 02:00
Static task
static1
General
-
Target
2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe
-
Size
568KB
-
MD5
9e64bb9cbfdfd6f5ef2f426e4e305c0c
-
SHA1
dac3cff0a3de05be1d9f26ada41f2e3dc2cbd642
-
SHA256
2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2
-
SHA512
95e1c212fa856c49e2bc725c739e3f8dc703e648bc96224f283a3a45bc9e08c29005bfb9510e93361618d8b899ee8a990337dca329a241e9482ead0648cdb39e
-
SSDEEP
12288:Fy90DKdnyIvGaopZfN/mxrhiYtOmPdE2+eI7KGvB:FyCQnBJopZl/HYtho9Kc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it249013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it249013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it249013.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it249013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it249013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it249013.exe -
Executes dropped EXE 4 IoCs
pid Process 2220 ziGt1667.exe 2072 it249013.exe 3380 kp879742.exe 4772 lr167952.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it249013.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGt1667.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGt1667.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4236 3380 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 it249013.exe 2072 it249013.exe 3380 kp879742.exe 3380 kp879742.exe 4772 lr167952.exe 4772 lr167952.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2072 it249013.exe Token: SeDebugPrivilege 3380 kp879742.exe Token: SeDebugPrivilege 4772 lr167952.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2220 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 86 PID 1756 wrote to memory of 2220 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 86 PID 1756 wrote to memory of 2220 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 86 PID 2220 wrote to memory of 2072 2220 ziGt1667.exe 87 PID 2220 wrote to memory of 2072 2220 ziGt1667.exe 87 PID 2220 wrote to memory of 3380 2220 ziGt1667.exe 91 PID 2220 wrote to memory of 3380 2220 ziGt1667.exe 91 PID 2220 wrote to memory of 3380 2220 ziGt1667.exe 91 PID 1756 wrote to memory of 4772 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 94 PID 1756 wrote to memory of 4772 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 94 PID 1756 wrote to memory of 4772 1756 2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe"C:\Users\Admin\AppData\Local\Temp\2ccaced40647d5add8e884879de2b5f06fb54b625bef6881c3afe918dd0608e2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGt1667.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it249013.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp879742.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 20044⤵
- Program crash
PID:4236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr167952.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3380 -ip 33801⤵PID:392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD5a2b1374993fcda11a8dfa8c528a4be9b
SHA10608a55f85ce500bc6b7f6aaf4f6766e16115a06
SHA256e6bd1f5206613794d33b469d0457f5bd45c8539a314058e683c86726331fbefe
SHA512149da8976f7b01e6de562219635da2026f0373c3fd282371ad9522ba00f52822cc0211e91cc615a04a13862b2bd27e09b4c0c62d3741d115cc348c425f7c037f
-
Filesize
414KB
MD5a2b1374993fcda11a8dfa8c528a4be9b
SHA10608a55f85ce500bc6b7f6aaf4f6766e16115a06
SHA256e6bd1f5206613794d33b469d0457f5bd45c8539a314058e683c86726331fbefe
SHA512149da8976f7b01e6de562219635da2026f0373c3fd282371ad9522ba00f52822cc0211e91cc615a04a13862b2bd27e09b4c0c62d3741d115cc348c425f7c037f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
381KB
MD544eca4dfe4926d4d0dff3a7aafab6fcb
SHA1d43dd39c1fd5ae03d9d6cce0c2d51b95ee1a3b8b
SHA2569398a05e57b5c1470f9aa1f37b63d645bfd7ddd01be120265d7e1fe471acc87b
SHA5121cf1ee314252515defa7b463c08d0940a13f9e67b57bede56d7cd7f35fbbb057ccd93d0f16fb95a4e89ecb31c4ede86f3622b5718cd1ddd6099d52b330ea1784
-
Filesize
381KB
MD544eca4dfe4926d4d0dff3a7aafab6fcb
SHA1d43dd39c1fd5ae03d9d6cce0c2d51b95ee1a3b8b
SHA2569398a05e57b5c1470f9aa1f37b63d645bfd7ddd01be120265d7e1fe471acc87b
SHA5121cf1ee314252515defa7b463c08d0940a13f9e67b57bede56d7cd7f35fbbb057ccd93d0f16fb95a4e89ecb31c4ede86f3622b5718cd1ddd6099d52b330ea1784