Analysis
-
max time kernel
57s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 02:03
Static task
static1
General
-
Target
068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe
-
Size
706KB
-
MD5
11c55b1632caaf8bb0a82eae4dc4c380
-
SHA1
d0bf9dd3af21747c804585065121f2b3744a8000
-
SHA256
068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5
-
SHA512
4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2
-
SSDEEP
12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr678035.exe -
Executes dropped EXE 4 IoCs
pid Process 2520 un788801.exe 2588 pr678035.exe 2808 qu384654.exe 2484 si363561.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr678035.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr678035.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un788801.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un788801.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2588 pr678035.exe 2588 pr678035.exe 2808 qu384654.exe 2808 qu384654.exe 2484 si363561.exe 2484 si363561.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2588 pr678035.exe Token: SeDebugPrivilege 2808 qu384654.exe Token: SeDebugPrivilege 2484 si363561.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2520 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 66 PID 2332 wrote to memory of 2520 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 66 PID 2332 wrote to memory of 2520 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 66 PID 2520 wrote to memory of 2588 2520 un788801.exe 67 PID 2520 wrote to memory of 2588 2520 un788801.exe 67 PID 2520 wrote to memory of 2588 2520 un788801.exe 67 PID 2520 wrote to memory of 2808 2520 un788801.exe 68 PID 2520 wrote to memory of 2808 2520 un788801.exe 68 PID 2520 wrote to memory of 2808 2520 un788801.exe 68 PID 2332 wrote to memory of 2484 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 70 PID 2332 wrote to memory of 2484 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 70 PID 2332 wrote to memory of 2484 2332 068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe"C:\Users\Admin\AppData\Local\Temp\068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788801.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788801.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr678035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr678035.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu384654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu384654.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363561.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD5fdadb6139b9a0b2799e5293d77451078
SHA1b91c278b984891a1a9738f241c3bd6c65c5c7b46
SHA2564f508ee7263f85b337632c8c65120ee070f6d6ab8a7816389a9d026104bc4065
SHA5126f79d6bd92160c53e10fadd38a0d9a588e431f7700f62df482c3428816563538ea2ffbd7747eead2463bddcc837910da2213654e660ad0966d2535b83b8d2993
-
Filesize
552KB
MD5fdadb6139b9a0b2799e5293d77451078
SHA1b91c278b984891a1a9738f241c3bd6c65c5c7b46
SHA2564f508ee7263f85b337632c8c65120ee070f6d6ab8a7816389a9d026104bc4065
SHA5126f79d6bd92160c53e10fadd38a0d9a588e431f7700f62df482c3428816563538ea2ffbd7747eead2463bddcc837910da2213654e660ad0966d2535b83b8d2993
-
Filesize
299KB
MD52f8a8205839f16234cb8cade2bbb9fbd
SHA147e723084212e40ef93c586a8f00acfa6326c823
SHA256aa23fe1c23c14e5c15e989cff511acdfa3ecbe9dd5e0225448f61b27edc2429a
SHA51279d5ec596a3eebe96b15db44d09e3205a776713ff8376c0ef28443c095a57a592141cb9b95b7d35e1106b5e885401851fc0939ef163aaf78e9f615d50d1d9d2e
-
Filesize
299KB
MD52f8a8205839f16234cb8cade2bbb9fbd
SHA147e723084212e40ef93c586a8f00acfa6326c823
SHA256aa23fe1c23c14e5c15e989cff511acdfa3ecbe9dd5e0225448f61b27edc2429a
SHA51279d5ec596a3eebe96b15db44d09e3205a776713ff8376c0ef28443c095a57a592141cb9b95b7d35e1106b5e885401851fc0939ef163aaf78e9f615d50d1d9d2e
-
Filesize
381KB
MD56d15285100637907a29d7493529dfab1
SHA10e2b458a92ede49930b092d86f9bca5a76b13a8c
SHA2569ab04cdb54fe732cd58c803788d5f13822a1548c50901135869c9fbf7717ca3f
SHA512e7d7a22d25ace90db1c71bcb696051aba4dc4f3d58f992fada645def185b0f99bb663ff3d7e495d095f214f27581288d1f2bd472389e2389cf80099e455c5f5e
-
Filesize
381KB
MD56d15285100637907a29d7493529dfab1
SHA10e2b458a92ede49930b092d86f9bca5a76b13a8c
SHA2569ab04cdb54fe732cd58c803788d5f13822a1548c50901135869c9fbf7717ca3f
SHA512e7d7a22d25ace90db1c71bcb696051aba4dc4f3d58f992fada645def185b0f99bb663ff3d7e495d095f214f27581288d1f2bd472389e2389cf80099e455c5f5e