Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 03:09
Static task
static1
General
-
Target
c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe
-
Size
827KB
-
MD5
c50b2697d65e82239390e29240439b31
-
SHA1
3cb10059a7e11c1087a2ba24252e5b47b999baea
-
SHA256
c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78
-
SHA512
964cd448376c14d9bad40f6509414acabb199ef399be782431992c8a6b7ad3b03a5b32e83deaf492ab92705c13e7a8a2290bbaa4a5fa517fcef01107fac9bdad
-
SSDEEP
24576:hyAAqZBQgUesWRW0kPab3WwcjkBzzR6n6:U3jgyWRW0kPaqGZzR6n
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it784721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it784721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it784721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it784721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it784721.exe -
Executes dropped EXE 6 IoCs
pid Process 4468 ziEQ1915.exe 3564 ziAl6096.exe 2984 it784721.exe 4988 jr364335.exe 3496 kp977032.exe 3748 lr570265.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it784721.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEQ1915.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAl6096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziAl6096.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEQ1915.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4876 3748 WerFault.exe 72 1096 3748 WerFault.exe 72 2688 3748 WerFault.exe 72 2680 3748 WerFault.exe 72 4960 3748 WerFault.exe 72 4152 3748 WerFault.exe 72 1100 3748 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2984 it784721.exe 2984 it784721.exe 4988 jr364335.exe 4988 jr364335.exe 3496 kp977032.exe 3496 kp977032.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2984 it784721.exe Token: SeDebugPrivilege 4988 jr364335.exe Token: SeDebugPrivilege 3496 kp977032.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4468 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 66 PID 3268 wrote to memory of 4468 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 66 PID 3268 wrote to memory of 4468 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 66 PID 4468 wrote to memory of 3564 4468 ziEQ1915.exe 67 PID 4468 wrote to memory of 3564 4468 ziEQ1915.exe 67 PID 4468 wrote to memory of 3564 4468 ziEQ1915.exe 67 PID 3564 wrote to memory of 2984 3564 ziAl6096.exe 68 PID 3564 wrote to memory of 2984 3564 ziAl6096.exe 68 PID 3564 wrote to memory of 4988 3564 ziAl6096.exe 69 PID 3564 wrote to memory of 4988 3564 ziAl6096.exe 69 PID 3564 wrote to memory of 4988 3564 ziAl6096.exe 69 PID 4468 wrote to memory of 3496 4468 ziEQ1915.exe 71 PID 4468 wrote to memory of 3496 4468 ziEQ1915.exe 71 PID 4468 wrote to memory of 3496 4468 ziEQ1915.exe 71 PID 3268 wrote to memory of 3748 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 72 PID 3268 wrote to memory of 3748 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 72 PID 3268 wrote to memory of 3748 3268 c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe"C:\Users\Admin\AppData\Local\Temp\c0afc4940fb41e53beda6665bfae5b7500add5eefa9c780442b167022f6fac78.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEQ1915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEQ1915.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAl6096.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAl6096.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it784721.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it784721.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr364335.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr364335.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp977032.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp977032.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr570265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr570265.exe2⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 6163⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 6963⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8403⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8843⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 9003⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8563⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 10763⤵
- Program crash
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD55460b461824a34bb4fbe80dff74c20c0
SHA1bc4c9916b5fb327f12d2d23ab7b9466f05e4d660
SHA2561fb3ba03f7b3b91564d39e4df95fa9d4ec358af27c4785a29f98170589bd43ed
SHA5126cfd7719d62cf0873ed6a4fcf2389329474891cde845f055a9fc0130a64e3c3d3f92052b0bf8ebee0a802b4cf6868ec6e45841b07f30de2edbdeca82d9ec0e5b
-
Filesize
277KB
MD55460b461824a34bb4fbe80dff74c20c0
SHA1bc4c9916b5fb327f12d2d23ab7b9466f05e4d660
SHA2561fb3ba03f7b3b91564d39e4df95fa9d4ec358af27c4785a29f98170589bd43ed
SHA5126cfd7719d62cf0873ed6a4fcf2389329474891cde845f055a9fc0130a64e3c3d3f92052b0bf8ebee0a802b4cf6868ec6e45841b07f30de2edbdeca82d9ec0e5b
-
Filesize
568KB
MD53e87fbcba320d6cbf571d7f0434163ca
SHA1f3f0e1559046d5f224bacc35e00c1d402d3163a5
SHA2565610e905c14e298c4c202b45491bd184b03a9a71bae3a95fd24ff872cb2d292d
SHA51292bb6a201e47f068c9f178d9c7c195cf34a2cfd31da3b051d9439308b00aad2aee97904c1fb8c744b3e380f039c8ce07e5a2b847a642aee2906c96eb79b7b591
-
Filesize
568KB
MD53e87fbcba320d6cbf571d7f0434163ca
SHA1f3f0e1559046d5f224bacc35e00c1d402d3163a5
SHA2565610e905c14e298c4c202b45491bd184b03a9a71bae3a95fd24ff872cb2d292d
SHA51292bb6a201e47f068c9f178d9c7c195cf34a2cfd31da3b051d9439308b00aad2aee97904c1fb8c744b3e380f039c8ce07e5a2b847a642aee2906c96eb79b7b591
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD526b16fa3b5d68acd05254bbf28c04887
SHA18ef77d9e4c25f4ccfc1b592614b3c4baab4521ac
SHA25682d422250224872fed5f37bbecc4381335fe18bf45105aeca6b7a7558b1a8268
SHA5122d26756357640eb3a31d950817faf4f6f648e408207a8a2805a3f6e6d30c35f4e2df9e45e0b4e6235f072752e8d10784c84171e13652ed568f686dd9f8a2a192
-
Filesize
414KB
MD526b16fa3b5d68acd05254bbf28c04887
SHA18ef77d9e4c25f4ccfc1b592614b3c4baab4521ac
SHA25682d422250224872fed5f37bbecc4381335fe18bf45105aeca6b7a7558b1a8268
SHA5122d26756357640eb3a31d950817faf4f6f648e408207a8a2805a3f6e6d30c35f4e2df9e45e0b4e6235f072752e8d10784c84171e13652ed568f686dd9f8a2a192
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
381KB
MD57dc0262745bbafaa7cba049af58003c0
SHA1a26ef9ac298c6e7061101f44e9214867bfbbe4b1
SHA256488fd69573f2785aaa5b9373747c3d9f9b423f35bab292cde7107297e994c4c3
SHA5129a72a9a88a94c4fc21327833eaf714aa6dbf815bbd5eba1e7d0c19ff8808fafe67c58fd429ac01263ef3583bf37d7bfedaa0311c714c57b5a465f369fe9f6239
-
Filesize
381KB
MD57dc0262745bbafaa7cba049af58003c0
SHA1a26ef9ac298c6e7061101f44e9214867bfbbe4b1
SHA256488fd69573f2785aaa5b9373747c3d9f9b423f35bab292cde7107297e994c4c3
SHA5129a72a9a88a94c4fc21327833eaf714aa6dbf815bbd5eba1e7d0c19ff8808fafe67c58fd429ac01263ef3583bf37d7bfedaa0311c714c57b5a465f369fe9f6239