Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 03:59
Static task
static1
General
-
Target
605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe
-
Size
707KB
-
MD5
31b36637e80827cf430c0323d202737f
-
SHA1
123fb112c406bc5dbdbf5b85a481233353418fd7
-
SHA256
605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1
-
SHA512
9c632170dec25590be43897273fedfb67c64018ffec6b14b8455012008b12e3b237f0ebc7816fbba577be90c81d9ca78046d69b6ba552b760d0feffc1232e742
-
SSDEEP
12288:Py90gJ2rcDxXkvUpcExP0I6G+9WiW29Iz6MHrMsu47hdr8JY8c0B0ZKZgyEMRvz:PyP5tkScE9cdtgr53r8TcWKrqA
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr011492.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr011492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr011492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr011492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr011492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr011492.exe -
Executes dropped EXE 4 IoCs
pid Process 3684 un271094.exe 2504 pr011492.exe 1912 qu891717.exe 4764 si557316.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr011492.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr011492.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un271094.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un271094.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2680 2504 WerFault.exe 83 3124 1912 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2504 pr011492.exe 2504 pr011492.exe 1912 qu891717.exe 1912 qu891717.exe 4764 si557316.exe 4764 si557316.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2504 pr011492.exe Token: SeDebugPrivilege 1912 qu891717.exe Token: SeDebugPrivilege 4764 si557316.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4360 wrote to memory of 3684 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 82 PID 4360 wrote to memory of 3684 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 82 PID 4360 wrote to memory of 3684 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 82 PID 3684 wrote to memory of 2504 3684 un271094.exe 83 PID 3684 wrote to memory of 2504 3684 un271094.exe 83 PID 3684 wrote to memory of 2504 3684 un271094.exe 83 PID 3684 wrote to memory of 1912 3684 un271094.exe 86 PID 3684 wrote to memory of 1912 3684 un271094.exe 86 PID 3684 wrote to memory of 1912 3684 un271094.exe 86 PID 4360 wrote to memory of 4764 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 90 PID 4360 wrote to memory of 4764 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 90 PID 4360 wrote to memory of 4764 4360 605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe"C:\Users\Admin\AppData\Local\Temp\605da560d0834c7ea00bb63a17b08aa42e82535df61f1fbfe86bb9acf2f6c2e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un271094.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un271094.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr011492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr011492.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 10844⤵
- Program crash
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu891717.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu891717.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 13324⤵
- Program crash
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557316.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2504 -ip 25041⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1912 -ip 19121⤵PID:3104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD58a9bfea455d2aef35ea22499c5ba1d0b
SHA190500fe2e17fd6c7227434be4a01fb77d0b58310
SHA256d27ab7fe8f53ea8c26e64f613e2881ce0c88a4398d8b6f98b78b4c01a0e24d50
SHA5129cca6906f5af20d19f4267bb167968fac0f17371704042093236e6b0e4efac6fd25edd6d90f8c7008c243c01d0b92e00ef6bfb75dab24e0b1adcef704666de7d
-
Filesize
552KB
MD58a9bfea455d2aef35ea22499c5ba1d0b
SHA190500fe2e17fd6c7227434be4a01fb77d0b58310
SHA256d27ab7fe8f53ea8c26e64f613e2881ce0c88a4398d8b6f98b78b4c01a0e24d50
SHA5129cca6906f5af20d19f4267bb167968fac0f17371704042093236e6b0e4efac6fd25edd6d90f8c7008c243c01d0b92e00ef6bfb75dab24e0b1adcef704666de7d
-
Filesize
299KB
MD5962b4965c2108196d14bf76d070eaa2b
SHA15a7282501b01c9d9cf6514930069591260ba6b28
SHA2562d6b2f9f5786da74068d19e7bd69a35824626fa4aac2e93748e0a0e96932a0c0
SHA512aa4513dea59b851a00a49b2fd46562fb4efecb7ce50a08bd059791367120402edfb6c4874bc21ed0befdc01bc2ca77327be92f23ccfe06a1e00d128dfd1c7c30
-
Filesize
299KB
MD5962b4965c2108196d14bf76d070eaa2b
SHA15a7282501b01c9d9cf6514930069591260ba6b28
SHA2562d6b2f9f5786da74068d19e7bd69a35824626fa4aac2e93748e0a0e96932a0c0
SHA512aa4513dea59b851a00a49b2fd46562fb4efecb7ce50a08bd059791367120402edfb6c4874bc21ed0befdc01bc2ca77327be92f23ccfe06a1e00d128dfd1c7c30
-
Filesize
382KB
MD5bbac50865b1429ab8086f8dccaab9381
SHA1b647f23deb8f7cc947470a694dbdef6aaaeee637
SHA256771b5fe86dd70d1730fcf5675bfcd29bd006442574c7318da8ed65849c0e3cef
SHA5124e06601a87a68ac1f9b9af2c5ef6108a60db4b724adeed221bdfb0bee0c6dc32f60894df0df479edca23a92e2caf7abaa569c16baa8c43e0124d510242bd9120
-
Filesize
382KB
MD5bbac50865b1429ab8086f8dccaab9381
SHA1b647f23deb8f7cc947470a694dbdef6aaaeee637
SHA256771b5fe86dd70d1730fcf5675bfcd29bd006442574c7318da8ed65849c0e3cef
SHA5124e06601a87a68ac1f9b9af2c5ef6108a60db4b724adeed221bdfb0bee0c6dc32f60894df0df479edca23a92e2caf7abaa569c16baa8c43e0124d510242bd9120