Analysis
-
max time kernel
141s -
max time network
99s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-04-2023 04:47
Static task
static1
General
-
Target
bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe
-
Size
828KB
-
MD5
f34e1534827747e24f4bfda8066077e5
-
SHA1
5f3cc481b42035ea575efd26998ac2a36e5e016b
-
SHA256
bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c
-
SHA512
ce02e609d61c3e8abee13de7b9281216227155981c45a4cc001585f58f1bfca4c55a199fdfecf79e24ef776f53fc6845ba7bf0b159df73174d6334d6f3e44215
-
SSDEEP
12288:Vy90FlQgJA4qrCiBXkSSGMypskuXdIk6Y8I0EMMl+kbj0Av/S1l3ZDIhWlV/Eja:Vy6SgUrnXyGMtIkyIjtVK1D049Eja
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it033204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it033204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it033204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it033204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it033204.exe -
Executes dropped EXE 6 IoCs
pid Process 1908 ziOK6148.exe 2404 zihV0690.exe 2592 it033204.exe 3172 jr215770.exe 3256 kp844114.exe 1812 lr085795.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it033204.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihV0690.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zihV0690.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOK6148.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOK6148.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4044 1812 WerFault.exe 72 1500 1812 WerFault.exe 72 2440 1812 WerFault.exe 72 2432 1812 WerFault.exe 72 2876 1812 WerFault.exe 72 3784 1812 WerFault.exe 72 4956 1812 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 it033204.exe 2592 it033204.exe 3172 jr215770.exe 3172 jr215770.exe 3256 kp844114.exe 3256 kp844114.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2592 it033204.exe Token: SeDebugPrivilege 3172 jr215770.exe Token: SeDebugPrivilege 3256 kp844114.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1908 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 66 PID 2008 wrote to memory of 1908 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 66 PID 2008 wrote to memory of 1908 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 66 PID 1908 wrote to memory of 2404 1908 ziOK6148.exe 67 PID 1908 wrote to memory of 2404 1908 ziOK6148.exe 67 PID 1908 wrote to memory of 2404 1908 ziOK6148.exe 67 PID 2404 wrote to memory of 2592 2404 zihV0690.exe 68 PID 2404 wrote to memory of 2592 2404 zihV0690.exe 68 PID 2404 wrote to memory of 3172 2404 zihV0690.exe 69 PID 2404 wrote to memory of 3172 2404 zihV0690.exe 69 PID 2404 wrote to memory of 3172 2404 zihV0690.exe 69 PID 1908 wrote to memory of 3256 1908 ziOK6148.exe 71 PID 1908 wrote to memory of 3256 1908 ziOK6148.exe 71 PID 1908 wrote to memory of 3256 1908 ziOK6148.exe 71 PID 2008 wrote to memory of 1812 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 72 PID 2008 wrote to memory of 1812 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 72 PID 2008 wrote to memory of 1812 2008 bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe"C:\Users\Admin\AppData\Local\Temp\bdea54c5826cfde9460883a6bbbb41cf68233f46ba40e50bd77ab964e829359c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOK6148.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOK6148.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihV0690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihV0690.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it033204.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it033204.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr215770.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr215770.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844114.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr085795.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr085795.exe2⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 6163⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 6963⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 8363⤵
- Program crash
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 8243⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 8723⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 9163⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 10803⤵
- Program crash
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5ba62ff9d429ca9a12fb9031f8dab7a2b
SHA1a413ede000899fd2edb86cc497de75890d68e473
SHA256707a300c5bdeaad87f3f2bba1eeb11a74e1ae539cfa359d864172d13d73d7da5
SHA512d8cac8ddc3a14ab967280ad0b2c3ac606e4d6cbfa2ad85247dae9a163843537e949e6928c57d62cc78ee0189d0c98552176b5cd741d3945921e18af51ec1aa2a
-
Filesize
278KB
MD5ba62ff9d429ca9a12fb9031f8dab7a2b
SHA1a413ede000899fd2edb86cc497de75890d68e473
SHA256707a300c5bdeaad87f3f2bba1eeb11a74e1ae539cfa359d864172d13d73d7da5
SHA512d8cac8ddc3a14ab967280ad0b2c3ac606e4d6cbfa2ad85247dae9a163843537e949e6928c57d62cc78ee0189d0c98552176b5cd741d3945921e18af51ec1aa2a
-
Filesize
569KB
MD5a0fb84df23193f70b11aabc52c06381c
SHA1f9ec1527c5995eef831f17e1366ccf7028a785bb
SHA2561a4d42e0ada33e525b65bffb4027792e460f3a6841e6118da48c4937b0754175
SHA5128185f4ed4058694f9f0acfa71535b6bdf78f9faaa92e7d1e1b15afff3e7b30279bf8d3dc29c2ae462d2cf335fc76f279d319670b278f5ad3346763c59546b642
-
Filesize
569KB
MD5a0fb84df23193f70b11aabc52c06381c
SHA1f9ec1527c5995eef831f17e1366ccf7028a785bb
SHA2561a4d42e0ada33e525b65bffb4027792e460f3a6841e6118da48c4937b0754175
SHA5128185f4ed4058694f9f0acfa71535b6bdf78f9faaa92e7d1e1b15afff3e7b30279bf8d3dc29c2ae462d2cf335fc76f279d319670b278f5ad3346763c59546b642
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD55f99c52ef69aed13d67876ca9677d599
SHA1ea4d695fd826d91c0cdb67464d102294e23a8186
SHA2564cb50f5ff236bcfdde73289240b0696f03cef619c10f9e9dd8be13ff84faa4ae
SHA512c519938f1f74588afafaaacc7465b23fef926c40990eafe95ebce36b59e46e66c7d9d2b4ee82f51935ab349424690c72a44bfddd3ac153e2f93fbf4ba8917743
-
Filesize
415KB
MD55f99c52ef69aed13d67876ca9677d599
SHA1ea4d695fd826d91c0cdb67464d102294e23a8186
SHA2564cb50f5ff236bcfdde73289240b0696f03cef619c10f9e9dd8be13ff84faa4ae
SHA512c519938f1f74588afafaaacc7465b23fef926c40990eafe95ebce36b59e46e66c7d9d2b4ee82f51935ab349424690c72a44bfddd3ac153e2f93fbf4ba8917743
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5a0909201bc8dce0a7d72109c8dd8726e
SHA1c63efb4fdd9904d178e9f2cdd33fddd2ea24c4f5
SHA2566f3de95e07186d7484cb80a6e455e9c2df6b1f5c3618d8a7e14029b040f03553
SHA5129d6511ac5cbc544b86f0f9b7718cf85cfd9107b46a93103700b9086472351150bcfa0f63d118c71b96b6dfcd8b67eabd50fb8b23f7ec18aa87b002656733061c
-
Filesize
382KB
MD5a0909201bc8dce0a7d72109c8dd8726e
SHA1c63efb4fdd9904d178e9f2cdd33fddd2ea24c4f5
SHA2566f3de95e07186d7484cb80a6e455e9c2df6b1f5c3618d8a7e14029b040f03553
SHA5129d6511ac5cbc544b86f0f9b7718cf85cfd9107b46a93103700b9086472351150bcfa0f63d118c71b96b6dfcd8b67eabd50fb8b23f7ec18aa87b002656733061c