Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 04:56
Static task
static1
General
-
Target
e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe
-
Size
569KB
-
MD5
569c38cc11db547fd4bba39304e5b4ab
-
SHA1
bb2c3afc95f6d2fbf4b452e521e39ffa0c4cbb5b
-
SHA256
e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255
-
SHA512
a9c09c4209929b9a08746ddfca9292f783b98041f367e0d6f7ef0233f91e36a7da029a559761fad7f209b7a5df4066a6fe83b48b34f6562ebea0ca4155699a86
-
SSDEEP
12288:Ay909uWi7m8MYA7xIGo3J0IPE3dWnWY8L0LTgIrvL1glWVH:AySuWCAto5ZstWnmLYhoWF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it755316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it755316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it755316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it755316.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it755316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it755316.exe -
Executes dropped EXE 4 IoCs
pid Process 872 zihS8804.exe 1492 it755316.exe 1000 kp438875.exe 2164 lr916062.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it755316.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihS8804.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihS8804.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3356 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 1000 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1492 it755316.exe 1492 it755316.exe 1000 kp438875.exe 1000 kp438875.exe 2164 lr916062.exe 2164 lr916062.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1492 it755316.exe Token: SeDebugPrivilege 1000 kp438875.exe Token: SeDebugPrivilege 2164 lr916062.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 372 wrote to memory of 872 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 83 PID 372 wrote to memory of 872 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 83 PID 372 wrote to memory of 872 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 83 PID 872 wrote to memory of 1492 872 zihS8804.exe 84 PID 872 wrote to memory of 1492 872 zihS8804.exe 84 PID 872 wrote to memory of 1000 872 zihS8804.exe 88 PID 872 wrote to memory of 1000 872 zihS8804.exe 88 PID 872 wrote to memory of 1000 872 zihS8804.exe 88 PID 372 wrote to memory of 2164 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 91 PID 372 wrote to memory of 2164 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 91 PID 372 wrote to memory of 2164 372 e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe"C:\Users\Admin\AppData\Local\Temp\e93d5c26e4a946754eb0089f2f30c98dede3d43a832e75d9903152401c982255.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihS8804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihS8804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it755316.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it755316.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp438875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp438875.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 20564⤵
- Program crash
PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr916062.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr916062.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1000 -ip 10001⤵PID:1124
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD5d8a3d64ec989aa2337f3a3fac2e3a909
SHA188f0007df08f5b12526dbc1640e2520db54b248e
SHA256f5336ca33075c0d09bf570ad197ead339d18bea7b0ee5088e818fbef753bf648
SHA512ae5ca6b95beb75b8827fd0d73d7562a3018cf3005345a1ccb5f1cdf1125d2b99803564ebb67a5bb7ae29b7c22d44318468a4109fbbc6858583d5b07953b1d5f1
-
Filesize
415KB
MD5d8a3d64ec989aa2337f3a3fac2e3a909
SHA188f0007df08f5b12526dbc1640e2520db54b248e
SHA256f5336ca33075c0d09bf570ad197ead339d18bea7b0ee5088e818fbef753bf648
SHA512ae5ca6b95beb75b8827fd0d73d7562a3018cf3005345a1ccb5f1cdf1125d2b99803564ebb67a5bb7ae29b7c22d44318468a4109fbbc6858583d5b07953b1d5f1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5a158f134212eca42131a316bc5b333b5
SHA12f94c5cc1ecaf0ff7304ec87ae4e3926db848eaa
SHA2560c5d688a497563e203d718ddb10076535ac46c2c0287d7be4a76fe4eddb442ea
SHA512c4fd588a67bcd21d545873a9fc8c00f83501019808a54b11582d213572f47e1b3be8df2abaebf40c3c335352a8f89857d0f7cf28d543e29c63a0cbac99074325
-
Filesize
382KB
MD5a158f134212eca42131a316bc5b333b5
SHA12f94c5cc1ecaf0ff7304ec87ae4e3926db848eaa
SHA2560c5d688a497563e203d718ddb10076535ac46c2c0287d7be4a76fe4eddb442ea
SHA512c4fd588a67bcd21d545873a9fc8c00f83501019808a54b11582d213572f47e1b3be8df2abaebf40c3c335352a8f89857d0f7cf28d543e29c63a0cbac99074325