Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 05:18
Static task
static1
General
-
Target
f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe
-
Size
569KB
-
MD5
ee4862e83b39453d02b947032eb21dc6
-
SHA1
d520c5cfce7d4f874fadeb1fe95d5b434110fcfa
-
SHA256
f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f
-
SHA512
37ee818d8da214c81eb46ee483d1c2ed0c160bed8fd62920b45c54cfd6c430c5c659f68cb17848e7a7b75c4a784a2cefbdfc3a7c9f8de36c1ac3fb8a82d1a006
-
SSDEEP
12288:cy903CA6S4/TMC+iQVU+UaF5d/nLY8L0LTlDA0DL17hPZ:cyEGx/oCqKDax/nNLYBPtBZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it256351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it256351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it256351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it256351.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it256351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it256351.exe -
Executes dropped EXE 4 IoCs
pid Process 4612 ziFP9925.exe 4040 it256351.exe 2768 kp276518.exe 5096 lr261470.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it256351.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziFP9925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziFP9925.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1324 2768 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 it256351.exe 4040 it256351.exe 2768 kp276518.exe 2768 kp276518.exe 5096 lr261470.exe 5096 lr261470.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4040 it256351.exe Token: SeDebugPrivilege 2768 kp276518.exe Token: SeDebugPrivilege 5096 lr261470.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4612 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 76 PID 2136 wrote to memory of 4612 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 76 PID 2136 wrote to memory of 4612 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 76 PID 4612 wrote to memory of 4040 4612 ziFP9925.exe 77 PID 4612 wrote to memory of 4040 4612 ziFP9925.exe 77 PID 4612 wrote to memory of 2768 4612 ziFP9925.exe 86 PID 4612 wrote to memory of 2768 4612 ziFP9925.exe 86 PID 4612 wrote to memory of 2768 4612 ziFP9925.exe 86 PID 2136 wrote to memory of 5096 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 91 PID 2136 wrote to memory of 5096 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 91 PID 2136 wrote to memory of 5096 2136 f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe"C:\Users\Admin\AppData\Local\Temp\f04004c72855e8eb557e398f40694b1e15be4aadde32e1138a98e10e7866320f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFP9925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFP9925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it256351.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it256351.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp276518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp276518.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 13204⤵
- Program crash
PID:1324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr261470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr261470.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2768 -ip 27681⤵PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD5436b58408c7d73ab10abcf32b45ceba1
SHA15e91aeea9c4bad06c8db1cb63c2d138a7526b2d5
SHA256b6031044c23c7a6976f2682808918b9ef3ff997e299131625f59ac22c2eda763
SHA5129d9cdce5ffc8c6f3ee3a0d25680036640c175598818eab059bb6877a69fbc60f31b623c36badb384ce58c82a997b420b7138ea92891f68849621d21fb7420603
-
Filesize
415KB
MD5436b58408c7d73ab10abcf32b45ceba1
SHA15e91aeea9c4bad06c8db1cb63c2d138a7526b2d5
SHA256b6031044c23c7a6976f2682808918b9ef3ff997e299131625f59ac22c2eda763
SHA5129d9cdce5ffc8c6f3ee3a0d25680036640c175598818eab059bb6877a69fbc60f31b623c36badb384ce58c82a997b420b7138ea92891f68849621d21fb7420603
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD52c0ce49bda6f33a95a35869a4bf83dec
SHA1bfa391f02d3b83d7154b687011a1c821858c89e8
SHA256545879c66a52064a8b347168d239b47be7cef9d47239a59e02211846568a7f8f
SHA512a352a1ca2d653b63dc5469990b699b152420bdeb0df1e6deeb15ac90d943d4c93f10d25fc152787a18f09420dfb5ece81385073b84a7b61e30e44eb8e392fb10
-
Filesize
382KB
MD52c0ce49bda6f33a95a35869a4bf83dec
SHA1bfa391f02d3b83d7154b687011a1c821858c89e8
SHA256545879c66a52064a8b347168d239b47be7cef9d47239a59e02211846568a7f8f
SHA512a352a1ca2d653b63dc5469990b699b152420bdeb0df1e6deeb15ac90d943d4c93f10d25fc152787a18f09420dfb5ece81385073b84a7b61e30e44eb8e392fb10