Analysis
-
max time kernel
67s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 06:16
Static task
static1
General
-
Target
8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe
-
Size
569KB
-
MD5
68b8e410cc5d6b07910f13815043595e
-
SHA1
735d3fd85e5d01389c9137795416f663a3151fe1
-
SHA256
8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8
-
SHA512
60fdf15852416eb8450ef7a61c53d6184c4aebd1bff0239c1c24f0e252f377bb51adfd15426e916644c94e887ed8d0c6d33be912faba42e40624f14c31848901
-
SSDEEP
12288:4y90WYsjSYqAlKQ3EkRbIPE3d/nrY8L0LT9rrRL14T32JF:4yVbjSYBlKWEk+st/ntLYzQ32D
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it139544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it139544.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it139544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it139544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it139544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it139544.exe -
Executes dropped EXE 4 IoCs
pid Process 4360 ziNY0785.exe 2428 it139544.exe 3952 kp355651.exe 4760 lr989090.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it139544.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNY0785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNY0785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2736 3952 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 it139544.exe 2428 it139544.exe 3952 kp355651.exe 3952 kp355651.exe 4760 lr989090.exe 4760 lr989090.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2428 it139544.exe Token: SeDebugPrivilege 3952 kp355651.exe Token: SeDebugPrivilege 4760 lr989090.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4360 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 83 PID 2128 wrote to memory of 4360 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 83 PID 2128 wrote to memory of 4360 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 83 PID 4360 wrote to memory of 2428 4360 ziNY0785.exe 84 PID 4360 wrote to memory of 2428 4360 ziNY0785.exe 84 PID 4360 wrote to memory of 3952 4360 ziNY0785.exe 85 PID 4360 wrote to memory of 3952 4360 ziNY0785.exe 85 PID 4360 wrote to memory of 3952 4360 ziNY0785.exe 85 PID 2128 wrote to memory of 4760 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 89 PID 2128 wrote to memory of 4760 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 89 PID 2128 wrote to memory of 4760 2128 8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe"C:\Users\Admin\AppData\Local\Temp\8f1a2ae7c83707339ffeb4cb9a1d2c7c6ead577f38b71717fcf33a9cfa4745c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNY0785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it139544.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp355651.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 18724⤵
- Program crash
PID:2736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr989090.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3952 -ip 39521⤵PID:380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD5af688850d3eb94f999bb5feddd0d3b51
SHA1c8e115cc0569bc31193397005163c19010b13663
SHA25677f9da5f07dcf9384c4eddefa2fb9185056e3b867d9f15eb7ad2154e1376df23
SHA51213dd82c5362112ee6027af75cbd9db884a3b0ca6654471e51e86d171d9fbf90f0c4476d15b940b9a02b090ca6e83f6dc222d82e88dc2d9bfdd13402f2ddec22a
-
Filesize
415KB
MD5af688850d3eb94f999bb5feddd0d3b51
SHA1c8e115cc0569bc31193397005163c19010b13663
SHA25677f9da5f07dcf9384c4eddefa2fb9185056e3b867d9f15eb7ad2154e1376df23
SHA51213dd82c5362112ee6027af75cbd9db884a3b0ca6654471e51e86d171d9fbf90f0c4476d15b940b9a02b090ca6e83f6dc222d82e88dc2d9bfdd13402f2ddec22a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5a923a47204481208ac8f64d0102cac82
SHA164e3b90f73759d02e99a59e58180344ae69117d1
SHA25677dc572834f2af2db5e9968ccb75aa8f4eba1e7c8b9100d13c7d918c9ded8c4d
SHA51231d736fda36ad02a67cbd58bbfa60ad5503d103535fdd568579d30dbba8b1d4ef2e35598967a08232109585f0877342674f0db5c84379669c6c2052733d62f2b
-
Filesize
382KB
MD5a923a47204481208ac8f64d0102cac82
SHA164e3b90f73759d02e99a59e58180344ae69117d1
SHA25677dc572834f2af2db5e9968ccb75aa8f4eba1e7c8b9100d13c7d918c9ded8c4d
SHA51231d736fda36ad02a67cbd58bbfa60ad5503d103535fdd568579d30dbba8b1d4ef2e35598967a08232109585f0877342674f0db5c84379669c6c2052733d62f2b