Analysis
-
max time kernel
109s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 06:04
Static task
static1
General
-
Target
e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe
-
Size
706KB
-
MD5
cfe6b708a4f08ebf30b8da8c29f7af15
-
SHA1
643876dba991672727d8c2ae1a93bba14c87acac
-
SHA256
e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9
-
SHA512
76678ab6f1af1577a0d89ae2bbca989e96dceaeb364e7dfb5d84e4cab797736b91278aba95bbbe156ea266ef0bcf80b130979f06c60ea2a4ee7835537df23211
-
SSDEEP
12288:fy903OJcsDqiHubSLGQeSs29vQAGR0eQNdrHJY8c0pRZm7KkicAuo:fy/JcsDfub+sAGe1rHTc6H/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr066333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr066333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr066333.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr066333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr066333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr066333.exe -
Executes dropped EXE 4 IoCs
pid Process 2096 un311078.exe 1736 pr066333.exe 3744 qu661632.exe 3632 si174009.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr066333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr066333.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un311078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un311078.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1624 1736 WerFault.exe 86 1976 3744 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1736 pr066333.exe 1736 pr066333.exe 3744 qu661632.exe 3744 qu661632.exe 3632 si174009.exe 3632 si174009.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1736 pr066333.exe Token: SeDebugPrivilege 3744 qu661632.exe Token: SeDebugPrivilege 3632 si174009.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2096 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 85 PID 1504 wrote to memory of 2096 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 85 PID 1504 wrote to memory of 2096 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 85 PID 2096 wrote to memory of 1736 2096 un311078.exe 86 PID 2096 wrote to memory of 1736 2096 un311078.exe 86 PID 2096 wrote to memory of 1736 2096 un311078.exe 86 PID 2096 wrote to memory of 3744 2096 un311078.exe 92 PID 2096 wrote to memory of 3744 2096 un311078.exe 92 PID 2096 wrote to memory of 3744 2096 un311078.exe 92 PID 1504 wrote to memory of 3632 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 96 PID 1504 wrote to memory of 3632 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 96 PID 1504 wrote to memory of 3632 1504 e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe"C:\Users\Admin\AppData\Local\Temp\e332f0b14079044d764f1b8b9de6400225de5bf4552ef94cbd0287f3e99234f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un311078.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr066333.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 10804⤵
- Program crash
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu661632.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 13284⤵
- Program crash
PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174009.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1736 -ip 17361⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3744 -ip 37441⤵PID:4184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD5f7dc772a89e6f87839a4068645152ac0
SHA16a807fe73426c929b804553629e38b6995d3900b
SHA256704e9239932c5efa295d354f0353bef5c38556bfef19a02c2a58d081654d194b
SHA5122e88cd24b5e97752b6538e42103e5a0757505363a6b91c642e7ad987c81457d6bf9db6dab42cc1d2f24f2ce4993711f03812a257ecf55f4dd32b56f83af87d18
-
Filesize
552KB
MD5f7dc772a89e6f87839a4068645152ac0
SHA16a807fe73426c929b804553629e38b6995d3900b
SHA256704e9239932c5efa295d354f0353bef5c38556bfef19a02c2a58d081654d194b
SHA5122e88cd24b5e97752b6538e42103e5a0757505363a6b91c642e7ad987c81457d6bf9db6dab42cc1d2f24f2ce4993711f03812a257ecf55f4dd32b56f83af87d18
-
Filesize
299KB
MD5c2a3bfe96ffb525e3998ba7850dc75f6
SHA1205eddfce544f33dc8fe04da3323bb3378a256de
SHA256438dd9fa1397a5b2fb7e9c636e722dffa8dd444a602e2611592c77245e68c73e
SHA512bfcf75b1f4f2c1fb051c55cc3199f09df56b1586cdb4ea8afe4e21761f409b35ee49bdb25c8e55bab3e5bcfd7159f70bc7a899f5a2b3d52e330f07effa5eb9e6
-
Filesize
299KB
MD5c2a3bfe96ffb525e3998ba7850dc75f6
SHA1205eddfce544f33dc8fe04da3323bb3378a256de
SHA256438dd9fa1397a5b2fb7e9c636e722dffa8dd444a602e2611592c77245e68c73e
SHA512bfcf75b1f4f2c1fb051c55cc3199f09df56b1586cdb4ea8afe4e21761f409b35ee49bdb25c8e55bab3e5bcfd7159f70bc7a899f5a2b3d52e330f07effa5eb9e6
-
Filesize
382KB
MD596fe7c032e1746f316f17358633d1a5e
SHA1f1a80e60a28ed5b5dc2cf6a5982c7768cc407748
SHA2566db1a493b556a28dfba394ede73eeef360c3784bcaabfa68ad295562f66aa1ee
SHA512195321ddba12b1eeb233ca65c64b1bde439bec20e209b680170e3ca36f69749dd40d4c7cae7251c9922e9800a81880d7bd0411d7cfa00b6fc33a497b123d6bdc
-
Filesize
382KB
MD596fe7c032e1746f316f17358633d1a5e
SHA1f1a80e60a28ed5b5dc2cf6a5982c7768cc407748
SHA2566db1a493b556a28dfba394ede73eeef360c3784bcaabfa68ad295562f66aa1ee
SHA512195321ddba12b1eeb233ca65c64b1bde439bec20e209b680170e3ca36f69749dd40d4c7cae7251c9922e9800a81880d7bd0411d7cfa00b6fc33a497b123d6bdc