Analysis
-
max time kernel
82s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 07:09
Static task
static1
General
-
Target
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe
-
Size
569KB
-
MD5
8f2e828c45134e5b177d1c8f6bfb61c5
-
SHA1
e46ffdeb49f7970a64854af1e652a2c006b5df04
-
SHA256
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863
-
SHA512
fac8907899f6b56bb4f9f8e0b4262d7ef551e7cb1539fa5702d72a00677f4a3206f7d7635494356bf85cf418a41cd8e54e04cf743c5d1b57cc6effb9256ce089
-
SSDEEP
12288:/y90MvQf6uDS53L2T9EUTKGdrnUY8d0F3INwHYCzq7hUD:/yEEb2JjTHrnMdeZD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it285901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it285901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it285901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it285901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it285901.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it285901.exe -
Executes dropped EXE 4 IoCs
pid Process 4532 zitc5447.exe 620 it285901.exe 3280 kp947201.exe 3704 lr438438.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it285901.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitc5447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitc5447.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 208 3280 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 620 it285901.exe 620 it285901.exe 3280 kp947201.exe 3280 kp947201.exe 3704 lr438438.exe 3704 lr438438.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 620 it285901.exe Token: SeDebugPrivilege 3280 kp947201.exe Token: SeDebugPrivilege 3704 lr438438.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4532 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 85 PID 4224 wrote to memory of 4532 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 85 PID 4224 wrote to memory of 4532 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 85 PID 4532 wrote to memory of 620 4532 zitc5447.exe 86 PID 4532 wrote to memory of 620 4532 zitc5447.exe 86 PID 4532 wrote to memory of 3280 4532 zitc5447.exe 87 PID 4532 wrote to memory of 3280 4532 zitc5447.exe 87 PID 4532 wrote to memory of 3280 4532 zitc5447.exe 87 PID 4224 wrote to memory of 3704 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 90 PID 4224 wrote to memory of 3704 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 90 PID 4224 wrote to memory of 3704 4224 8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe"C:\Users\Admin\AppData\Local\Temp\8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitc5447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitc5447.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it285901.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it285901.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp947201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp947201.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 19444⤵
- Program crash
PID:208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr438438.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr438438.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3280 -ip 32801⤵PID:3884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD533438944b2f992a56e4519c4bfc4b885
SHA1a8d3794ee057aa27fe779bf767da57d33d3d4bc9
SHA2562570b4d72d8676424a3b4e87b0c3cc58069fe52b12872e933d9486fc7c7c84d8
SHA512790f5f504a4527001e2819d8c33959e653c28d8c35f0ad22ffd60d903debde55ec24038f8584f055429a28f255502b5a9036f2c31cb1fa0e4bf70bf6a8529055
-
Filesize
415KB
MD533438944b2f992a56e4519c4bfc4b885
SHA1a8d3794ee057aa27fe779bf767da57d33d3d4bc9
SHA2562570b4d72d8676424a3b4e87b0c3cc58069fe52b12872e933d9486fc7c7c84d8
SHA512790f5f504a4527001e2819d8c33959e653c28d8c35f0ad22ffd60d903debde55ec24038f8584f055429a28f255502b5a9036f2c31cb1fa0e4bf70bf6a8529055
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD50baac22c242bd648c47370558a57aaee
SHA14015e75c6ae58cf4706f00994fcbf3b31b57557f
SHA2562aa117b5fbfa14fe994df52676e957e82cb9b58fcff5b091c14ce0882fecec64
SHA512211b6ceec7c4513e1ecc7492c19df4a4dc691f07b91be495c0f984fb2a10dc26708953ea3a9cb1931c8012c8842731cbacd47e71758002d5cd559d610bbd23ca
-
Filesize
382KB
MD50baac22c242bd648c47370558a57aaee
SHA14015e75c6ae58cf4706f00994fcbf3b31b57557f
SHA2562aa117b5fbfa14fe994df52676e957e82cb9b58fcff5b091c14ce0882fecec64
SHA512211b6ceec7c4513e1ecc7492c19df4a4dc691f07b91be495c0f984fb2a10dc26708953ea3a9cb1931c8012c8842731cbacd47e71758002d5cd559d610bbd23ca