Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 08:09
Static task
static1
General
-
Target
d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe
-
Size
706KB
-
MD5
03e878b13c049280feecd24f9b83bda4
-
SHA1
ebd86610485f7ac5ee4f24c5f55cb008e0d9db8a
-
SHA256
d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b
-
SHA512
1e03a6c7ceb49cdef1f772146f6793b71c0af61f18cac26c8189e67eef2641b2687ac384c09a9d53d4088e646d26759577082c7302501baf8fce065754dfdbad
-
SSDEEP
12288:ey90a3Zr4cHYnB8appaE3kplRHVELf5smuO9ztU9n3KpH0qviqJrk:eyT3mcHYnBpppapHVEbLuO9C93OH0Rn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr539319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr539319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr539319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr539319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr539319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr539319.exe -
Executes dropped EXE 4 IoCs
pid Process 1280 un975665.exe 2340 pr539319.exe 1096 qu672995.exe 1028 si005957.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr539319.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr539319.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un975665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un975665.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 856 2340 WerFault.exe 78 5016 1096 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2340 pr539319.exe 2340 pr539319.exe 1096 qu672995.exe 1096 qu672995.exe 1028 si005957.exe 1028 si005957.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2340 pr539319.exe Token: SeDebugPrivilege 1096 qu672995.exe Token: SeDebugPrivilege 1028 si005957.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3516 wrote to memory of 1280 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 77 PID 3516 wrote to memory of 1280 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 77 PID 3516 wrote to memory of 1280 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 77 PID 1280 wrote to memory of 2340 1280 un975665.exe 78 PID 1280 wrote to memory of 2340 1280 un975665.exe 78 PID 1280 wrote to memory of 2340 1280 un975665.exe 78 PID 1280 wrote to memory of 1096 1280 un975665.exe 90 PID 1280 wrote to memory of 1096 1280 un975665.exe 90 PID 1280 wrote to memory of 1096 1280 un975665.exe 90 PID 3516 wrote to memory of 1028 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 95 PID 3516 wrote to memory of 1028 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 95 PID 3516 wrote to memory of 1028 3516 d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe"C:\Users\Admin\AppData\Local\Temp\d89fc3300251eb302e6f50532c5e46a57591e0c1cce7aedb9e1e9a134987d37b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr539319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr539319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 10844⤵
- Program crash
PID:856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu672995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu672995.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 19684⤵
- Program crash
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005957.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005957.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2340 -ip 23401⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1096 -ip 10961⤵PID:2336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
553KB
MD5571df9f50b2f895a486df4cbd6eeb673
SHA1f020dcd8fb29bad6f7a5538e31e02589c98197cb
SHA256b2ec58c42c20ec3a4dc74af148f1b15e385c3a94c2adc9b08b521ecdf24d538b
SHA512376f43553065bd9ba2274e729593775a4592dfdc94ba9b1388fa1d0e89fb21343ee2e4c2c18105c67bd1fe45bcb1153278d19a759600a2906663a1b108836191
-
Filesize
553KB
MD5571df9f50b2f895a486df4cbd6eeb673
SHA1f020dcd8fb29bad6f7a5538e31e02589c98197cb
SHA256b2ec58c42c20ec3a4dc74af148f1b15e385c3a94c2adc9b08b521ecdf24d538b
SHA512376f43553065bd9ba2274e729593775a4592dfdc94ba9b1388fa1d0e89fb21343ee2e4c2c18105c67bd1fe45bcb1153278d19a759600a2906663a1b108836191
-
Filesize
299KB
MD5fe05b667ae25b9d6a6aa2f5b500d9d5b
SHA15d0ef8c559dd66f7b9dfe796a5dfc972e9b598a7
SHA256047127870f2dea327980ed6117392ee3d6fa5f34346bfe740cf003fc945ada8f
SHA5129594da37e0eb9cf3145c61fe9126ccb4c073b1855742aa022a06dccf7006f64d1145733ed3f0ee9cc5c87c24061cf299d8e4818a3c7eed672eb898a2ed9a5f30
-
Filesize
299KB
MD5fe05b667ae25b9d6a6aa2f5b500d9d5b
SHA15d0ef8c559dd66f7b9dfe796a5dfc972e9b598a7
SHA256047127870f2dea327980ed6117392ee3d6fa5f34346bfe740cf003fc945ada8f
SHA5129594da37e0eb9cf3145c61fe9126ccb4c073b1855742aa022a06dccf7006f64d1145733ed3f0ee9cc5c87c24061cf299d8e4818a3c7eed672eb898a2ed9a5f30
-
Filesize
381KB
MD534c1a0d3cec08dcc651b6f42f71b4f7e
SHA15704fdf6328db72e92dc3745cb042e3289abe3c8
SHA256a64cdc7b218f89d76269848e5d4cc9db76738c2ae5cd2e6bd41e789a4820c723
SHA512c9d6791eb81cc710b898a2a93394bf46dcc4803cb70fc4e3a5f2daeeeef82b9e7d910d7bebb362d68c06c41860a6f6468f317f8bf5d4f668e6cb0a95b48e6283
-
Filesize
381KB
MD534c1a0d3cec08dcc651b6f42f71b4f7e
SHA15704fdf6328db72e92dc3745cb042e3289abe3c8
SHA256a64cdc7b218f89d76269848e5d4cc9db76738c2ae5cd2e6bd41e789a4820c723
SHA512c9d6791eb81cc710b898a2a93394bf46dcc4803cb70fc4e3a5f2daeeeef82b9e7d910d7bebb362d68c06c41860a6f6468f317f8bf5d4f668e6cb0a95b48e6283