Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 07:36
Static task
static1
General
-
Target
d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe
-
Size
569KB
-
MD5
85c244d6bc92a3d5ea7fe243ab8d189e
-
SHA1
d918148957ac783731f4db1a91f4e78567bbd058
-
SHA256
d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514
-
SHA512
35575ae9c707d9a0d80149e6e03f7cc6bf4a6fb80380d62a34ba017b406628fb202e3a6b29b7c4092710d587a81ffc671be40051467671f22dd1786230a2744f
-
SSDEEP
12288:Hy90g3V5uaxoRUtk73HIR+ldwnjY8u0VTHtkOL1tpkmS:HytV5uaPAoUfwnFuWFdkv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it152872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it152872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it152872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it152872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it152872.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it152872.exe -
Executes dropped EXE 4 IoCs
pid Process 4288 ziMK1647.exe 5064 it152872.exe 3364 kp944442.exe 1488 lr503030.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it152872.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziMK1647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMK1647.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4420 3364 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5064 it152872.exe 5064 it152872.exe 3364 kp944442.exe 3364 kp944442.exe 1488 lr503030.exe 1488 lr503030.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5064 it152872.exe Token: SeDebugPrivilege 3364 kp944442.exe Token: SeDebugPrivilege 1488 lr503030.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2532 wrote to memory of 4288 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 81 PID 2532 wrote to memory of 4288 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 81 PID 2532 wrote to memory of 4288 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 81 PID 4288 wrote to memory of 5064 4288 ziMK1647.exe 82 PID 4288 wrote to memory of 5064 4288 ziMK1647.exe 82 PID 4288 wrote to memory of 3364 4288 ziMK1647.exe 85 PID 4288 wrote to memory of 3364 4288 ziMK1647.exe 85 PID 4288 wrote to memory of 3364 4288 ziMK1647.exe 85 PID 2532 wrote to memory of 1488 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 88 PID 2532 wrote to memory of 1488 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 88 PID 2532 wrote to memory of 1488 2532 d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe"C:\Users\Admin\AppData\Local\Temp\d0aa3cd920937edc4f06a73cee56b022ce9081e56fe437a235722112d3c56514.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMK1647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMK1647.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it152872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it152872.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp944442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp944442.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 19204⤵
- Program crash
PID:4420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr503030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr503030.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3364 -ip 33641⤵PID:1000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD51256ae9dad418b28ae070eecaba76c52
SHA1f0c941690b6c9110aca40ceba26bcfef88618c26
SHA256f81e8306e8dd45758ab948525bda980799753c2c9ad32d821b72d339aa5c0901
SHA512108e488b4b56ef1a32d075a6ec49709edba2375d468be04fcd7cd3e3fccb2d1162e58e870e40f6db06b9d0723ec4aa3b2e83676850448951e3d7e2908bb0dc86
-
Filesize
415KB
MD51256ae9dad418b28ae070eecaba76c52
SHA1f0c941690b6c9110aca40ceba26bcfef88618c26
SHA256f81e8306e8dd45758ab948525bda980799753c2c9ad32d821b72d339aa5c0901
SHA512108e488b4b56ef1a32d075a6ec49709edba2375d468be04fcd7cd3e3fccb2d1162e58e870e40f6db06b9d0723ec4aa3b2e83676850448951e3d7e2908bb0dc86
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD56da2d89334336e008912baf4b52592b3
SHA17b6449b1428465b30138909133413a19a35dbc25
SHA256eafb1118af63671e5b5ea5fdd8d7de58dcce78498bdc2fbe9c4d6e6e10c6b730
SHA5129e5635ffc2a836eddd78c97fa1b2776e7fa6d3a64c90f65dbdd487857a7d2bf3d470e6f41ccaa5b0dc40f9b8073e1ba91af5c6081640850085a1afae02d2668e
-
Filesize
382KB
MD56da2d89334336e008912baf4b52592b3
SHA17b6449b1428465b30138909133413a19a35dbc25
SHA256eafb1118af63671e5b5ea5fdd8d7de58dcce78498bdc2fbe9c4d6e6e10c6b730
SHA5129e5635ffc2a836eddd78c97fa1b2776e7fa6d3a64c90f65dbdd487857a7d2bf3d470e6f41ccaa5b0dc40f9b8073e1ba91af5c6081640850085a1afae02d2668e