Analysis
-
max time kernel
50s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 08:47
Static task
static1
General
-
Target
2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe
-
Size
568KB
-
MD5
9830817982d399d4fc989c79cce60959
-
SHA1
a055ed2e3394a773d6996b0a549c00678fa944e3
-
SHA256
2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0
-
SHA512
927c0e582745fe0cf6ac3e3dddd604b59ee94dcf1c08796f0055c9b84b71edcfb85569bfa6c3801a8211397d7c868847ff98f2e9f2676c40be716a4050c63bd1
-
SSDEEP
12288:0y90pzoxSMQwcFhr+TeDxE9JKOrZm6/UD8n6+6Wl+SvioS:0yScxSHwEDNEPBZSZSqoS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it658134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it658134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it658134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it658134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it658134.exe -
Executes dropped EXE 4 IoCs
pid Process 3592 ziuE0354.exe 4280 it658134.exe 4828 kp131574.exe 2424 lr229136.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it658134.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuE0354.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuE0354.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4280 it658134.exe 4280 it658134.exe 4828 kp131574.exe 4828 kp131574.exe 2424 lr229136.exe 2424 lr229136.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4280 it658134.exe Token: SeDebugPrivilege 4828 kp131574.exe Token: SeDebugPrivilege 2424 lr229136.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3592 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 66 PID 3648 wrote to memory of 3592 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 66 PID 3648 wrote to memory of 3592 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 66 PID 3592 wrote to memory of 4280 3592 ziuE0354.exe 67 PID 3592 wrote to memory of 4280 3592 ziuE0354.exe 67 PID 3592 wrote to memory of 4828 3592 ziuE0354.exe 68 PID 3592 wrote to memory of 4828 3592 ziuE0354.exe 68 PID 3592 wrote to memory of 4828 3592 ziuE0354.exe 68 PID 3648 wrote to memory of 2424 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 70 PID 3648 wrote to memory of 2424 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 70 PID 3648 wrote to memory of 2424 3648 2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe"C:\Users\Admin\AppData\Local\Temp\2c9521462876f44a3c3ff2300a7b9c4d90924ca4a4e045691f89f1e837becbb0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE0354.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it658134.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp131574.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr229136.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD542a3ea583d4af5b67ae26424a5400f27
SHA12c1bbc2a39c53a25163e33565383bd63028217bf
SHA2560f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4
SHA51234b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f
-
Filesize
414KB
MD542a3ea583d4af5b67ae26424a5400f27
SHA12c1bbc2a39c53a25163e33565383bd63028217bf
SHA2560f71c7bb72685f0bca0f28619f48a8bb19bfefa9184d188a1b2a8f42897281e4
SHA51234b172a27be7dd11a80a1079f465a55cf797a0f449e5d2c5374844f5427fa68615d7ccacb727ed55c65fce497801d8f923b9f2aa699296642a3f643e5d03001f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
362KB
MD58d6366fffc044541e309b1220dc62726
SHA160e618166978f1769aacb344cbb63c896f8f9b28
SHA2560c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc
SHA51260c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70
-
Filesize
362KB
MD58d6366fffc044541e309b1220dc62726
SHA160e618166978f1769aacb344cbb63c896f8f9b28
SHA2560c82ec8dd3139664625012ae39e38f9ea49118495af0d987302e02b854eb75dc
SHA51260c8ebe4297ae24f4b0321a4ba1e38425a578a8488f803c8fcc412cfd5a1ebd4a673d59e645b10fd072ce50b5b29035001a5fa0766932651f903bc7720b82f70