Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 09:42
Static task
static1
General
-
Target
a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe
-
Size
707KB
-
MD5
815d130721bec47c7835409265ea8f58
-
SHA1
9188f7652b8fa338464783c38b8153d13db6998a
-
SHA256
a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551
-
SHA512
800c2a8f51c277a61b66bcf238af7d5255d36e31a54a84fdeda39ee669fcd4da3b53d7de010df0dee2a771e7bb304b3c6996e83ca4b79e0519e0ef87fd9095a2
-
SSDEEP
12288:Muy90Zh6smduKlzSOfkx9ZQ+NUM9JFY6AO3U6Y/cX8FaIuN65:Hyuh6saSOfkx9ZQ+NUM9JFYOeKD65
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr326883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr326883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr326883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr326883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr326883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr326883.exe -
Executes dropped EXE 4 IoCs
pid Process 2152 un658780.exe 5000 pr326883.exe 1612 qu377294.exe 4728 si126327.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr326883.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr326883.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un658780.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un658780.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1908 5000 WerFault.exe 83 4588 1612 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5000 pr326883.exe 5000 pr326883.exe 1612 qu377294.exe 1612 qu377294.exe 4728 si126327.exe 4728 si126327.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5000 pr326883.exe Token: SeDebugPrivilege 1612 qu377294.exe Token: SeDebugPrivilege 4728 si126327.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2152 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 82 PID 1884 wrote to memory of 2152 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 82 PID 1884 wrote to memory of 2152 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 82 PID 2152 wrote to memory of 5000 2152 un658780.exe 83 PID 2152 wrote to memory of 5000 2152 un658780.exe 83 PID 2152 wrote to memory of 5000 2152 un658780.exe 83 PID 2152 wrote to memory of 1612 2152 un658780.exe 91 PID 2152 wrote to memory of 1612 2152 un658780.exe 91 PID 2152 wrote to memory of 1612 2152 un658780.exe 91 PID 1884 wrote to memory of 4728 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 94 PID 1884 wrote to memory of 4728 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 94 PID 1884 wrote to memory of 4728 1884 a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe"C:\Users\Admin\AppData\Local\Temp\a628b28fedc48be73a39e2d8c6250c2665368bf37ab4912c044960ca28317551.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un658780.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr326883.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10884⤵
- Program crash
PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu377294.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 17244⤵
- Program crash
PID:4588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si126327.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5000 -ip 50001⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1612 -ip 16121⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
552KB
MD5cc1b4e071b445c8c794c94f0a4213eff
SHA135be48de3cd091dc9e6bb505acbf3807b2d81c4d
SHA25647c20a395d9a888bbc78e97cdbf7ad946de7bad12dc3cb3c4b559e70007f741d
SHA512d5de93dbeecbde7d62899acf0abc88c9740a82b298bddc319028cb952cf92147e0ea20ae743efb1f02566006a38ca7754bfe1fe4f9323956d716eefdcc90f7da
-
Filesize
552KB
MD5cc1b4e071b445c8c794c94f0a4213eff
SHA135be48de3cd091dc9e6bb505acbf3807b2d81c4d
SHA25647c20a395d9a888bbc78e97cdbf7ad946de7bad12dc3cb3c4b559e70007f741d
SHA512d5de93dbeecbde7d62899acf0abc88c9740a82b298bddc319028cb952cf92147e0ea20ae743efb1f02566006a38ca7754bfe1fe4f9323956d716eefdcc90f7da
-
Filesize
279KB
MD518c687e11a2856aa02d78e0547cc20ef
SHA115502bef5101162719f0ec1d820bbbd35ec81664
SHA25632b0fa28a0f3d240e7d139dbeea90255a30b8c6a3c61c301263910aa05877000
SHA5121f79456016d3064072190472cc844c04f8d36d1d09122069a9c416a74078eb6f9ee3f8ed742184aabd2719ef6765452b3da120e5eb76ac7c58019696659581d7
-
Filesize
279KB
MD518c687e11a2856aa02d78e0547cc20ef
SHA115502bef5101162719f0ec1d820bbbd35ec81664
SHA25632b0fa28a0f3d240e7d139dbeea90255a30b8c6a3c61c301263910aa05877000
SHA5121f79456016d3064072190472cc844c04f8d36d1d09122069a9c416a74078eb6f9ee3f8ed742184aabd2719ef6765452b3da120e5eb76ac7c58019696659581d7
-
Filesize
362KB
MD51cd9086cee750c5f71220719510f2361
SHA1b771665b186923f6250a4301e654f29daa090ca4
SHA256c94fcb1a99fd2aad555659016563ee43d8c53e418152b3463c17b7c1ac9bb525
SHA5126fb86e7297ff374d41563e013d70df025f73a43d6d4d467e247b7bdd5ebb8cb9b27c694c916f55b46651cd6c9c37c03e8415c224c54e6dd2fc814bc8dca46800
-
Filesize
362KB
MD51cd9086cee750c5f71220719510f2361
SHA1b771665b186923f6250a4301e654f29daa090ca4
SHA256c94fcb1a99fd2aad555659016563ee43d8c53e418152b3463c17b7c1ac9bb525
SHA5126fb86e7297ff374d41563e013d70df025f73a43d6d4d467e247b7bdd5ebb8cb9b27c694c916f55b46651cd6c9c37c03e8415c224c54e6dd2fc814bc8dca46800