Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 11:38
Static task
static1
General
-
Target
a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe
-
Size
568KB
-
MD5
b0724e5c9ada958a7406de2cfb0d0009
-
SHA1
c989edff4bc148971ba24767e5ba749886a43970
-
SHA256
a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55
-
SHA512
4ddb35ba79fee03327f34e53d2fd58becade78ec9307b1d27fa79b14c58b556b4a6fb61304c440f3c18857ea3fe57025e60b9750b81ced02da0bf527ad9af394
-
SSDEEP
12288:1y90/nIuXR6WB6dVjZC+D4/GVqUP6ZdhyiHvGN55NSfqNVajsj:1y8np6W29s+DgjjhvPGNnSoaIj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it801307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it801307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it801307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it801307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it801307.exe -
Executes dropped EXE 4 IoCs
pid Process 4288 ziFx7823.exe 4484 it801307.exe 4980 kp811915.exe 1892 lr669426.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it801307.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziFx7823.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziFx7823.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4484 it801307.exe 4484 it801307.exe 4980 kp811915.exe 4980 kp811915.exe 1892 lr669426.exe 1892 lr669426.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4484 it801307.exe Token: SeDebugPrivilege 4980 kp811915.exe Token: SeDebugPrivilege 1892 lr669426.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4288 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 66 PID 3668 wrote to memory of 4288 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 66 PID 3668 wrote to memory of 4288 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 66 PID 4288 wrote to memory of 4484 4288 ziFx7823.exe 67 PID 4288 wrote to memory of 4484 4288 ziFx7823.exe 67 PID 4288 wrote to memory of 4980 4288 ziFx7823.exe 68 PID 4288 wrote to memory of 4980 4288 ziFx7823.exe 68 PID 4288 wrote to memory of 4980 4288 ziFx7823.exe 68 PID 3668 wrote to memory of 1892 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 70 PID 3668 wrote to memory of 1892 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 70 PID 3668 wrote to memory of 1892 3668 a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe"C:\Users\Admin\AppData\Local\Temp\a60dc37f12e69ab3db47b64002173afc10d585795103512d6d49cb1bd8e90c55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFx7823.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it801307.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp811915.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr669426.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
414KB
MD5079adaec3b3fc3186535ddc43e99d5e2
SHA1c7e19214a2f93a38e11d23b494b2b6447270fc78
SHA256e8bf80a4aa63c693b82c344818e5f007b0e29310b1b5e718f1a8506e348bc96f
SHA5123b30d3b724dbb07318bea1c7761cef61d5fad9252f75ba74da9767e13600126fa86900f203bb061bec04f85bc1b9c070e5fffd4075117b4165c30cb47798631e
-
Filesize
414KB
MD5079adaec3b3fc3186535ddc43e99d5e2
SHA1c7e19214a2f93a38e11d23b494b2b6447270fc78
SHA256e8bf80a4aa63c693b82c344818e5f007b0e29310b1b5e718f1a8506e348bc96f
SHA5123b30d3b724dbb07318bea1c7761cef61d5fad9252f75ba74da9767e13600126fa86900f203bb061bec04f85bc1b9c070e5fffd4075117b4165c30cb47798631e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
367KB
MD56c651934cbadc678f23699b1ff307ca5
SHA1ee56b3913bb8899aec273df3fe1cbc876ba6faa4
SHA256fcb2f44f55171f469312ee1bffa907788499dcf33986d1eeed1671ebc1fc100c
SHA51270c6d472fba4cd10b742b96716ead23019fd6231b9ade85ccece41455fd973b0aadd245d9c3432d7799933d81faedcb945f1986e9109b945bd07e500f2ec135a
-
Filesize
367KB
MD56c651934cbadc678f23699b1ff307ca5
SHA1ee56b3913bb8899aec273df3fe1cbc876ba6faa4
SHA256fcb2f44f55171f469312ee1bffa907788499dcf33986d1eeed1671ebc1fc100c
SHA51270c6d472fba4cd10b742b96716ead23019fd6231b9ade85ccece41455fd973b0aadd245d9c3432d7799933d81faedcb945f1986e9109b945bd07e500f2ec135a