Analysis
-
max time kernel
51s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 15:27
Static task
static1
General
-
Target
8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe
-
Size
568KB
-
MD5
8e746a1075fd28de7c987277e3295fb3
-
SHA1
6d42426c14a1c21ddf6029804e86b2e80505652c
-
SHA256
8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584
-
SHA512
47bb07832c9d30c728030a2b555d209fb562f642805ad03850bf57019150f73d33da9ce073ff1300b5cae79d1320f1768a231e5367fcc3e7bc72509fe71d1aea
-
SSDEEP
12288:Wy90iDTSMQwtF0cBwmSFRpXZtRhvuHcS9kWdr+ZDFQMVh5:WyRDTSHw3lF6FhKkW5+XRj5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it977558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it977558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it977558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it977558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it977558.exe -
Executes dropped EXE 4 IoCs
pid Process 3924 zizr1182.exe 4944 it977558.exe 1928 kp533834.exe 2920 lr062748.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it977558.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizr1182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizr1182.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 it977558.exe 4944 it977558.exe 1928 kp533834.exe 1928 kp533834.exe 2920 lr062748.exe 2920 lr062748.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 it977558.exe Token: SeDebugPrivilege 1928 kp533834.exe Token: SeDebugPrivilege 2920 lr062748.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3924 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 66 PID 4124 wrote to memory of 3924 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 66 PID 4124 wrote to memory of 3924 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 66 PID 3924 wrote to memory of 4944 3924 zizr1182.exe 67 PID 3924 wrote to memory of 4944 3924 zizr1182.exe 67 PID 3924 wrote to memory of 1928 3924 zizr1182.exe 68 PID 3924 wrote to memory of 1928 3924 zizr1182.exe 68 PID 3924 wrote to memory of 1928 3924 zizr1182.exe 68 PID 4124 wrote to memory of 2920 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 70 PID 4124 wrote to memory of 2920 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 70 PID 4124 wrote to memory of 2920 4124 8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe"C:\Users\Admin\AppData\Local\Temp\8a9328ac31760e3b9dd6aff9c82a73d62d0d37df50815e459e69c025f5c2e584.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizr1182.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it977558.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp533834.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062748.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
414KB
MD5a9c5590f4a74a8fcd874fe09d89c1a8a
SHA1ff2e6b4f31c478db8ebaefada316c6c6789ed0e6
SHA2566cc5105d43672f0fab0676c871f27ac8c908ca5b9996841de5e31e29344611f9
SHA512dd23b3494ea39824b966742ba04a4faa751f392e12cf864fc3072c6890cb5c73e6ae3939d008d650cff6e4bb93dbaac9415e30aaf4611fc15868ae01e0f2b52f
-
Filesize
414KB
MD5a9c5590f4a74a8fcd874fe09d89c1a8a
SHA1ff2e6b4f31c478db8ebaefada316c6c6789ed0e6
SHA2566cc5105d43672f0fab0676c871f27ac8c908ca5b9996841de5e31e29344611f9
SHA512dd23b3494ea39824b966742ba04a4faa751f392e12cf864fc3072c6890cb5c73e6ae3939d008d650cff6e4bb93dbaac9415e30aaf4611fc15868ae01e0f2b52f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
343KB
MD5eaab25a73b9addfd1b0ea7a5419b80cd
SHA1821a6b01e37b1572fbcbb542606568f22fe55cce
SHA2560901c1964f4e9bd65d4f7eb0bd91b7e07ba5f00a77e4b9e962604af32d9e29b8
SHA512fb948628f6b340244ad14b5c555ec4f7895e76ceb3b5e5b984b3ea6015fafe18f213da000a6b1e4cc409a0de790568318cee5753d0a2373a1825d6710d10bff8
-
Filesize
343KB
MD5eaab25a73b9addfd1b0ea7a5419b80cd
SHA1821a6b01e37b1572fbcbb542606568f22fe55cce
SHA2560901c1964f4e9bd65d4f7eb0bd91b7e07ba5f00a77e4b9e962604af32d9e29b8
SHA512fb948628f6b340244ad14b5c555ec4f7895e76ceb3b5e5b984b3ea6015fafe18f213da000a6b1e4cc409a0de790568318cee5753d0a2373a1825d6710d10bff8