Analysis
-
max time kernel
86s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 16:50
Static task
static1
General
-
Target
5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe
-
Size
700KB
-
MD5
76d94ca24334cf36730214e9d29a2c4f
-
SHA1
4d2052dd829594747aa9b2e3da7b26f248dad00c
-
SHA256
5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377
-
SHA512
123083f522c9dfd88acc26b584885daa82a9d2acf55e6ada56bb1204398035915b433b5a6470c626d0fc1bdc50873ac95fbe85166a9d8116e48cbcfcde6dedc2
-
SSDEEP
12288:Hy90bdBoMuZDcu+LXUVBjkdKAas4H2F4a9KMVdbs6poU8Xx05:HyQBaZAuG+WGawug48hi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr656506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr656506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr656506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr656506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr656506.exe -
Executes dropped EXE 4 IoCs
pid Process 2500 un640140.exe 2984 pr656506.exe 2356 qu624207.exe 2036 si679378.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr656506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr656506.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un640140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un640140.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2984 pr656506.exe 2984 pr656506.exe 2356 qu624207.exe 2356 qu624207.exe 2036 si679378.exe 2036 si679378.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2984 pr656506.exe Token: SeDebugPrivilege 2356 qu624207.exe Token: SeDebugPrivilege 2036 si679378.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2500 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 66 PID 2468 wrote to memory of 2500 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 66 PID 2468 wrote to memory of 2500 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 66 PID 2500 wrote to memory of 2984 2500 un640140.exe 67 PID 2500 wrote to memory of 2984 2500 un640140.exe 67 PID 2500 wrote to memory of 2984 2500 un640140.exe 67 PID 2500 wrote to memory of 2356 2500 un640140.exe 68 PID 2500 wrote to memory of 2356 2500 un640140.exe 68 PID 2500 wrote to memory of 2356 2500 un640140.exe 68 PID 2468 wrote to memory of 2036 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 70 PID 2468 wrote to memory of 2036 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 70 PID 2468 wrote to memory of 2036 2468 5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe"C:\Users\Admin\AppData\Local\Temp\5c69fe7610408e7bbff4fefa6bf94108968cbccd1f473b5e57e2eaec2a5db377.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr656506.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu624207.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679378.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
546KB
MD524d03dfb2b1c56b6bc29fceb3c68e18c
SHA1edb88a48ef736647617c47b874e833df12867985
SHA256513132e2e8c8cb6017fa663f28478e39fb93c0b7fd257d71a9623746ece533f6
SHA512c3197de442c0adf42d7fd7b363d10123d993249fa005b6f0b559d05c147e999dfa708d42db81f60f21eeb252257f47dfa163a69a69a14969828a521143354543
-
Filesize
546KB
MD524d03dfb2b1c56b6bc29fceb3c68e18c
SHA1edb88a48ef736647617c47b874e833df12867985
SHA256513132e2e8c8cb6017fa663f28478e39fb93c0b7fd257d71a9623746ece533f6
SHA512c3197de442c0adf42d7fd7b363d10123d993249fa005b6f0b559d05c147e999dfa708d42db81f60f21eeb252257f47dfa163a69a69a14969828a521143354543
-
Filesize
270KB
MD55b614b56b3e2fb2dd9556e6a6ecca11a
SHA1eea0be34148b9f8cd012879f731073590d68e5ee
SHA256fb7db0aa780ff4635e4c1be200c647c4c283671253edc6f6a125af9c73968feb
SHA512ac99c4479f65da8c29ace1815d4097592be4dc99a0896f598158162de84f5da122acedd7943b3414c3f0c2295721d195ae79889bfb687e1e1bbd0a2d980bef11
-
Filesize
270KB
MD55b614b56b3e2fb2dd9556e6a6ecca11a
SHA1eea0be34148b9f8cd012879f731073590d68e5ee
SHA256fb7db0aa780ff4635e4c1be200c647c4c283671253edc6f6a125af9c73968feb
SHA512ac99c4479f65da8c29ace1815d4097592be4dc99a0896f598158162de84f5da122acedd7943b3414c3f0c2295721d195ae79889bfb687e1e1bbd0a2d980bef11
-
Filesize
352KB
MD57f949ea3f24253940a513391b07377c5
SHA1e64f63beabfce03930ea74538d49bcc24f1ef6ae
SHA256de4851b321a85fa2cc3bb78d5e509aad43d4bc868272caa016c1ec2165de3770
SHA512f3655fb2cf597c8ec6caca06ba84c21764f5e0fcf7757cf3566344e14f4ade19ef906b3fc66c9269e284de90b329b1d21843ca1787f91822213a5dc973d8107e
-
Filesize
352KB
MD57f949ea3f24253940a513391b07377c5
SHA1e64f63beabfce03930ea74538d49bcc24f1ef6ae
SHA256de4851b321a85fa2cc3bb78d5e509aad43d4bc868272caa016c1ec2165de3770
SHA512f3655fb2cf597c8ec6caca06ba84c21764f5e0fcf7757cf3566344e14f4ade19ef906b3fc66c9269e284de90b329b1d21843ca1787f91822213a5dc973d8107e