Analysis
-
max time kernel
59s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 17:11
Static task
static1
General
-
Target
bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe
-
Size
696KB
-
MD5
76bd0e8ca72fdb4a1dc0b60cff9b68d9
-
SHA1
d418750dafb4a542eac4489a9ad062cdfc788ac7
-
SHA256
bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320
-
SHA512
8c41a246b6570d27a5df35e625bd44cfd0800ada5dae15e138c6d1a5118a19ba887527aa8bd02a6fdbf55bb4f0e176323e3c36ef6a33dbd3dcfce2320e3bc010
-
SSDEEP
12288:Sy90mPqbHdfh4yPWxMgwxLiX+0WaMpPYzbIWIOINza09SvYIVESMmn:Sy5yTdS1xgxeO0W5PYXvR4za0EYQ/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr541609.exe -
Executes dropped EXE 4 IoCs
pid Process 4732 un695580.exe 2632 pr541609.exe 3512 qu238707.exe 1428 si807813.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr541609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr541609.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un695580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un695580.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 528 2632 WerFault.exe 86 4308 3512 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2632 pr541609.exe 2632 pr541609.exe 3512 qu238707.exe 3512 qu238707.exe 1428 si807813.exe 1428 si807813.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2632 pr541609.exe Token: SeDebugPrivilege 3512 qu238707.exe Token: SeDebugPrivilege 1428 si807813.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2188 wrote to memory of 4732 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 85 PID 2188 wrote to memory of 4732 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 85 PID 2188 wrote to memory of 4732 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 85 PID 4732 wrote to memory of 2632 4732 un695580.exe 86 PID 4732 wrote to memory of 2632 4732 un695580.exe 86 PID 4732 wrote to memory of 2632 4732 un695580.exe 86 PID 4732 wrote to memory of 3512 4732 un695580.exe 95 PID 4732 wrote to memory of 3512 4732 un695580.exe 95 PID 4732 wrote to memory of 3512 4732 un695580.exe 95 PID 2188 wrote to memory of 1428 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 99 PID 2188 wrote to memory of 1428 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 99 PID 2188 wrote to memory of 1428 2188 bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe"C:\Users\Admin\AppData\Local\Temp\bb7d77a7b1b33b9efba3b5d5c5ecda4e71300ef0cca2cf339c1505e6dea92320.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr541609.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr541609.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 10644⤵
- Program crash
PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238707.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 19204⤵
- Program crash
PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si807813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si807813.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2632 -ip 26321⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3512 -ip 35121⤵PID:3792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
542KB
MD5562982e45e2907930a737e87039f1cf4
SHA13c75ce48977193cfd2135dbe1a55b2a05bb81165
SHA256b395c85d8ba205765c7ff00aada416b04f1ae642cfdcd41c82cd4e0481f36e8d
SHA51200f45f0cd49f4180d8c7d1fb2524eaeab4a258bda2c4a2fdbe1a11663c9968775d4b1b8b5cf2483613f850912b52778fe7a30b04376c6501cf3cda543fad3912
-
Filesize
542KB
MD5562982e45e2907930a737e87039f1cf4
SHA13c75ce48977193cfd2135dbe1a55b2a05bb81165
SHA256b395c85d8ba205765c7ff00aada416b04f1ae642cfdcd41c82cd4e0481f36e8d
SHA51200f45f0cd49f4180d8c7d1fb2524eaeab4a258bda2c4a2fdbe1a11663c9968775d4b1b8b5cf2483613f850912b52778fe7a30b04376c6501cf3cda543fad3912
-
Filesize
269KB
MD5b32681ed43d05296af322658ed81bc3a
SHA1b7ab0095188fcc6967dc910bdf41c8ff05ee9c81
SHA2564a78d4b950ced7ed53640ba223967c63ddad90534018173a5c893d7afccec0b2
SHA512e42158e5c5e5ad431ba0b67c24f588d5f0e85ee2435c19adfe796d83b291c73dc3f6f7ecd2ff47178b877b36338efec750f9bcd191e4fe4494c7ce05d053fd95
-
Filesize
269KB
MD5b32681ed43d05296af322658ed81bc3a
SHA1b7ab0095188fcc6967dc910bdf41c8ff05ee9c81
SHA2564a78d4b950ced7ed53640ba223967c63ddad90534018173a5c893d7afccec0b2
SHA512e42158e5c5e5ad431ba0b67c24f588d5f0e85ee2435c19adfe796d83b291c73dc3f6f7ecd2ff47178b877b36338efec750f9bcd191e4fe4494c7ce05d053fd95
-
Filesize
352KB
MD5e65a91edd3c823ad8036ec5e5eb4767e
SHA1895d0d154193ba5913752f21975bcdcf6bc8b0b7
SHA2568fd3c1f6c02c9e92c2f8dfcdf9ec38df63f96ddfac6bcf05622c1de50501a2fb
SHA5129b96f70445d59c8fefd44430662993e2e081f3c040c292991923e6e4bcfd4a3cb8ab470993845fde7f6395ce0ef0fce8c1dd571d5c52b25d9cbd54704094a317
-
Filesize
352KB
MD5e65a91edd3c823ad8036ec5e5eb4767e
SHA1895d0d154193ba5913752f21975bcdcf6bc8b0b7
SHA2568fd3c1f6c02c9e92c2f8dfcdf9ec38df63f96ddfac6bcf05622c1de50501a2fb
SHA5129b96f70445d59c8fefd44430662993e2e081f3c040c292991923e6e4bcfd4a3cb8ab470993845fde7f6395ce0ef0fce8c1dd571d5c52b25d9cbd54704094a317