Analysis
-
max time kernel
74s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 21:42
Static task
static1
General
-
Target
20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe
-
Size
704KB
-
MD5
7fac00c7ce9f8808f4d02e874473e482
-
SHA1
03a594facbfd00dbc8db34cf3eff7115dab444e5
-
SHA256
20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a
-
SHA512
6686bbe580969cf010ae611b8eaf21df7c823e793a3c5667c06c2417d602c4a0dc88c82dcb31edbab77ea74997c752a039dbc9add4ceebb01a7e979b1ad36653
-
SSDEEP
12288:Qy90Y3KXZYMhTMTIK3xGnDqLYf8I5rPPlmNkI1gzC6+IzaMGV/KX3WxiHJY:QyF3KXuMhwTQnuYf8MLPlmDMv+I+Bs2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr421554.exe -
Executes dropped EXE 4 IoCs
pid Process 4212 un963310.exe 1668 pr421554.exe 5048 qu500837.exe 2388 si854152.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr421554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr421554.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un963310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un963310.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 320 1668 WerFault.exe 86 464 5048 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1668 pr421554.exe 1668 pr421554.exe 5048 qu500837.exe 5048 qu500837.exe 2388 si854152.exe 2388 si854152.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1668 pr421554.exe Token: SeDebugPrivilege 5048 qu500837.exe Token: SeDebugPrivilege 2388 si854152.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4212 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 85 PID 4164 wrote to memory of 4212 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 85 PID 4164 wrote to memory of 4212 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 85 PID 4212 wrote to memory of 1668 4212 un963310.exe 86 PID 4212 wrote to memory of 1668 4212 un963310.exe 86 PID 4212 wrote to memory of 1668 4212 un963310.exe 86 PID 4212 wrote to memory of 5048 4212 un963310.exe 89 PID 4212 wrote to memory of 5048 4212 un963310.exe 89 PID 4212 wrote to memory of 5048 4212 un963310.exe 89 PID 4164 wrote to memory of 2388 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 92 PID 4164 wrote to memory of 2388 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 92 PID 4164 wrote to memory of 2388 4164 20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe"C:\Users\Admin\AppData\Local\Temp\20fbeb0517e5c317ac7ae77244558cb2a583eb85f758f32b799ff8ae6d57fd8a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963310.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr421554.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr421554.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10924⤵
- Program crash
PID:320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu500837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu500837.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 19004⤵
- Program crash
PID:464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si854152.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1668 -ip 16681⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5048 -ip 50481⤵PID:368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
550KB
MD5a97e425328fd4ac8548c5c2d57d2cff0
SHA102ea7070e213acba891f7752c416fcd7484e011a
SHA256e096a73a59f3dd7deac55f22b5ae2788f8291f86ddee8ac3db82fbe4b8846553
SHA51284687d7eaee4b05055dcb54a08b0963a40e0a92b20ebcac3f6d070dfa653708fd9337d5506d922cca3c1858ec568d30bc1d04b840f195202b8295fa0b39891bc
-
Filesize
550KB
MD5a97e425328fd4ac8548c5c2d57d2cff0
SHA102ea7070e213acba891f7752c416fcd7484e011a
SHA256e096a73a59f3dd7deac55f22b5ae2788f8291f86ddee8ac3db82fbe4b8846553
SHA51284687d7eaee4b05055dcb54a08b0963a40e0a92b20ebcac3f6d070dfa653708fd9337d5506d922cca3c1858ec568d30bc1d04b840f195202b8295fa0b39891bc
-
Filesize
278KB
MD530c31b91ea2ce29a35c2e53fecded837
SHA1471fba9ae8c3ecde1a25fc6cb06b6ffd26c8cb33
SHA2560b458079446b9e75886c06ee15d80f65051ba65533a58b4504b565dcae9d70bf
SHA512b25de78037c4b89f617e300209753d2476d22d56e944ce2181248eb12ffd31d129c2939eb4d3701d15aaf1e3be2d5c55ec5c677b85b4f51344ff72d4fc7a14c3
-
Filesize
278KB
MD530c31b91ea2ce29a35c2e53fecded837
SHA1471fba9ae8c3ecde1a25fc6cb06b6ffd26c8cb33
SHA2560b458079446b9e75886c06ee15d80f65051ba65533a58b4504b565dcae9d70bf
SHA512b25de78037c4b89f617e300209753d2476d22d56e944ce2181248eb12ffd31d129c2939eb4d3701d15aaf1e3be2d5c55ec5c677b85b4f51344ff72d4fc7a14c3
-
Filesize
361KB
MD514b661f572c9512a98a83db411a839cf
SHA1cc972543b955ab0d5151e1ad56d968451b0a5f14
SHA256e539a0cd07f7a9bbb0c3ca812d641c44bc20fa5e9dc5330645c99b959b73600a
SHA5123846c4142c39aa6a5c3c5747a3d8dc872dfc30413231a9dd2c0f02032ef24ddaadda2f4f8a5b1f26a9b41b6879cbf1db13771d540ef70dc8f2cc68d124ad18ab
-
Filesize
361KB
MD514b661f572c9512a98a83db411a839cf
SHA1cc972543b955ab0d5151e1ad56d968451b0a5f14
SHA256e539a0cd07f7a9bbb0c3ca812d641c44bc20fa5e9dc5330645c99b959b73600a
SHA5123846c4142c39aa6a5c3c5747a3d8dc872dfc30413231a9dd2c0f02032ef24ddaadda2f4f8a5b1f26a9b41b6879cbf1db13771d540ef70dc8f2cc68d124ad18ab