Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 22:56
Static task
static1
General
-
Target
e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe
-
Size
705KB
-
MD5
59491743c4a100c454edb62985fbf778
-
SHA1
74dccb256ac6f12fc8d0e91de0e0a40ab03dc9d9
-
SHA256
e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2
-
SHA512
6b9da53a630d6b18bceb703cdc8322f462007571d48f244b93934b34c78e99a7dbe0017e3eae31838d28073dc43bed3502cda96d5cfdd2132de6d34faa0f2af4
-
SSDEEP
12288:iy902oMFLccTf4y4AwiG3CS/Vi39pKVK6tkAI1wzC01IzEMGJ/K3WoS/Oy2:iyusbX47iDS/V7wR851IIBgWf/h2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr061505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr061505.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr061505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr061505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr061505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr061505.exe -
Executes dropped EXE 4 IoCs
pid Process 2212 un224083.exe 928 pr061505.exe 1856 qu397342.exe 4340 si848208.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr061505.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr061505.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un224083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un224083.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2016 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4648 928 WerFault.exe 87 3760 1856 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 928 pr061505.exe 928 pr061505.exe 1856 qu397342.exe 1856 qu397342.exe 4340 si848208.exe 4340 si848208.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 928 pr061505.exe Token: SeDebugPrivilege 1856 qu397342.exe Token: SeDebugPrivilege 4340 si848208.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4280 wrote to memory of 2212 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 86 PID 4280 wrote to memory of 2212 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 86 PID 4280 wrote to memory of 2212 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 86 PID 2212 wrote to memory of 928 2212 un224083.exe 87 PID 2212 wrote to memory of 928 2212 un224083.exe 87 PID 2212 wrote to memory of 928 2212 un224083.exe 87 PID 2212 wrote to memory of 1856 2212 un224083.exe 93 PID 2212 wrote to memory of 1856 2212 un224083.exe 93 PID 2212 wrote to memory of 1856 2212 un224083.exe 93 PID 4280 wrote to memory of 4340 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 96 PID 4280 wrote to memory of 4340 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 96 PID 4280 wrote to memory of 4340 4280 e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe"C:\Users\Admin\AppData\Local\Temp\e9c47df617e481fcd2c55e92ef01763202fdbeb91dbcce1888f3ee64b00b15e2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224083.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr061505.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr061505.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 10724⤵
- Program crash
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu397342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu397342.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 13204⤵
- Program crash
PID:3760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848208.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 928 -ip 9281⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1856 -ip 18561⤵PID:5068
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
550KB
MD53fb4f841349d68b3b8f5d83b06cd8222
SHA1a33cc3b928511cfecb58501282556c9739cb80d9
SHA25662f2a2326bb4243edf298a0bfba00adfd9b22364e0d2ea5eb9f286b70bab6e54
SHA5121c09620cc495848dc2a31ab9be6b94d6497b0a03969b1da26d625ee8437d73e8933c0547c7198ad0a4ff4d1280f6cc0adcf70009ccbdd4afa2ffddfcc378abf2
-
Filesize
550KB
MD53fb4f841349d68b3b8f5d83b06cd8222
SHA1a33cc3b928511cfecb58501282556c9739cb80d9
SHA25662f2a2326bb4243edf298a0bfba00adfd9b22364e0d2ea5eb9f286b70bab6e54
SHA5121c09620cc495848dc2a31ab9be6b94d6497b0a03969b1da26d625ee8437d73e8933c0547c7198ad0a4ff4d1280f6cc0adcf70009ccbdd4afa2ffddfcc378abf2
-
Filesize
278KB
MD568cba3fc32aca719c0412bb99239543c
SHA1ad6563b5dda5e6c1944c79cb8fccf0647ea82ac5
SHA2567b28a705215cc5683a45ca18ac24dc9b73e6c3c8d6030b0893310e6e3821519c
SHA512acc2db070e2926910676e3c2e3a480cb644a647bf08be487cdeefacbf2914480f158e570227d2db954d1fcbb1aaaec5835b1187ce1d7eaef4371f39f2432a560
-
Filesize
278KB
MD568cba3fc32aca719c0412bb99239543c
SHA1ad6563b5dda5e6c1944c79cb8fccf0647ea82ac5
SHA2567b28a705215cc5683a45ca18ac24dc9b73e6c3c8d6030b0893310e6e3821519c
SHA512acc2db070e2926910676e3c2e3a480cb644a647bf08be487cdeefacbf2914480f158e570227d2db954d1fcbb1aaaec5835b1187ce1d7eaef4371f39f2432a560
-
Filesize
361KB
MD586a99833e769557caa39ecb10fd6bfcd
SHA1f5507dada4002cbcd0092d4180584914ea6cfcb8
SHA256f68613550063c7a0cd34ef7b16ae3f0b68ba7cf1041bbb374fcca776a5eed751
SHA5125cd01bd1bf5c4634a85a86c9e722b54842e8c6b3f58693b20b7832b4942adf95e770fd452b59c9f411988dbbdaa319aa7802ef81a84fb98fc532c4747b3df4d7
-
Filesize
361KB
MD586a99833e769557caa39ecb10fd6bfcd
SHA1f5507dada4002cbcd0092d4180584914ea6cfcb8
SHA256f68613550063c7a0cd34ef7b16ae3f0b68ba7cf1041bbb374fcca776a5eed751
SHA5125cd01bd1bf5c4634a85a86c9e722b54842e8c6b3f58693b20b7832b4942adf95e770fd452b59c9f411988dbbdaa319aa7802ef81a84fb98fc532c4747b3df4d7