Analysis
-
max time kernel
58s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 02:19
Static task
static1
General
-
Target
e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe
-
Size
696KB
-
MD5
f4947e4103ad55ca349568e7a79a864f
-
SHA1
b59ce1871b90f318a4cce5fdac8171d8aebd708d
-
SHA256
e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715
-
SHA512
d15cbd7cc4ec4e25bc287048680f73ad2de7200308357de5fc072a2e2fc9695de46865d29c0389b259baaf3d8d420c62e925d3c1f23c00c0d697904e4133fd5e
-
SSDEEP
12288:ty90vPxxBYEDuTNtHpmWqGxWq18N/NknwbofXp0NdpFTn1tfudVJJa3IV:tyaxJD+JmWqGsqSNkn0HRdKsC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr328611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr328611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr328611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr328611.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr328611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr328611.exe -
Executes dropped EXE 4 IoCs
pid Process 4200 un100920.exe 368 pr328611.exe 4492 qu657039.exe 1676 si495742.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr328611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr328611.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un100920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un100920.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4832 368 WerFault.exe 85 5096 4492 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 368 pr328611.exe 368 pr328611.exe 4492 qu657039.exe 4492 qu657039.exe 1676 si495742.exe 1676 si495742.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 368 pr328611.exe Token: SeDebugPrivilege 4492 qu657039.exe Token: SeDebugPrivilege 1676 si495742.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 628 wrote to memory of 4200 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 84 PID 628 wrote to memory of 4200 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 84 PID 628 wrote to memory of 4200 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 84 PID 4200 wrote to memory of 368 4200 un100920.exe 85 PID 4200 wrote to memory of 368 4200 un100920.exe 85 PID 4200 wrote to memory of 368 4200 un100920.exe 85 PID 4200 wrote to memory of 4492 4200 un100920.exe 91 PID 4200 wrote to memory of 4492 4200 un100920.exe 91 PID 4200 wrote to memory of 4492 4200 un100920.exe 91 PID 628 wrote to memory of 1676 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 94 PID 628 wrote to memory of 1676 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 94 PID 628 wrote to memory of 1676 628 e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe"C:\Users\Admin\AppData\Local\Temp\e91bce857de6714cf5f221c351328383cdb63892fed23081f40b8c0bb2cd8715.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr328611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr328611.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 10804⤵
- Program crash
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu657039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu657039.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 11844⤵
- Program crash
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si495742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si495742.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 368 -ip 3681⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4492 -ip 44921⤵PID:3268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
542KB
MD594fc7e869412304afb54e0ae6d4bbd0a
SHA18c76f538fc5a02e23eb043bd37bec7fe21684eb5
SHA25630cdb082bfc47b891d975000fb639c8e30e2f46ffab5f4d2d36ba44e6e888bf5
SHA512905f45e5bba3948ff9913f5d22cdcce6184c178d51f9d017567630b2f4ace848c64f0e0c9103101dacb5c09c252f4d070762d9eebffed06ae3e735173aaf8adf
-
Filesize
542KB
MD594fc7e869412304afb54e0ae6d4bbd0a
SHA18c76f538fc5a02e23eb043bd37bec7fe21684eb5
SHA25630cdb082bfc47b891d975000fb639c8e30e2f46ffab5f4d2d36ba44e6e888bf5
SHA512905f45e5bba3948ff9913f5d22cdcce6184c178d51f9d017567630b2f4ace848c64f0e0c9103101dacb5c09c252f4d070762d9eebffed06ae3e735173aaf8adf
-
Filesize
270KB
MD59ac9b7b7860cc2967e87b558efaaddfe
SHA140aab848e7265367e1237860209d1bff3aebc8f6
SHA256ad7c0203a0c578955191cbc8a8d2b38cc4ff452a7760db582415188300f460a9
SHA512ce661e251625b0bca33699ecf0c238477779d8c472a495068de4bcf9f2fed4e4e408bbff17a13327884ac805d35b76ceb1371b455fcc668f8a5aac32d897f8fc
-
Filesize
270KB
MD59ac9b7b7860cc2967e87b558efaaddfe
SHA140aab848e7265367e1237860209d1bff3aebc8f6
SHA256ad7c0203a0c578955191cbc8a8d2b38cc4ff452a7760db582415188300f460a9
SHA512ce661e251625b0bca33699ecf0c238477779d8c472a495068de4bcf9f2fed4e4e408bbff17a13327884ac805d35b76ceb1371b455fcc668f8a5aac32d897f8fc
-
Filesize
353KB
MD5941c682231db89484533965321e23bab
SHA1d51aaf5d2a99f42f93f7907b90f9547daf503735
SHA2567d5a2e6b00636ebc62740f08395131d4fbe0b15a7c211287291de51b08662403
SHA5124739beca97aae2b3ddf9f75de2b64302e3d048eaebe0b3aeaab164af15a0223b5d9c78b88d65479b12c45789e3b982f62184dec521d89590441647493c1a5bf8
-
Filesize
353KB
MD5941c682231db89484533965321e23bab
SHA1d51aaf5d2a99f42f93f7907b90f9547daf503735
SHA2567d5a2e6b00636ebc62740f08395131d4fbe0b15a7c211287291de51b08662403
SHA5124739beca97aae2b3ddf9f75de2b64302e3d048eaebe0b3aeaab164af15a0223b5d9c78b88d65479b12c45789e3b982f62184dec521d89590441647493c1a5bf8