Analysis
-
max time kernel
86s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2023, 04:34
Static task
static1
General
-
Target
d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe
-
Size
706KB
-
MD5
884fdfda3a310db4e265690a8583f5b8
-
SHA1
5e4d20d83835d4ea7a362cf987c5a4da5d38befc
-
SHA256
d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83
-
SHA512
1c380db8820ab521d3dd41deffb1c37edbe6d71385d86f92586d5d2602762b0fc8f60113406e263cd47a0399c5f5d17b67c9f94e90414d4c8701b57904b4db8a
-
SSDEEP
12288:Yy909q8q8oLqwBuXt4xSpemfvdZyhnEPjmGeUpBpdyFTn1wquFVJ0vbovGVSmdr:YytP8IqwE4YpenMteAaRXpkvGVSm5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr163085.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr163085.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr163085.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr163085.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr163085.exe -
Executes dropped EXE 4 IoCs
pid Process 2804 un366693.exe 2988 pr163085.exe 4708 qu556971.exe 2128 si676755.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr163085.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr163085.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un366693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un366693.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 pr163085.exe 2988 pr163085.exe 4708 qu556971.exe 4708 qu556971.exe 2128 si676755.exe 2128 si676755.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 pr163085.exe Token: SeDebugPrivilege 4708 qu556971.exe Token: SeDebugPrivilege 2128 si676755.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2804 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 66 PID 2476 wrote to memory of 2804 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 66 PID 2476 wrote to memory of 2804 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 66 PID 2804 wrote to memory of 2988 2804 un366693.exe 67 PID 2804 wrote to memory of 2988 2804 un366693.exe 67 PID 2804 wrote to memory of 2988 2804 un366693.exe 67 PID 2804 wrote to memory of 4708 2804 un366693.exe 68 PID 2804 wrote to memory of 4708 2804 un366693.exe 68 PID 2804 wrote to memory of 4708 2804 un366693.exe 68 PID 2476 wrote to memory of 2128 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 70 PID 2476 wrote to memory of 2128 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 70 PID 2476 wrote to memory of 2128 2476 d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe"C:\Users\Admin\AppData\Local\Temp\d1dc968c75ab4948c715d005638a7f3a4188eabfcf2e8b855aa8ec25040eeb83.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un366693.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr163085.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu556971.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676755.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
552KB
MD5ec9d8cf1ad79c68df11fd617caac2556
SHA1417bcd9ac76003bff19acdebeadf0697407bcbb3
SHA2567f3349e4446c055776c7be835b2cb6743c2468ec42f5d644355aee141d77d2de
SHA512a1f9ec74dabe5bfc40bb75aa3ea65034f944976e556f9799bf292242f1eb12bb6db0de4b1cebcb4ffd9723945954abe69f297ba585116f8fed57e0d46d723bbe
-
Filesize
552KB
MD5ec9d8cf1ad79c68df11fd617caac2556
SHA1417bcd9ac76003bff19acdebeadf0697407bcbb3
SHA2567f3349e4446c055776c7be835b2cb6743c2468ec42f5d644355aee141d77d2de
SHA512a1f9ec74dabe5bfc40bb75aa3ea65034f944976e556f9799bf292242f1eb12bb6db0de4b1cebcb4ffd9723945954abe69f297ba585116f8fed57e0d46d723bbe
-
Filesize
283KB
MD58cc48bf2d5853d38efba532b8b2fb0ad
SHA1028c9d675a881cedc1f4126a752a2b20fe7c2212
SHA2568db41da5db760a7bcfe3dcd115d879db9c955574267e5c6f7fd721c1d31946d8
SHA512a248f482870f8d5820d44528042302117bc34b76cc49ac5af1b502f45bd03a5b93beea99f3181bfc3b554d422ff117d86fa1269fc7424ee7469b849be5a1979a
-
Filesize
283KB
MD58cc48bf2d5853d38efba532b8b2fb0ad
SHA1028c9d675a881cedc1f4126a752a2b20fe7c2212
SHA2568db41da5db760a7bcfe3dcd115d879db9c955574267e5c6f7fd721c1d31946d8
SHA512a248f482870f8d5820d44528042302117bc34b76cc49ac5af1b502f45bd03a5b93beea99f3181bfc3b554d422ff117d86fa1269fc7424ee7469b849be5a1979a
-
Filesize
353KB
MD5adc792f623fcfe74c806681ffb66b993
SHA1fc53ace7838c1e5f9ecedc23c0b8eb302b4a429c
SHA256b6f8a2e101402c7dbc6650954ff87ed322c9c7dc14a433fe45f95bdefadce191
SHA5122154d9f0338652ddebacf9a971a972e8d07ba2d955bd92e6f01956115c80a9965f0c479368afbe3be5233657a0d0b5954af06a224e2e23b99fd7abeecf16fc75
-
Filesize
353KB
MD5adc792f623fcfe74c806681ffb66b993
SHA1fc53ace7838c1e5f9ecedc23c0b8eb302b4a429c
SHA256b6f8a2e101402c7dbc6650954ff87ed322c9c7dc14a433fe45f95bdefadce191
SHA5122154d9f0338652ddebacf9a971a972e8d07ba2d955bd92e6f01956115c80a9965f0c479368afbe3be5233657a0d0b5954af06a224e2e23b99fd7abeecf16fc75