Analysis
-
max time kernel
80s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 03:44
Static task
static1
General
-
Target
e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe
-
Size
706KB
-
MD5
defc2deac6eb4af228ad620fb61e67da
-
SHA1
c2fd4a2b13b5afa15f8d1f646d98d2262b23e97c
-
SHA256
e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423
-
SHA512
889048f7049e5ab6079d8c4a7892a13c8efc11889030e4d791a34ae3f4500197c880597f830efe10d21cacf27be950217d2002570ffabae061fd63e18a5efd39
-
SSDEEP
12288:py90DX0VgG/Fi7w68MJUtE6WLOQGImpB1uGFTn1squfVJxici:py2XkgGW8MJ2EHOfImxRrsif
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr082458.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr082458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr082458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr082458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr082458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr082458.exe -
Executes dropped EXE 4 IoCs
pid Process 3396 un064922.exe 2016 pr082458.exe 3908 qu242046.exe 2960 si333854.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr082458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr082458.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un064922.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un064922.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4372 2016 WerFault.exe 86 4672 3908 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2016 pr082458.exe 2016 pr082458.exe 3908 qu242046.exe 3908 qu242046.exe 2960 si333854.exe 2960 si333854.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2016 pr082458.exe Token: SeDebugPrivilege 3908 qu242046.exe Token: SeDebugPrivilege 2960 si333854.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3396 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 85 PID 1740 wrote to memory of 3396 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 85 PID 1740 wrote to memory of 3396 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 85 PID 3396 wrote to memory of 2016 3396 un064922.exe 86 PID 3396 wrote to memory of 2016 3396 un064922.exe 86 PID 3396 wrote to memory of 2016 3396 un064922.exe 86 PID 3396 wrote to memory of 3908 3396 un064922.exe 91 PID 3396 wrote to memory of 3908 3396 un064922.exe 91 PID 3396 wrote to memory of 3908 3396 un064922.exe 91 PID 1740 wrote to memory of 2960 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 95 PID 1740 wrote to memory of 2960 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 95 PID 1740 wrote to memory of 2960 1740 e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe"C:\Users\Admin\AppData\Local\Temp\e4ec4b4a139efb8d6076ccf1eda142f8174b8e8828587572608183868c2f3423.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064922.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064922.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr082458.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr082458.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 10804⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu242046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu242046.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 18924⤵
- Program crash
PID:4672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333854.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2016 -ip 20161⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3908 -ip 39081⤵PID:1348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
552KB
MD52ecf5aced47ad784bf022de7776ec650
SHA1dcb8644063d27fe4c2ef2c1bfc37cdb0ae978f3b
SHA2562c1b840b6b70dff74ede94f1de093c93b4c26feb63ed1150d614ee5058a1e2c3
SHA5122d9583a3319a4125dc26a34e6c72a885138583e1475e708c907fb577f4b54935bc85f01feeb91e5313ca8f2176228bad82e770ca188eaca63d1cd46e88011032
-
Filesize
552KB
MD52ecf5aced47ad784bf022de7776ec650
SHA1dcb8644063d27fe4c2ef2c1bfc37cdb0ae978f3b
SHA2562c1b840b6b70dff74ede94f1de093c93b4c26feb63ed1150d614ee5058a1e2c3
SHA5122d9583a3319a4125dc26a34e6c72a885138583e1475e708c907fb577f4b54935bc85f01feeb91e5313ca8f2176228bad82e770ca188eaca63d1cd46e88011032
-
Filesize
283KB
MD51364f6e53b4e71245b113b8e38494392
SHA1c1ae5e0e3b6e014bb3de6477febe717609866216
SHA2566a13ab8d323fdb2b31a27e6aec201ba545105ff7cb7dc677233962bf2f78b3ff
SHA512da13337fa65aa7aca6473398aea56e057990b6eb75ce1fffd90141571718e3595bdfa27eb86df9887070ca44332b6e85227e0b4d6ac47930aee080e29b6bd9d3
-
Filesize
283KB
MD51364f6e53b4e71245b113b8e38494392
SHA1c1ae5e0e3b6e014bb3de6477febe717609866216
SHA2566a13ab8d323fdb2b31a27e6aec201ba545105ff7cb7dc677233962bf2f78b3ff
SHA512da13337fa65aa7aca6473398aea56e057990b6eb75ce1fffd90141571718e3595bdfa27eb86df9887070ca44332b6e85227e0b4d6ac47930aee080e29b6bd9d3
-
Filesize
353KB
MD5d9588724e2501742b327c693f77f76bd
SHA16bcbd14672b63d61dbea9179369881ae3e2a8265
SHA2566876dc4381e4af514cd00df4ff204f882c3e3f9e94ff09f6f42b53e5a3554795
SHA512bb3b13e96b54bb485b6379d895b33728148daeec6eca552ec9f7610578f9fd6706f5ec9b574ef658e2b5049811c86e154f06e8e4259dd48a3e4166eecf5bff44
-
Filesize
353KB
MD5d9588724e2501742b327c693f77f76bd
SHA16bcbd14672b63d61dbea9179369881ae3e2a8265
SHA2566876dc4381e4af514cd00df4ff204f882c3e3f9e94ff09f6f42b53e5a3554795
SHA512bb3b13e96b54bb485b6379d895b33728148daeec6eca552ec9f7610578f9fd6706f5ec9b574ef658e2b5049811c86e154f06e8e4259dd48a3e4166eecf5bff44