Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 08:02
Static task
static1
General
-
Target
0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe
-
Size
706KB
-
MD5
ed24feeef487325b7feef576c160efb6
-
SHA1
634aaf85967bdf0b996b5122c47cca39e3359dd3
-
SHA256
0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540
-
SHA512
fdee13f1fd59f67a164ccae921b49707829668a173ae6cf469c948a9814d57bc8dfcd0eb52784b6ccd5447ce7385eac81f340082914b88a0914c2a07763409ff
-
SSDEEP
12288:My90SckSOzkFWNqDSNMT2O1EZOZruGDkq0ePfyF9mi1Za7iIiZtcOnMiZ8bvRUE:MyZe7WWlL6GYqlfS9minaeVMkQRUE
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr004143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr004143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr004143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr004143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr004143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr004143.exe -
Executes dropped EXE 4 IoCs
pid Process 1056 un291218.exe 5024 pr004143.exe 3908 qu660114.exe 3356 si108422.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr004143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr004143.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un291218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un291218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2324 5024 WerFault.exe 86 4544 3908 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5024 pr004143.exe 5024 pr004143.exe 3908 qu660114.exe 3908 qu660114.exe 3356 si108422.exe 3356 si108422.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5024 pr004143.exe Token: SeDebugPrivilege 3908 qu660114.exe Token: SeDebugPrivilege 3356 si108422.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 880 wrote to memory of 1056 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 85 PID 880 wrote to memory of 1056 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 85 PID 880 wrote to memory of 1056 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 85 PID 1056 wrote to memory of 5024 1056 un291218.exe 86 PID 1056 wrote to memory of 5024 1056 un291218.exe 86 PID 1056 wrote to memory of 5024 1056 un291218.exe 86 PID 1056 wrote to memory of 3908 1056 un291218.exe 92 PID 1056 wrote to memory of 3908 1056 un291218.exe 92 PID 1056 wrote to memory of 3908 1056 un291218.exe 92 PID 880 wrote to memory of 3356 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 95 PID 880 wrote to memory of 3356 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 95 PID 880 wrote to memory of 3356 880 0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe"C:\Users\Admin\AppData\Local\Temp\0bcaf68a523bc4fa916f95e5e32a1750e17a45f9133c601c2eef8aa186f0b540.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un291218.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr004143.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 10804⤵
- Program crash
PID:2324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu660114.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 19444⤵
- Program crash
PID:4544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108422.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5024 -ip 50241⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3908 -ip 39081⤵PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
551KB
MD542958e666ff95ba032b54049c02feea0
SHA12f9f79ceb9ea697f2dcc71b9fbfdf9f7d0e46330
SHA256676e5b701d331a03903170f17e7d8b880a436a7ce14d097c09aa73e2e6ff1849
SHA51266f649db57d40930c6e5140294b687c4ecf33e9d776edfec9571f327e28896be43fb26b79d0fef1ef18c4d4a701f62238b58a8691c7689c1debace92eb35dd1d
-
Filesize
551KB
MD542958e666ff95ba032b54049c02feea0
SHA12f9f79ceb9ea697f2dcc71b9fbfdf9f7d0e46330
SHA256676e5b701d331a03903170f17e7d8b880a436a7ce14d097c09aa73e2e6ff1849
SHA51266f649db57d40930c6e5140294b687c4ecf33e9d776edfec9571f327e28896be43fb26b79d0fef1ef18c4d4a701f62238b58a8691c7689c1debace92eb35dd1d
-
Filesize
286KB
MD55b9e8290f79367b948cba5a5a7541723
SHA1f27ef606d9a1a08589cefd39bbd35927e4fba746
SHA25691db64fc436fbf9ed1f2761f53a12456409fb6d44fb3288c47426405ab504cf3
SHA512968ab95c50846666937a061029de31d8586b3cd0d4f8d5362d13410e03e90ae7975952395c161b87634f7ed6e84e8139144d28aef860cd449ee0e692c4932a94
-
Filesize
286KB
MD55b9e8290f79367b948cba5a5a7541723
SHA1f27ef606d9a1a08589cefd39bbd35927e4fba746
SHA25691db64fc436fbf9ed1f2761f53a12456409fb6d44fb3288c47426405ab504cf3
SHA512968ab95c50846666937a061029de31d8586b3cd0d4f8d5362d13410e03e90ae7975952395c161b87634f7ed6e84e8139144d28aef860cd449ee0e692c4932a94
-
Filesize
368KB
MD5f275dd9fbd4d58e6f4f6c22a981b229c
SHA1e183472f38bc37f5bc075a38ec992383c0d15a35
SHA256b3f8dd87a1acd37fd841e9e434bb8550b65908b8deb577c566e756960d5347c4
SHA51292b180dff2fd9f2a2a36dee5ba0abedd848b364804862e7b55bd8ba11c3fdc351529d89005c241a02c29df3bea79849d83b6396baa8aeb0910a1cb9dcb4f2af5
-
Filesize
368KB
MD5f275dd9fbd4d58e6f4f6c22a981b229c
SHA1e183472f38bc37f5bc075a38ec992383c0d15a35
SHA256b3f8dd87a1acd37fd841e9e434bb8550b65908b8deb577c566e756960d5347c4
SHA51292b180dff2fd9f2a2a36dee5ba0abedd848b364804862e7b55bd8ba11c3fdc351529d89005c241a02c29df3bea79849d83b6396baa8aeb0910a1cb9dcb4f2af5