Analysis
-
max time kernel
53s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2023, 09:40
Static task
static1
General
-
Target
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe
-
Size
566KB
-
MD5
8fd8b2bffe6e66aef0b58abea7b0f468
-
SHA1
4899c1c07ed40677d89afdd37808cbde22cccf6c
-
SHA256
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256
-
SHA512
afb22502b7a04f20d0d82e3abb747dbb37540e1ccf44fb4cb154a204fdd3cecb55442791eb6ddb44f4be9ffb4e48f99db4cec6b5f2c09ff12f89bab4dba412ef
-
SSDEEP
12288:0y90jHsxLvLnKJYZneJMsEtjEAzuZGF/RvXTZvV:0yb5KJYsJxEtjESuZSnd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it030628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it030628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it030628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it030628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it030628.exe -
Executes dropped EXE 4 IoCs
pid Process 2580 ziWU6816.exe 2940 it030628.exe 3996 kp771733.exe 912 lr461327.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it030628.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWU6816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWU6816.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2940 it030628.exe 2940 it030628.exe 3996 kp771733.exe 3996 kp771733.exe 912 lr461327.exe 912 lr461327.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2940 it030628.exe Token: SeDebugPrivilege 3996 kp771733.exe Token: SeDebugPrivilege 912 lr461327.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2580 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 66 PID 2364 wrote to memory of 2580 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 66 PID 2364 wrote to memory of 2580 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 66 PID 2580 wrote to memory of 2940 2580 ziWU6816.exe 67 PID 2580 wrote to memory of 2940 2580 ziWU6816.exe 67 PID 2580 wrote to memory of 3996 2580 ziWU6816.exe 68 PID 2580 wrote to memory of 3996 2580 ziWU6816.exe 68 PID 2580 wrote to memory of 3996 2580 ziWU6816.exe 68 PID 2364 wrote to memory of 912 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 70 PID 2364 wrote to memory of 912 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 70 PID 2364 wrote to memory of 912 2364 df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe"C:\Users\Admin\AppData\Local\Temp\df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWU6816.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWU6816.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it030628.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it030628.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp771733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp771733.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr461327.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr461327.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
412KB
MD558517dedb7377dc671789b2bb15c50e3
SHA1036eb257aff09368eee1b1d4a76401ed29ff5400
SHA256ed404505f91ac2263c0869bc98c5248254732ec76cf95987b2fc71405f225757
SHA51251f8e3ee320ff861bc685831395457e3e62813cee276bd6214472b3321b3c65edbb3dd60a01601d46bd2d767e080375494fa8a5925d863d498aa330c8cfc9016
-
Filesize
412KB
MD558517dedb7377dc671789b2bb15c50e3
SHA1036eb257aff09368eee1b1d4a76401ed29ff5400
SHA256ed404505f91ac2263c0869bc98c5248254732ec76cf95987b2fc71405f225757
SHA51251f8e3ee320ff861bc685831395457e3e62813cee276bd6214472b3321b3c65edbb3dd60a01601d46bd2d767e080375494fa8a5925d863d498aa330c8cfc9016
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
368KB
MD5b3bcb2059e2e35eae4079f6d093d7468
SHA1851d3bc05e3e9973eaf17e004ba83255b827c342
SHA2563a86bd8f44b13fc30710635d35fc48f28b8120b4b9adec409d176b60f0c312e6
SHA512e13793f7de6fd4ae6f24e8d5f0bcd905301b2d32c6f5d456eaf13cc28f7441a8a85fe2785ad7bc126a359fb23ddfe8a35e8deadb2fc4db7b9787b10462ef97e7
-
Filesize
368KB
MD5b3bcb2059e2e35eae4079f6d093d7468
SHA1851d3bc05e3e9973eaf17e004ba83255b827c342
SHA2563a86bd8f44b13fc30710635d35fc48f28b8120b4b9adec409d176b60f0c312e6
SHA512e13793f7de6fd4ae6f24e8d5f0bcd905301b2d32c6f5d456eaf13cc28f7441a8a85fe2785ad7bc126a359fb23ddfe8a35e8deadb2fc4db7b9787b10462ef97e7