Analysis
-
max time kernel
98s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 09:57
Static task
static1
General
-
Target
1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe
-
Size
705KB
-
MD5
e657334698a75f67ad422545cb5ab54d
-
SHA1
0e6cbe786dafbf1161223aa370e90e9c90e67893
-
SHA256
1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b
-
SHA512
87a2e5df839bf1de123efe8730ed33e7489b672bbcb814357acbb981b268af146644d2f2a58c08d4af113275676617858a0dffe2086d25c1c19b7a744992019e
-
SSDEEP
12288:iy90mWWzs8Gz2ScJ1yu8L6cGGIqeJSZRSTUionOqPTcIgm:iyzJGXcJ1yu1c9QKR8UionOq4IH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr518627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr518627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr518627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr518627.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr518627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr518627.exe -
Executes dropped EXE 4 IoCs
pid Process 1248 un282268.exe 1952 pr518627.exe 3172 qu076964.exe 1168 si161437.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr518627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr518627.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un282268.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un282268.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3412 1952 WerFault.exe 85 1700 3172 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 pr518627.exe 1952 pr518627.exe 3172 qu076964.exe 3172 qu076964.exe 1168 si161437.exe 1168 si161437.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1952 pr518627.exe Token: SeDebugPrivilege 3172 qu076964.exe Token: SeDebugPrivilege 1168 si161437.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1248 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 84 PID 2208 wrote to memory of 1248 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 84 PID 2208 wrote to memory of 1248 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 84 PID 1248 wrote to memory of 1952 1248 un282268.exe 85 PID 1248 wrote to memory of 1952 1248 un282268.exe 85 PID 1248 wrote to memory of 1952 1248 un282268.exe 85 PID 1248 wrote to memory of 3172 1248 un282268.exe 89 PID 1248 wrote to memory of 3172 1248 un282268.exe 89 PID 1248 wrote to memory of 3172 1248 un282268.exe 89 PID 2208 wrote to memory of 1168 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 93 PID 2208 wrote to memory of 1168 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 93 PID 2208 wrote to memory of 1168 2208 1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe"C:\Users\Admin\AppData\Local\Temp\1af407950c398dab06e911eb8fbcc8f4de20afa4320b2874576963056968b44b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282268.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr518627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr518627.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 10804⤵
- Program crash
PID:3412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu076964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu076964.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 14804⤵
- Program crash
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161437.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\system32\WerFaultSecure.exe"C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 4604 -i 4604 -h 476 -j 480 -s 488 -d 50521⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1952 -ip 19521⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3172 -ip 31721⤵PID:3264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
551KB
MD5a7dae8f923423ab55a524d05781e1588
SHA1f6e1b665b05a03f05ddc533d446d5fc45699eb51
SHA256fc9e287d7e78233c0c0d3b3714c9ae62dca42bdd5492173eeb6e9c670ff6a16e
SHA512611b81de1dfbf02872e2dc3aea57707411a4d266cb52b682a166527d9a8fbf470d49a4f70fa28de7100db7745f180e1ac99a8cc1f71092e4e123bbc1f1ccc446
-
Filesize
551KB
MD5a7dae8f923423ab55a524d05781e1588
SHA1f6e1b665b05a03f05ddc533d446d5fc45699eb51
SHA256fc9e287d7e78233c0c0d3b3714c9ae62dca42bdd5492173eeb6e9c670ff6a16e
SHA512611b81de1dfbf02872e2dc3aea57707411a4d266cb52b682a166527d9a8fbf470d49a4f70fa28de7100db7745f180e1ac99a8cc1f71092e4e123bbc1f1ccc446
-
Filesize
286KB
MD5981b7e14194c93cf72dd25b05880464f
SHA10ac4c2da5ce9bf331466549b07cb3d9c7ee85c7d
SHA256a116313b763a360468d3cbb057777b7fabab46967452cdad6ce728116d968b28
SHA5127d7ae0dff6cf775c243c815dc06f7ae637d8edc13a40987738ad3720950bf219af3a78c30312dd48b21eba3c79a21297b5856c9dfa01e77b88b16b91bdc3741d
-
Filesize
286KB
MD5981b7e14194c93cf72dd25b05880464f
SHA10ac4c2da5ce9bf331466549b07cb3d9c7ee85c7d
SHA256a116313b763a360468d3cbb057777b7fabab46967452cdad6ce728116d968b28
SHA5127d7ae0dff6cf775c243c815dc06f7ae637d8edc13a40987738ad3720950bf219af3a78c30312dd48b21eba3c79a21297b5856c9dfa01e77b88b16b91bdc3741d
-
Filesize
368KB
MD5216bc12472cd11aae5273ea6a391343a
SHA1029d06606fe27ccd25ebcbcaa88ebb9d529b0ddd
SHA256f572e2655767cd2cb50cddf0616c8e97534dac5d9554b0019d31889609cff6a9
SHA51219c1c332c1bf740169136437e7c0f5e2401383c9da94f9dc9a65a04032bb76d337734c6e57d3e8484d71e44c8371a8de82dd48fc7f916af53cd71cf4ab170175
-
Filesize
368KB
MD5216bc12472cd11aae5273ea6a391343a
SHA1029d06606fe27ccd25ebcbcaa88ebb9d529b0ddd
SHA256f572e2655767cd2cb50cddf0616c8e97534dac5d9554b0019d31889609cff6a9
SHA51219c1c332c1bf740169136437e7c0f5e2401383c9da94f9dc9a65a04032bb76d337734c6e57d3e8484d71e44c8371a8de82dd48fc7f916af53cd71cf4ab170175