Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2023, 12:46
Static task
static1
General
-
Target
21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe
-
Size
706KB
-
MD5
0d26a12053709510b164f4f10ee23f3c
-
SHA1
8444b649626db4761c4018b9c41c5c1b0ebf6318
-
SHA256
21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d
-
SHA512
30b256c1528fd9a80e2c3e088de3358d350d4ef9bb8cbed5478b6396418c6fff611bbc5e92adcfbb2a4bd8b49ab640f2881d72b2b67eb0d3b5c2ee49266fc0e4
-
SSDEEP
12288:cy900KUJQuGO/lhC3FgwiYZsuanpZc2zEdg2VoyzPmUSYOMjY2CMKDyt:cyzKpClheFg4sfzT4Z6yzSv2+et
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr254507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr254507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr254507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr254507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr254507.exe -
Executes dropped EXE 4 IoCs
pid Process 2296 un521597.exe 2604 pr254507.exe 2068 qu024198.exe 4000 si644460.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr254507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr254507.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un521597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un521597.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2604 pr254507.exe 2604 pr254507.exe 2068 qu024198.exe 2068 qu024198.exe 4000 si644460.exe 4000 si644460.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 pr254507.exe Token: SeDebugPrivilege 2068 qu024198.exe Token: SeDebugPrivilege 4000 si644460.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2296 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 66 PID 2076 wrote to memory of 2296 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 66 PID 2076 wrote to memory of 2296 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 66 PID 2296 wrote to memory of 2604 2296 un521597.exe 67 PID 2296 wrote to memory of 2604 2296 un521597.exe 67 PID 2296 wrote to memory of 2604 2296 un521597.exe 67 PID 2296 wrote to memory of 2068 2296 un521597.exe 68 PID 2296 wrote to memory of 2068 2296 un521597.exe 68 PID 2296 wrote to memory of 2068 2296 un521597.exe 68 PID 2076 wrote to memory of 4000 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 70 PID 2076 wrote to memory of 4000 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 70 PID 2076 wrote to memory of 4000 2076 21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe"C:\Users\Admin\AppData\Local\Temp\21213d789ac77207d93dbe7a43f879cefbba0f942c5b97f4d58d98f1e456d00d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un521597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr254507.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu024198.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644460.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
551KB
MD52331f61a16b5eb5e3c7c4042991fdfa4
SHA10632d3ab9c5f1b381db9a3fe349e24ba2e4f1366
SHA25643796cc1a33a604f0ed97e5836621ffa7fa01291cc24248848b2cc94fe2e76ba
SHA512a78ad09a4cda75780a0c90cc6dcb26ae1d67cd9e1169ee017561b78ebe5071ea6f27cc0365cb484f20f98aba3a82cb7c0828ee585e0d89aa5b1de82c2449c71a
-
Filesize
551KB
MD52331f61a16b5eb5e3c7c4042991fdfa4
SHA10632d3ab9c5f1b381db9a3fe349e24ba2e4f1366
SHA25643796cc1a33a604f0ed97e5836621ffa7fa01291cc24248848b2cc94fe2e76ba
SHA512a78ad09a4cda75780a0c90cc6dcb26ae1d67cd9e1169ee017561b78ebe5071ea6f27cc0365cb484f20f98aba3a82cb7c0828ee585e0d89aa5b1de82c2449c71a
-
Filesize
286KB
MD5a59f438d05a327b05c852aa8982b69e9
SHA16a27c25846902450a7d687556c9f272b425e344d
SHA256021d96fac8dee351d7966414c9d9bf5368ab70266b2c3fb27c8ec60a5411239e
SHA512fc00821e4a9d60128e8cb1b50924a699bc6c00f7263e3a507526c73452538bf7fdae5678223d39c0d9b84fe0ceee939d734dd74215affd4a51c4357bd4df2711
-
Filesize
286KB
MD5a59f438d05a327b05c852aa8982b69e9
SHA16a27c25846902450a7d687556c9f272b425e344d
SHA256021d96fac8dee351d7966414c9d9bf5368ab70266b2c3fb27c8ec60a5411239e
SHA512fc00821e4a9d60128e8cb1b50924a699bc6c00f7263e3a507526c73452538bf7fdae5678223d39c0d9b84fe0ceee939d734dd74215affd4a51c4357bd4df2711
-
Filesize
369KB
MD5ab5b7d34ad808af588b420ffe9c85534
SHA14497dcb003cfe36f2e53c1ebdf08dc5105ad7ca6
SHA256f3e810a23af7c05a19e8a604f796c4f64b208abe8cc9281b1fc405c43a2b218a
SHA512d30c696f445ad8f8247b9bd691f2c09694be830ab773ad3d17f034bbde3ff3fcd88f5807701958a696d3168ee21894944afdabcee9518da550a761d8e4ca0ac5
-
Filesize
369KB
MD5ab5b7d34ad808af588b420ffe9c85534
SHA14497dcb003cfe36f2e53c1ebdf08dc5105ad7ca6
SHA256f3e810a23af7c05a19e8a604f796c4f64b208abe8cc9281b1fc405c43a2b218a
SHA512d30c696f445ad8f8247b9bd691f2c09694be830ab773ad3d17f034bbde3ff3fcd88f5807701958a696d3168ee21894944afdabcee9518da550a761d8e4ca0ac5