Analysis
-
max time kernel
51s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2023, 16:05
Static task
static1
General
-
Target
df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe
-
Size
563KB
-
MD5
ea218785b16edaf00df250a416c01f82
-
SHA1
b602c442f9c01c64f4413d8a37ed6e0eec9d6649
-
SHA256
df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce
-
SHA512
86d7715f03b1a531cbcea098fbf6badce91ecdeb2d5cf97ccd8549faa59a29e5ad84727839b9a79c32e539f8b79d4892b567b67f346591724908b8b0f26a397c
-
SSDEEP
12288:Oy90b8MDiXzl+jesXPU0em2NNT2vISgjLqukMbzb/9j4UmZ1zA:Oy+y8jrUHmISg3q6xNmr0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it560779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it560779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it560779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it560779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it560779.exe -
Executes dropped EXE 4 IoCs
pid Process 3512 ziYx1615.exe 1728 it560779.exe 3972 kp627839.exe 2860 lr053811.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it560779.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYx1615.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYx1615.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1728 it560779.exe 1728 it560779.exe 3972 kp627839.exe 3972 kp627839.exe 2860 lr053811.exe 2860 lr053811.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1728 it560779.exe Token: SeDebugPrivilege 3972 kp627839.exe Token: SeDebugPrivilege 2860 lr053811.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3512 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 66 PID 4024 wrote to memory of 3512 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 66 PID 4024 wrote to memory of 3512 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 66 PID 3512 wrote to memory of 1728 3512 ziYx1615.exe 67 PID 3512 wrote to memory of 1728 3512 ziYx1615.exe 67 PID 3512 wrote to memory of 3972 3512 ziYx1615.exe 68 PID 3512 wrote to memory of 3972 3512 ziYx1615.exe 68 PID 3512 wrote to memory of 3972 3512 ziYx1615.exe 68 PID 4024 wrote to memory of 2860 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 70 PID 4024 wrote to memory of 2860 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 70 PID 4024 wrote to memory of 2860 4024 df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe"C:\Users\Admin\AppData\Local\Temp\df4527cafe947f6066437e04fb513228abfe5664dc8bac10fd8ccc7c1e6367ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYx1615.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYx1615.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it560779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it560779.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp627839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp627839.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr053811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr053811.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
408KB
MD59ff033d23f20f8801924c7bb06520987
SHA12a065b497e6003bbf87b8294b0e94fdee751b772
SHA2569242596bf1d61071e75228f9c39bd37c10c5450b590220d89c5ca53dc7a78984
SHA51297c7504badd1f753a1aabd3856ace540926ed69744e44316d33f53928b3bd250293335b862a32bace9376c66b3f47d7d659309a2bae4306e64da5adcb55b9186
-
Filesize
408KB
MD59ff033d23f20f8801924c7bb06520987
SHA12a065b497e6003bbf87b8294b0e94fdee751b772
SHA2569242596bf1d61071e75228f9c39bd37c10c5450b590220d89c5ca53dc7a78984
SHA51297c7504badd1f753a1aabd3856ace540926ed69744e44316d33f53928b3bd250293335b862a32bace9376c66b3f47d7d659309a2bae4306e64da5adcb55b9186
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD531cc2034712348e2df130187f37e7b33
SHA12f78a18069a8a9557e05e7f40b35941700f142a2
SHA2566ad6f829ed076091ba310653c8dc3b586378cab162b562fd960ebdbf8932a931
SHA512a09dd17e70057588154876e9cab1ad03a7b9751253d12a100532cc0da1d57c4651506f501a77ad4ad54744a4a8b7ffebcad5274605182b04ed8e29e24c20be2a
-
Filesize
359KB
MD531cc2034712348e2df130187f37e7b33
SHA12f78a18069a8a9557e05e7f40b35941700f142a2
SHA2566ad6f829ed076091ba310653c8dc3b586378cab162b562fd960ebdbf8932a931
SHA512a09dd17e70057588154876e9cab1ad03a7b9751253d12a100532cc0da1d57c4651506f501a77ad4ad54744a4a8b7ffebcad5274605182b04ed8e29e24c20be2a