Analysis
-
max time kernel
103s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 17:37
Static task
static1
General
-
Target
8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe
-
Size
702KB
-
MD5
a31cd0fa173e47dec8e3ca2521560e37
-
SHA1
56eceaa41870412ec2145aac2c6e34847e9e2001
-
SHA256
8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750
-
SHA512
c36a857f007b11981355ae8d86f913524a26216143a8a597cf853df5ac4aa54b63df1e7e149d698b20cb2642a570bfcaa8e6951dd6e48233d0d993aa4b6e20d5
-
SSDEEP
12288:ky90xZNXdmMOMIr0NtYDPIQXmIE6AAd2x/tE5Xp6zK0r3ea3iWxTc0:kykNEMIrCtoTXhEdS2x/tE5Z6huXg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr686039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr686039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr686039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr686039.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr686039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr686039.exe -
Executes dropped EXE 4 IoCs
pid Process 4192 un784453.exe 5024 pr686039.exe 4484 qu685265.exe 3976 si573277.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr686039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr686039.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un784453.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un784453.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4048 5024 WerFault.exe 86 3172 4484 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5024 pr686039.exe 5024 pr686039.exe 4484 qu685265.exe 4484 qu685265.exe 3976 si573277.exe 3976 si573277.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5024 pr686039.exe Token: SeDebugPrivilege 4484 qu685265.exe Token: SeDebugPrivilege 3976 si573277.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 852 wrote to memory of 4192 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 85 PID 852 wrote to memory of 4192 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 85 PID 852 wrote to memory of 4192 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 85 PID 4192 wrote to memory of 5024 4192 un784453.exe 86 PID 4192 wrote to memory of 5024 4192 un784453.exe 86 PID 4192 wrote to memory of 5024 4192 un784453.exe 86 PID 4192 wrote to memory of 4484 4192 un784453.exe 92 PID 4192 wrote to memory of 4484 4192 un784453.exe 92 PID 4192 wrote to memory of 4484 4192 un784453.exe 92 PID 852 wrote to memory of 3976 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 95 PID 852 wrote to memory of 3976 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 95 PID 852 wrote to memory of 3976 852 8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe"C:\Users\Admin\AppData\Local\Temp\8d348cb33c00c2a02aa8fcdfb7dfcf84846f98cb3e3d02c7027d1c5667cfb750.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784453.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784453.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr686039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr686039.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 10964⤵
- Program crash
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu685265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu685265.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 13284⤵
- Program crash
PID:3172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573277.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573277.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5024 -ip 50241⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4484 -ip 44841⤵PID:932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
548KB
MD571154dffbba39ca4261ec2c61fbb8bde
SHA1e106e2ca35776a5cdff16483a853e55142579c24
SHA256d4183448ecc8fe117928582c6e2fb691b612eebb32d6eeec66b79f8f50c37ce7
SHA512c71a3969f549d7189a266a5ff65e4be7391d76d00d475b19b7d06460171c5407f25bae76701aa8c9166849c8981b02e30cfac0525e81a6b255488aba8a8f5d4b
-
Filesize
548KB
MD571154dffbba39ca4261ec2c61fbb8bde
SHA1e106e2ca35776a5cdff16483a853e55142579c24
SHA256d4183448ecc8fe117928582c6e2fb691b612eebb32d6eeec66b79f8f50c37ce7
SHA512c71a3969f549d7189a266a5ff65e4be7391d76d00d475b19b7d06460171c5407f25bae76701aa8c9166849c8981b02e30cfac0525e81a6b255488aba8a8f5d4b
-
Filesize
278KB
MD5627249b5fb2fd0ef94da22a5a3359ead
SHA1500fc13e501a4e67f9f7e08da50faf59e3744e2f
SHA2566ea02aaeda03fbc2de9d30f0e5b59de6aa7c457b7881563bcc77d57802ca2cde
SHA512e84387a041f692c0ad257ad248804cca6db1c17d620e4ffc46dc61170ad316dfb1bb55c01741b308c1cb32ac168f981295f8200fd0a042155095935792e883b6
-
Filesize
278KB
MD5627249b5fb2fd0ef94da22a5a3359ead
SHA1500fc13e501a4e67f9f7e08da50faf59e3744e2f
SHA2566ea02aaeda03fbc2de9d30f0e5b59de6aa7c457b7881563bcc77d57802ca2cde
SHA512e84387a041f692c0ad257ad248804cca6db1c17d620e4ffc46dc61170ad316dfb1bb55c01741b308c1cb32ac168f981295f8200fd0a042155095935792e883b6
-
Filesize
360KB
MD5597ea7e525a432bda12339321fe11130
SHA10ada1a6a3785285040e615737fd4663c138d5bfc
SHA2561ba63bf90cd5204f4d2a797b072a93b8c0bc460296f20c164471c88db0e56bff
SHA512bf366e11ad639df3d06e62ecb380df576a343ddeec96513ee1dbe020b7447c18e2be4855fe59a76b5d30da343ac55e9d92e627d1b02caff529aadbc4c0abd320
-
Filesize
360KB
MD5597ea7e525a432bda12339321fe11130
SHA10ada1a6a3785285040e615737fd4663c138d5bfc
SHA2561ba63bf90cd5204f4d2a797b072a93b8c0bc460296f20c164471c88db0e56bff
SHA512bf366e11ad639df3d06e62ecb380df576a343ddeec96513ee1dbe020b7447c18e2be4855fe59a76b5d30da343ac55e9d92e627d1b02caff529aadbc4c0abd320