Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 19:21
Static task
static1
General
-
Target
15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe
-
Size
703KB
-
MD5
f045ba81d5c2be9c46f69e29b157bac0
-
SHA1
f05cb0a71eb76c59dc1a6469798e7897eabee1db
-
SHA256
15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b
-
SHA512
9b41e8427da1c477f185f7896f37775f0ffd4abb873f4d7bfa207fa6ad6600947437a178fb2bc258731ea3889ccb0d9d017948e22b81cb632cf51d39859c3dc8
-
SSDEEP
12288:Sy90vBC/C37j++boDJt/lXxJ2x/OE0XYz7J0r1ealirNcl:SywCAV4j/lb2x/OE0IzMs/Jcl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr318125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr318125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr318125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr318125.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr318125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr318125.exe -
Executes dropped EXE 4 IoCs
pid Process 1488 un698883.exe 2032 pr318125.exe 1404 qu671119.exe 2036 si168537.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr318125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr318125.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698883.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4864 2032 WerFault.exe 85 1560 1404 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2032 pr318125.exe 2032 pr318125.exe 1404 qu671119.exe 1404 qu671119.exe 2036 si168537.exe 2036 si168537.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2032 pr318125.exe Token: SeDebugPrivilege 1404 qu671119.exe Token: SeDebugPrivilege 2036 si168537.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3348 wrote to memory of 1488 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 84 PID 3348 wrote to memory of 1488 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 84 PID 3348 wrote to memory of 1488 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 84 PID 1488 wrote to memory of 2032 1488 un698883.exe 85 PID 1488 wrote to memory of 2032 1488 un698883.exe 85 PID 1488 wrote to memory of 2032 1488 un698883.exe 85 PID 1488 wrote to memory of 1404 1488 un698883.exe 91 PID 1488 wrote to memory of 1404 1488 un698883.exe 91 PID 1488 wrote to memory of 1404 1488 un698883.exe 91 PID 3348 wrote to memory of 2036 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 94 PID 3348 wrote to memory of 2036 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 94 PID 3348 wrote to memory of 2036 3348 15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe"C:\Users\Admin\AppData\Local\Temp\15f3a816a3d7bfdd77be4e417af4246db3e854d00a8b3d7bc779d821a327ab3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr318125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr318125.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 10804⤵
- Program crash
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu671119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu671119.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 17284⤵
- Program crash
PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si168537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si168537.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2032 -ip 20321⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1404 -ip 14041⤵PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
549KB
MD59a3dce69885d9d720609e56da5530190
SHA1f624b3fe5224da7705be197307b0cdf73231383d
SHA2569aa38c9715c5bc6fede2ce1d894b38f7d8bf78cd212ea18b475b993d42a2b8e3
SHA51293e74f8b51971d424387fcbc9e935feb527802283a2ad25d4b669f07e38076be8ca6830d6d923b9b8beb10e2abb8d160d70b70ccc528c2f3e3063a378f15b983
-
Filesize
549KB
MD59a3dce69885d9d720609e56da5530190
SHA1f624b3fe5224da7705be197307b0cdf73231383d
SHA2569aa38c9715c5bc6fede2ce1d894b38f7d8bf78cd212ea18b475b993d42a2b8e3
SHA51293e74f8b51971d424387fcbc9e935feb527802283a2ad25d4b669f07e38076be8ca6830d6d923b9b8beb10e2abb8d160d70b70ccc528c2f3e3063a378f15b983
-
Filesize
278KB
MD5abb2864cf22d3cca8b577a69c3ed9100
SHA191ffe9782c71f4e54d138d9e70a97aea880f4db7
SHA2569d7dc8f877f09356e35208cf8508efc188da083b563b44b95b77e15dca355da3
SHA512d7c2ef05d54d1fef025958bf11ed993882a221a32b76b619f885d3557948ba8829c1e163afff75f98e8eb2eb7d680b97495dcf194f7b09b4fbce5b02a934a66b
-
Filesize
278KB
MD5abb2864cf22d3cca8b577a69c3ed9100
SHA191ffe9782c71f4e54d138d9e70a97aea880f4db7
SHA2569d7dc8f877f09356e35208cf8508efc188da083b563b44b95b77e15dca355da3
SHA512d7c2ef05d54d1fef025958bf11ed993882a221a32b76b619f885d3557948ba8829c1e163afff75f98e8eb2eb7d680b97495dcf194f7b09b4fbce5b02a934a66b
-
Filesize
360KB
MD5b3d1661bd69472c8198809ebc2f62941
SHA15e71983f026aac0788c2913caaa10df77d092d0b
SHA256cea356157ffcc53688b1cfd20cac11f81d34dfc6f862d7d70699e1d52f04fe61
SHA512ae5645f72ea6ba20b2f5dfdc84b2b8e347e1a1271b7a9892e4f7e3bb070c756f067a0487bd9e31ac06949eb7e7addd73c8c0c189c9c8d57fafc048b1d558fb30
-
Filesize
360KB
MD5b3d1661bd69472c8198809ebc2f62941
SHA15e71983f026aac0788c2913caaa10df77d092d0b
SHA256cea356157ffcc53688b1cfd20cac11f81d34dfc6f862d7d70699e1d52f04fe61
SHA512ae5645f72ea6ba20b2f5dfdc84b2b8e347e1a1271b7a9892e4f7e3bb070c756f067a0487bd9e31ac06949eb7e7addd73c8c0c189c9c8d57fafc048b1d558fb30