Analysis
-
max time kernel
47s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2023, 19:05
Static task
static1
General
-
Target
c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe
-
Size
563KB
-
MD5
30ba6cd45a22d5bac01718e5020710ba
-
SHA1
6dc13bd036e6a0aa65fb46dd8d7a4f4e9feaccdb
-
SHA256
c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d
-
SHA512
fb894f3c466bfaeae6a72bed04e66a18a3bce566606724049df948b84a28e0939d74ad7c82830b0de9dfed19db9c0c8d8396068097104d6700074934468efabd
-
SSDEEP
12288:+y90inssr5tnKC6ePJFPEfypzzB0r+eaUGD2eQQYc:+yD5rjb3Efcz8RTGD2eQTc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it125207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it125207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it125207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it125207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it125207.exe -
Executes dropped EXE 4 IoCs
pid Process 384 ziJU5526.exe 3988 it125207.exe 4596 kp201483.exe 720 lr509761.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it125207.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJU5526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJU5526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3988 it125207.exe 3988 it125207.exe 4596 kp201483.exe 4596 kp201483.exe 720 lr509761.exe 720 lr509761.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3988 it125207.exe Token: SeDebugPrivilege 4596 kp201483.exe Token: SeDebugPrivilege 720 lr509761.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4108 wrote to memory of 384 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 66 PID 4108 wrote to memory of 384 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 66 PID 4108 wrote to memory of 384 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 66 PID 384 wrote to memory of 3988 384 ziJU5526.exe 67 PID 384 wrote to memory of 3988 384 ziJU5526.exe 67 PID 384 wrote to memory of 4596 384 ziJU5526.exe 68 PID 384 wrote to memory of 4596 384 ziJU5526.exe 68 PID 384 wrote to memory of 4596 384 ziJU5526.exe 68 PID 4108 wrote to memory of 720 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 70 PID 4108 wrote to memory of 720 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 70 PID 4108 wrote to memory of 720 4108 c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe"C:\Users\Admin\AppData\Local\Temp\c3e74c82bae82001a93222047c357ca3b97192270878fafefc36be960d4d498d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJU5526.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it125207.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp201483.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr509761.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
409KB
MD585f39c860fbec32b1806612e456e7d9e
SHA14df3c6c1c4d834d4aab8970236b1ac6d8b59007e
SHA2565e84d1038a8d0164223da3736e32886050853a41ed24be955d88c32ff4080dd0
SHA512ea7b908bf55bceb15f5605893ed3cb9e9ca291d2f957acefa7ea199f962c7dcb9718b0c4a643200a3f99c7a714f894cd4c16b25a5e99516d16705da710745e61
-
Filesize
409KB
MD585f39c860fbec32b1806612e456e7d9e
SHA14df3c6c1c4d834d4aab8970236b1ac6d8b59007e
SHA2565e84d1038a8d0164223da3736e32886050853a41ed24be955d88c32ff4080dd0
SHA512ea7b908bf55bceb15f5605893ed3cb9e9ca291d2f957acefa7ea199f962c7dcb9718b0c4a643200a3f99c7a714f894cd4c16b25a5e99516d16705da710745e61
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD56a2c60b60f9211d2182551f90d86b507
SHA1aaf678cac24b70049ac9f55cd046dcfc00fc7d5e
SHA256edeb5136c400a149b32afeeaed26eff22e14a3ae71d960df98f785925d624f5f
SHA51211d4e285a4c5c77fb266ef6b8fcb6188993861195d50b93cda1f3bfa9d785061268444ad48d920566f71248da2cd783bdb05da1350893432e5ec0fc8b0af9621
-
Filesize
360KB
MD56a2c60b60f9211d2182551f90d86b507
SHA1aaf678cac24b70049ac9f55cd046dcfc00fc7d5e
SHA256edeb5136c400a149b32afeeaed26eff22e14a3ae71d960df98f785925d624f5f
SHA51211d4e285a4c5c77fb266ef6b8fcb6188993861195d50b93cda1f3bfa9d785061268444ad48d920566f71248da2cd783bdb05da1350893432e5ec0fc8b0af9621