Analysis
-
max time kernel
64s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 19:39
Static task
static1
General
-
Target
4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe
-
Size
562KB
-
MD5
f87076f7257b4d3ef9bafdd631bf0b1a
-
SHA1
119438862784719113f32f588ee525701ef99e1b
-
SHA256
4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536
-
SHA512
12e32a254a59cdb564e1537f7e6042e94a207f3cb742db8586469edf57b8e214adbb2053eeee72de4999bb7e89b3a5aecb19a7c265a95ffa260379104ea89f51
-
SSDEEP
12288:/y90n+5pxUFsJUV424/aEf9p1iE0rMeav9OXA8L:/y0+5py0US24/aEfv1EH69OXR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it970723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it970723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it970723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it970723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it970723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it970723.exe -
Executes dropped EXE 4 IoCs
pid Process 1300 ziyd3395.exe 1472 it970723.exe 3412 kp577260.exe 1524 lr335549.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it970723.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyd3395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyd3395.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3736 3412 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1472 it970723.exe 1472 it970723.exe 3412 kp577260.exe 3412 kp577260.exe 1524 lr335549.exe 1524 lr335549.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1472 it970723.exe Token: SeDebugPrivilege 3412 kp577260.exe Token: SeDebugPrivilege 1524 lr335549.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1300 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 77 PID 1796 wrote to memory of 1300 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 77 PID 1796 wrote to memory of 1300 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 77 PID 1300 wrote to memory of 1472 1300 ziyd3395.exe 78 PID 1300 wrote to memory of 1472 1300 ziyd3395.exe 78 PID 1300 wrote to memory of 3412 1300 ziyd3395.exe 80 PID 1300 wrote to memory of 3412 1300 ziyd3395.exe 80 PID 1300 wrote to memory of 3412 1300 ziyd3395.exe 80 PID 1796 wrote to memory of 1524 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 85 PID 1796 wrote to memory of 1524 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 85 PID 1796 wrote to memory of 1524 1796 4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe"C:\Users\Admin\AppData\Local\Temp\4d28960c2c149baf9d36f5969520c5d3f7d0cebed8ca64b6ebf09ef3134ba536.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyd3395.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyd3395.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it970723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it970723.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp577260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp577260.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 10284⤵
- Program crash
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr335549.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr335549.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3412 -ip 34121⤵PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
409KB
MD54cbd805a4ee03e927e7c12770bfae29e
SHA1e277c885a14e71f7bd53b54a90ab6af7f37b7d85
SHA256cefb79dbe427f583c3d0029ba39ff37101076244a3551f6a8fc4fde32d00ee7d
SHA5123057c29b3bdb5591769605faee25cc178bec66ca0db85682380629332e1f0caec5c7bfbd33b2a2550192401d3f591993760694bfa03a39571f9f1e4af2e30b51
-
Filesize
409KB
MD54cbd805a4ee03e927e7c12770bfae29e
SHA1e277c885a14e71f7bd53b54a90ab6af7f37b7d85
SHA256cefb79dbe427f583c3d0029ba39ff37101076244a3551f6a8fc4fde32d00ee7d
SHA5123057c29b3bdb5591769605faee25cc178bec66ca0db85682380629332e1f0caec5c7bfbd33b2a2550192401d3f591993760694bfa03a39571f9f1e4af2e30b51
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5a9b6c5e92d342649bdbb7aac39635962
SHA172c1ce54d234d4163a7c6bd965a72f001c6d3ef9
SHA256818f834dabe00aa458392e43449d3de1ee54ef3b15418f284badcfb1a6ee65a7
SHA512b90ce20ace56fe05a43e76419386fe862e089c36311ab300dacb12cdefdcfc7efb1d12f798972646bd290cb4bdbffa00cf82c52f7fbe8fda6e06d8fe6388f064
-
Filesize
360KB
MD5a9b6c5e92d342649bdbb7aac39635962
SHA172c1ce54d234d4163a7c6bd965a72f001c6d3ef9
SHA256818f834dabe00aa458392e43449d3de1ee54ef3b15418f284badcfb1a6ee65a7
SHA512b90ce20ace56fe05a43e76419386fe862e089c36311ab300dacb12cdefdcfc7efb1d12f798972646bd290cb4bdbffa00cf82c52f7fbe8fda6e06d8fe6388f064