Analysis
-
max time kernel
131s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 21:26
Static task
static1
General
-
Target
52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe
-
Size
748KB
-
MD5
fb5caff7470e5da72c3c5d270a4e5b98
-
SHA1
78b534f4f2ec6915985b7af9914273f7ca2a4fa4
-
SHA256
52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d
-
SHA512
6372988d5b048291bcfac2434de94b65d5d44f36bff9298b266124a70b9e7457bad5504e7638b2e14d152b7a8ae1e2f5c679214e5f71d3a3f70e33672c85aeb6
-
SSDEEP
12288:Uy90S2L2TppQAI28QvS8VGo6HhfrxN8TEFCqI/9dub14wACNO0oITEG:UyFp6A584FGo6HhrMQIJ/9Ib1Z3oIYG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 41960504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 41960504.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 41960504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 41960504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 41960504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 41960504.exe -
Executes dropped EXE 4 IoCs
pid Process 556 un061325.exe 4852 41960504.exe 1552 rk639023.exe 2820 si024486.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 41960504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 41960504.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un061325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un061325.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2740 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 41960504.exe 4852 41960504.exe 1552 rk639023.exe 1552 rk639023.exe 2820 si024486.exe 2820 si024486.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4852 41960504.exe Token: SeDebugPrivilege 1552 rk639023.exe Token: SeDebugPrivilege 2820 si024486.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4432 wrote to memory of 556 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 84 PID 4432 wrote to memory of 556 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 84 PID 4432 wrote to memory of 556 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 84 PID 556 wrote to memory of 4852 556 un061325.exe 85 PID 556 wrote to memory of 4852 556 un061325.exe 85 PID 556 wrote to memory of 4852 556 un061325.exe 85 PID 556 wrote to memory of 1552 556 un061325.exe 89 PID 556 wrote to memory of 1552 556 un061325.exe 89 PID 556 wrote to memory of 1552 556 un061325.exe 89 PID 4432 wrote to memory of 2820 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 90 PID 4432 wrote to memory of 2820 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 90 PID 4432 wrote to memory of 2820 4432 52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe"C:\Users\Admin\AppData\Local\Temp\52ec194043a7fe89941369ffc127acdb67cb09deffba7fff5442ce337458010d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un061325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un061325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41960504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41960504.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk639023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk639023.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024486.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024486.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
593KB
MD561afb37663ae413953545da6e4c3696c
SHA180ec9ec606566557dd212cd9153b5476f8266c1d
SHA256ecd333305711541b93a4989f26e863a58ae2af4ff6376a7d8f2a3d6a009408eb
SHA512f6abdf73932a313f144adea2faa3d870087b3b8df01b41526215d969dcb4bb4d78df658be5798e442f8a02f723b7b5c4dedb1f549dfe612b4acf09df5688078a
-
Filesize
593KB
MD561afb37663ae413953545da6e4c3696c
SHA180ec9ec606566557dd212cd9153b5476f8266c1d
SHA256ecd333305711541b93a4989f26e863a58ae2af4ff6376a7d8f2a3d6a009408eb
SHA512f6abdf73932a313f144adea2faa3d870087b3b8df01b41526215d969dcb4bb4d78df658be5798e442f8a02f723b7b5c4dedb1f549dfe612b4acf09df5688078a
-
Filesize
377KB
MD5cccadfa71ba33fa9ec08292834a54560
SHA176472e930fd8eb41cd20becbf090d069b1b4fdbd
SHA25617349080ec1954612c25fa643e1515e6e997ec49d66d092d56f76a543c914971
SHA512b7a109f912d9487d2658cff65ab688acba88ff4eb761a545d5dd37cdbb32ae7686545f7d2f1ae1b10d631d81f563b5d59b7a81f58d059360efbd48c5e8d5ab08
-
Filesize
377KB
MD5cccadfa71ba33fa9ec08292834a54560
SHA176472e930fd8eb41cd20becbf090d069b1b4fdbd
SHA25617349080ec1954612c25fa643e1515e6e997ec49d66d092d56f76a543c914971
SHA512b7a109f912d9487d2658cff65ab688acba88ff4eb761a545d5dd37cdbb32ae7686545f7d2f1ae1b10d631d81f563b5d59b7a81f58d059360efbd48c5e8d5ab08
-
Filesize
459KB
MD59f718252c026db89a3ffeee209ee9bd7
SHA1ce0d75c51a9551fb15959cfec7ad73839f9b24af
SHA2562accc2cc54d658b6a4525c4e0313041ad68bc2e90adafdbbaad4a41af657d0b9
SHA51260c338015c21742c226a55e37fb7ba19754ecdbf790d9066157c62c5442c21efdb54e3715f845b0f841184aafbd77f782a787714ea33fd00205627e9f5762f91
-
Filesize
459KB
MD59f718252c026db89a3ffeee209ee9bd7
SHA1ce0d75c51a9551fb15959cfec7ad73839f9b24af
SHA2562accc2cc54d658b6a4525c4e0313041ad68bc2e90adafdbbaad4a41af657d0b9
SHA51260c338015c21742c226a55e37fb7ba19754ecdbf790d9066157c62c5442c21efdb54e3715f845b0f841184aafbd77f782a787714ea33fd00205627e9f5762f91