Analysis
-
max time kernel
61s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 23:06
Static task
static1
General
-
Target
616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe
-
Size
746KB
-
MD5
2a54fa09f25190bf14c9e6dcc015273e
-
SHA1
0ed74e2289cff8afa604937872b38b5f3ef1b14c
-
SHA256
616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e
-
SHA512
54bc94e015d39530fc637b585a0f2c2c1123e752a9fc3106cf69f6bab15d958ee6faadaa399ec3a8c808ec153e77ea4ff2b533c5f8cbcc31c1dbff114a2402cc
-
SSDEEP
12288:ey90JydEBfhEMkt5RSRYmsqIZz1nrSKeFyOHwUbn4waRi9G0gK8v:eyqxhKt5sIlZzV/nuHbnZCi9av
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11591981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11591981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11591981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11591981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11591981.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 11591981.exe -
Executes dropped EXE 4 IoCs
pid Process 1612 un431371.exe 4464 11591981.exe 4668 rk883857.exe 2948 si536001.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 11591981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11591981.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un431371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un431371.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4464 11591981.exe 4464 11591981.exe 4668 rk883857.exe 4668 rk883857.exe 2948 si536001.exe 2948 si536001.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4464 11591981.exe Token: SeDebugPrivilege 4668 rk883857.exe Token: SeDebugPrivilege 2948 si536001.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1612 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 84 PID 4632 wrote to memory of 1612 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 84 PID 4632 wrote to memory of 1612 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 84 PID 1612 wrote to memory of 4464 1612 un431371.exe 85 PID 1612 wrote to memory of 4464 1612 un431371.exe 85 PID 1612 wrote to memory of 4464 1612 un431371.exe 85 PID 1612 wrote to memory of 4668 1612 un431371.exe 86 PID 1612 wrote to memory of 4668 1612 un431371.exe 86 PID 1612 wrote to memory of 4668 1612 un431371.exe 86 PID 4632 wrote to memory of 2948 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 87 PID 4632 wrote to memory of 2948 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 87 PID 4632 wrote to memory of 2948 4632 616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe"C:\Users\Admin\AppData\Local\Temp\616cac36f70ec3dedd8efbcc2ecb7b1969db02f542fd4478e6b3c1005f2d4f0e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un431371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un431371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11591981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11591981.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk883857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk883857.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si536001.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
592KB
MD55d98f81dfc6e51bc8958748970342985
SHA10b00270a14ab652020b5d3548bc625d14e92d9f6
SHA256b71a8706cfa581aa99fc8ea9a78c0650a7090694a1d93dd7d1da0bc05a94a645
SHA5125a16b750360c818521a0f89ca521e24d63976dd04c27d604bdc2c32f6931c1bdddf055b80d3df9b776b611aafc454b5ff0c5079b98fb23bf7af91041eda3ecac
-
Filesize
592KB
MD55d98f81dfc6e51bc8958748970342985
SHA10b00270a14ab652020b5d3548bc625d14e92d9f6
SHA256b71a8706cfa581aa99fc8ea9a78c0650a7090694a1d93dd7d1da0bc05a94a645
SHA5125a16b750360c818521a0f89ca521e24d63976dd04c27d604bdc2c32f6931c1bdddf055b80d3df9b776b611aafc454b5ff0c5079b98fb23bf7af91041eda3ecac
-
Filesize
377KB
MD5100b0df6419ae21842a063e5a87b3df6
SHA1fa865cbbe1cbb8746153fe027a3c862d850398ba
SHA2562208fa0c7550ecb4aac00120e403c1d4b6722829051985495b3b99b1484951ab
SHA5125a7feb9cd7c5bf7096581edba9bea0b224e7abcb314bf868e14a316aa31a2a4d0c87963fa3f1bcd9b2a91b7878b8a2e9396157d130f4d985f0c7241cd0897a35
-
Filesize
377KB
MD5100b0df6419ae21842a063e5a87b3df6
SHA1fa865cbbe1cbb8746153fe027a3c862d850398ba
SHA2562208fa0c7550ecb4aac00120e403c1d4b6722829051985495b3b99b1484951ab
SHA5125a7feb9cd7c5bf7096581edba9bea0b224e7abcb314bf868e14a316aa31a2a4d0c87963fa3f1bcd9b2a91b7878b8a2e9396157d130f4d985f0c7241cd0897a35
-
Filesize
459KB
MD50b1cf03d318a2c300e4524a86018c75f
SHA10be54482a636babb74af98d52306906d363299f5
SHA256938ded8651601ff5b16c886c952a421acde5661a453e69e4508e64403294f749
SHA5127146177982518f4b450bed1dbbe86a536479b9e2bbe28e9ce6fd44382d4f715c1308e31b553ec550fdd9295ce2fc29db6868521ea4153e41240eb90829ed17ec
-
Filesize
459KB
MD50b1cf03d318a2c300e4524a86018c75f
SHA10be54482a636babb74af98d52306906d363299f5
SHA256938ded8651601ff5b16c886c952a421acde5661a453e69e4508e64403294f749
SHA5127146177982518f4b450bed1dbbe86a536479b9e2bbe28e9ce6fd44382d4f715c1308e31b553ec550fdd9295ce2fc29db6868521ea4153e41240eb90829ed17ec