Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 23:35
Static task
static1
General
-
Target
9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe
-
Size
746KB
-
MD5
08008a73e5e2d40e0806517c0824bd23
-
SHA1
3a96825bf3c30f84e93d87361aa2fff72edd5ab4
-
SHA256
9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90
-
SHA512
5f4b8b2a2231e2459cff33cb1d0f094c10c37d0dafeda3ada57b8290df0fc8fcd55e9c4dfd16866dd68f5227c9976eebe9ced2a9d1680c41ae654f07853ce37f
-
SSDEEP
12288:fy90h8YZyAs57z5BlXGjoaMxpV58a/uP96fOBSbLVl/MCEnfRD6qli4bNPeKSrXK:fyYNnsh9z0UxKTPaOBSfVRufVZfNP2xo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 00349258.exe -
Executes dropped EXE 4 IoCs
pid Process 2136 un217140.exe 4620 00349258.exe 3968 rk093468.exe 4760 si205111.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 00349258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 00349258.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un217140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un217140.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 636 4620 WerFault.exe 86 4888 3968 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4620 00349258.exe 4620 00349258.exe 3968 rk093468.exe 3968 rk093468.exe 4760 si205111.exe 4760 si205111.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4620 00349258.exe Token: SeDebugPrivilege 3968 rk093468.exe Token: SeDebugPrivilege 4760 si205111.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2136 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 85 PID 4192 wrote to memory of 2136 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 85 PID 4192 wrote to memory of 2136 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 85 PID 2136 wrote to memory of 4620 2136 un217140.exe 86 PID 2136 wrote to memory of 4620 2136 un217140.exe 86 PID 2136 wrote to memory of 4620 2136 un217140.exe 86 PID 2136 wrote to memory of 3968 2136 un217140.exe 92 PID 2136 wrote to memory of 3968 2136 un217140.exe 92 PID 2136 wrote to memory of 3968 2136 un217140.exe 92 PID 4192 wrote to memory of 4760 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 95 PID 4192 wrote to memory of 4760 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 95 PID 4192 wrote to memory of 4760 4192 9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe"C:\Users\Admin\AppData\Local\Temp\9df0f1e17abe253894a6476ec513225f6f87d0b2ba1308720d398b8087e3bf90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un217140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un217140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00349258.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00349258.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 10804⤵
- Program crash
PID:636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk093468.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk093468.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 13284⤵
- Program crash
PID:4888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205111.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4620 -ip 46201⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3968 -ip 39681⤵PID:2388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
592KB
MD5e53796b8f59339e92e19fd7c76137c73
SHA1e3fd1b0f4f44b341164bed00a7d6a8af0f7acfde
SHA2569357d6e3bffe8984eea0f9e4b2ef989e0252bde0f8738f62c9e967e592acfee4
SHA512728beb0257589a63c7ea669ea1b2185c3b7c4e6d663d7eb3680159e0a72004a144ab50d60fd827a132ed2fb2ef216baffdf8ef2ddbbc29a6b3f0e0ae025051d4
-
Filesize
592KB
MD5e53796b8f59339e92e19fd7c76137c73
SHA1e3fd1b0f4f44b341164bed00a7d6a8af0f7acfde
SHA2569357d6e3bffe8984eea0f9e4b2ef989e0252bde0f8738f62c9e967e592acfee4
SHA512728beb0257589a63c7ea669ea1b2185c3b7c4e6d663d7eb3680159e0a72004a144ab50d60fd827a132ed2fb2ef216baffdf8ef2ddbbc29a6b3f0e0ae025051d4
-
Filesize
377KB
MD516f37be95c5efc3f3399f489f4e6cd32
SHA101a666145116d33f97400a1180b3d9e3afd9bf4b
SHA256da6bff0262e40d33a77d7f0a703394058149148983ede24a0cef59a777d36c0f
SHA51264a6c5d639d2f05828ebe017dabd76984c00fd74ca6a1d06e419a62347822dba1d7c49a75199a95387baa86444df34c6fc8fe8b2ec228718dbb7545c7d86d456
-
Filesize
377KB
MD516f37be95c5efc3f3399f489f4e6cd32
SHA101a666145116d33f97400a1180b3d9e3afd9bf4b
SHA256da6bff0262e40d33a77d7f0a703394058149148983ede24a0cef59a777d36c0f
SHA51264a6c5d639d2f05828ebe017dabd76984c00fd74ca6a1d06e419a62347822dba1d7c49a75199a95387baa86444df34c6fc8fe8b2ec228718dbb7545c7d86d456
-
Filesize
459KB
MD50ea4861e9cb228b3dfae1dc0c2d5b36c
SHA1258b6e767f9434dd11d624d25f8698de934e329e
SHA25624937c09017382c69e5e8c3280ba92a7fbe605a27bb70f6bf1afc9c5e2e4a53b
SHA51218aaa5d54c2de751e48b9d510c40969f038f30f6aa2b8f50fde4c74cfe72859930a968444ce0a8650b6abec99289f31f81db9e2e388489921335efcb634484ef
-
Filesize
459KB
MD50ea4861e9cb228b3dfae1dc0c2d5b36c
SHA1258b6e767f9434dd11d624d25f8698de934e329e
SHA25624937c09017382c69e5e8c3280ba92a7fbe605a27bb70f6bf1afc9c5e2e4a53b
SHA51218aaa5d54c2de751e48b9d510c40969f038f30f6aa2b8f50fde4c74cfe72859930a968444ce0a8650b6abec99289f31f81db9e2e388489921335efcb634484ef