Analysis
-
max time kernel
109s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe
Resource
win7-20230220-en
General
-
Target
924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe
-
Size
706KB
-
MD5
6f9e62d0b6c4578041bb7e5f260a3af2
-
SHA1
99a757be872960e28dda4cb2fe97a4b606065158
-
SHA256
924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414
-
SHA512
dff51890031e5dbc8f1f9432ea3e737654269b53f5718319326c9889ac2fbe32b172e55453986c223f7efdeef009649f5a4ce26f920ca20c28e4b18ea01bf543
-
SSDEEP
12288:cy90EHGH019kpTfCWI9r/tgg12QwRvXZtRhvTNc+CPPmr9:cyTTAdaW8rXWFhyPk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr499118.exe -
Executes dropped EXE 4 IoCs
pid Process 2096 un954377.exe 1736 pr499118.exe 1692 qu942823.exe 3632 si849790.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr499118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr499118.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un954377.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un954377.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1300 1736 WerFault.exe 85 3016 1692 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1736 pr499118.exe 1736 pr499118.exe 1692 qu942823.exe 1692 qu942823.exe 3632 si849790.exe 3632 si849790.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1736 pr499118.exe Token: SeDebugPrivilege 1692 qu942823.exe Token: SeDebugPrivilege 3632 si849790.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2096 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 84 PID 1684 wrote to memory of 2096 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 84 PID 1684 wrote to memory of 2096 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 84 PID 2096 wrote to memory of 1736 2096 un954377.exe 85 PID 2096 wrote to memory of 1736 2096 un954377.exe 85 PID 2096 wrote to memory of 1736 2096 un954377.exe 85 PID 2096 wrote to memory of 1692 2096 un954377.exe 91 PID 2096 wrote to memory of 1692 2096 un954377.exe 91 PID 2096 wrote to memory of 1692 2096 un954377.exe 91 PID 1684 wrote to memory of 3632 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 94 PID 1684 wrote to memory of 3632 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 94 PID 1684 wrote to memory of 3632 1684 924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe"C:\Users\Admin\AppData\Local\Temp\924bb64c850bee5e85982d3acda1e43ea0f5757d1147b0b4a4424f771a312414.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954377.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr499118.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 10924⤵
- Program crash
PID:1300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu942823.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 13284⤵
- Program crash
PID:3016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849790.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1736 -ip 17361⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1692 -ip 16921⤵PID:2000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
552KB
MD519f9632982792a5a11ddeb88f14a9226
SHA14811d69fe59a8c0151e832ac2fe9aeb61a7c6ed8
SHA256ed5feb17fdb848d3efca4ae34acf797e4b4b358f19ab9302cf4630443dd4d46f
SHA512455925e5b2e994720379494bed231992b17c76ae0163483a595c85594e469135a5f883cfbe6d90be09517c687183c2be7f88b922b3f25037db47c1f469e2e704
-
Filesize
552KB
MD519f9632982792a5a11ddeb88f14a9226
SHA14811d69fe59a8c0151e832ac2fe9aeb61a7c6ed8
SHA256ed5feb17fdb848d3efca4ae34acf797e4b4b358f19ab9302cf4630443dd4d46f
SHA512455925e5b2e994720379494bed231992b17c76ae0163483a595c85594e469135a5f883cfbe6d90be09517c687183c2be7f88b922b3f25037db47c1f469e2e704
-
Filesize
260KB
MD5f1963e78fe2ed50b885de8f90c72c49e
SHA1e919a309e874b3eb4d08588a062e1a9c4ce479fe
SHA256ba1de04b6e806a488b2da64d3dce7d8ad43e1d7fed1274208e00e052688a2371
SHA512e06e5cf6373097c349b38ed8d6ecb0930c14c71bd703c0b2a147d75dc3e12fa669a3d1077bbcdc2b8a30dac7f2eae7d6ce96d50471838c48214fc2d34e7a8d8c
-
Filesize
260KB
MD5f1963e78fe2ed50b885de8f90c72c49e
SHA1e919a309e874b3eb4d08588a062e1a9c4ce479fe
SHA256ba1de04b6e806a488b2da64d3dce7d8ad43e1d7fed1274208e00e052688a2371
SHA512e06e5cf6373097c349b38ed8d6ecb0930c14c71bd703c0b2a147d75dc3e12fa669a3d1077bbcdc2b8a30dac7f2eae7d6ce96d50471838c48214fc2d34e7a8d8c
-
Filesize
343KB
MD51b5e3c5baaa3bd05e9377cef8c239331
SHA1a838a559c7c002fc6abf5bb4fd9f2f8640941f47
SHA256f2a7ddacab5133c79faa0747418a56511e2c6eed4a1c213ba5d4740c596de786
SHA512909bdafcb9792bc0450a4f3063cdc8942d8039cc2f9b398b7a9ccfc08171f75fde22ba31376bc58fa68973186fc737c0ef7746c373e174c36a6726f9bc343016
-
Filesize
343KB
MD51b5e3c5baaa3bd05e9377cef8c239331
SHA1a838a559c7c002fc6abf5bb4fd9f2f8640941f47
SHA256f2a7ddacab5133c79faa0747418a56511e2c6eed4a1c213ba5d4740c596de786
SHA512909bdafcb9792bc0450a4f3063cdc8942d8039cc2f9b398b7a9ccfc08171f75fde22ba31376bc58fa68973186fc737c0ef7746c373e174c36a6726f9bc343016