Analysis
-
max time kernel
67s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 04:34
Static task
static1
General
-
Target
bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe
-
Size
563KB
-
MD5
7ad8d7866fbdf71da2b48506159e208d
-
SHA1
5a383c207fc763ed9902bde62d21311e415a8c55
-
SHA256
bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986
-
SHA512
9c99c2342eb1d8daf0ed10996987fa644865e4f7ef0cb493d41374c2a71f29bb3aec8f9152ec65419cf41ebb983ec7f6a07edcc47a81e4074babd85cb4db3657
-
SSDEEP
12288:9y90vhS5Ga267DvWqneW2BPjAgionrIk7UpJCRtc9GZ1w7EA:9yCaDWvZBP8g9n0bCRqQ8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 40374727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 40374727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 40374727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 40374727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 40374727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 40374727.exe -
Executes dropped EXE 4 IoCs
pid Process 2740 st547221.exe 5064 40374727.exe 2692 kp591215.exe 4092 lr386017.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 40374727.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st547221.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st547221.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3824 2692 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5064 40374727.exe 5064 40374727.exe 2692 kp591215.exe 2692 kp591215.exe 4092 lr386017.exe 4092 lr386017.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5064 40374727.exe Token: SeDebugPrivilege 2692 kp591215.exe Token: SeDebugPrivilege 4092 lr386017.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2740 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 84 PID 4636 wrote to memory of 2740 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 84 PID 4636 wrote to memory of 2740 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 84 PID 2740 wrote to memory of 5064 2740 st547221.exe 85 PID 2740 wrote to memory of 5064 2740 st547221.exe 85 PID 2740 wrote to memory of 2692 2740 st547221.exe 90 PID 2740 wrote to memory of 2692 2740 st547221.exe 90 PID 2740 wrote to memory of 2692 2740 st547221.exe 90 PID 4636 wrote to memory of 4092 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 96 PID 4636 wrote to memory of 4092 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 96 PID 4636 wrote to memory of 4092 4636 bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe"C:\Users\Admin\AppData\Local\Temp\bcb2620eb3c739999cbbcb9402ad91b82072359402c48e71f21bde6cb9171986.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st547221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st547221.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\40374727.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\40374727.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp591215.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp591215.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 13244⤵
- Program crash
PID:3824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386017.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2692 -ip 26921⤵PID:3020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
408KB
MD5ef594cf07274dc560bc66371c119c24d
SHA1e25228738a9b6998bc70c2567bc32e6e3c4d07e9
SHA25697e820651193bc542de57673f6806e2bb9ab741516242f1946690312ab4af576
SHA512cc3e08bfc32b43f132ec39dab8c59d627930bdcd695c445f645fef1e5dcdfcabfcec40093ca3ad227ea48e5ef8589f9f447b2ee257c5fed522581825aeda8d62
-
Filesize
408KB
MD5ef594cf07274dc560bc66371c119c24d
SHA1e25228738a9b6998bc70c2567bc32e6e3c4d07e9
SHA25697e820651193bc542de57673f6806e2bb9ab741516242f1946690312ab4af576
SHA512cc3e08bfc32b43f132ec39dab8c59d627930bdcd695c445f645fef1e5dcdfcabfcec40093ca3ad227ea48e5ef8589f9f447b2ee257c5fed522581825aeda8d62
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5c3996afbb0ee1481cfec07e27fb4b0ad
SHA1598af5a471a00b9f1b11657712ca100c2f46b5b3
SHA256faf62a7e3289d3f0e23161a0c372829c991b537e16e550b248dfb53d5e009384
SHA512250ba31f5354c22c16fd457a5bb11d9d2e527ebfb2cb93a79d47ac46a5380365860e8e24b2632ecd63054a3ac74073e83a7386cd972c34bde4ea75e41001610e
-
Filesize
360KB
MD5c3996afbb0ee1481cfec07e27fb4b0ad
SHA1598af5a471a00b9f1b11657712ca100c2f46b5b3
SHA256faf62a7e3289d3f0e23161a0c372829c991b537e16e550b248dfb53d5e009384
SHA512250ba31f5354c22c16fd457a5bb11d9d2e527ebfb2cb93a79d47ac46a5380365860e8e24b2632ecd63054a3ac74073e83a7386cd972c34bde4ea75e41001610e