Analysis
-
max time kernel
86s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 07:47
Static task
static1
General
-
Target
863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe
-
Size
618KB
-
MD5
149452a7e79abcbb5c78cb4ae19406ef
-
SHA1
e8c69450cb05333986df130c3f188a034501a637
-
SHA256
863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8
-
SHA512
6338b4d67fc0d2074cf07722141b6a6e60bc73fd255f24fc03c433f206bae42dfabc1da36984fbb0401d7801a258b33510c8f220d8020090db0f3fae8b8a9366
-
SSDEEP
12288:9y90qDoYznLQWv5D3FY/kEroeRCc2NPYRJpsqY0HMD:9yxcYj7tSkEk5sJ6EY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 87538438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 87538438.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 87538438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 87538438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 87538438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 87538438.exe -
Executes dropped EXE 4 IoCs
pid Process 3516 st481029.exe 4152 87538438.exe 4740 kp792112.exe 1920 lr323778.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 87538438.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st481029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st481029.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3952 4740 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4152 87538438.exe 4152 87538438.exe 4740 kp792112.exe 4740 kp792112.exe 1920 lr323778.exe 1920 lr323778.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4152 87538438.exe Token: SeDebugPrivilege 4740 kp792112.exe Token: SeDebugPrivilege 1920 lr323778.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3516 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 84 PID 1696 wrote to memory of 3516 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 84 PID 1696 wrote to memory of 3516 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 84 PID 3516 wrote to memory of 4152 3516 st481029.exe 85 PID 3516 wrote to memory of 4152 3516 st481029.exe 85 PID 3516 wrote to memory of 4740 3516 st481029.exe 90 PID 3516 wrote to memory of 4740 3516 st481029.exe 90 PID 3516 wrote to memory of 4740 3516 st481029.exe 90 PID 1696 wrote to memory of 1920 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 96 PID 1696 wrote to memory of 1920 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 96 PID 1696 wrote to memory of 1920 1696 863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe"C:\Users\Admin\AppData\Local\Temp\863fbf55dd822ea0ac6e4542b20a35e06656bcb56c646d4ce0e4576f374162a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st481029.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87538438.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp792112.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 18924⤵
- Program crash
PID:3952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr323778.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4740 -ip 47401⤵PID:3748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
464KB
MD57d26f78f8bff6a42e2514a51f7718b9f
SHA1b7aae96faf82904451cfb569040c37760b052743
SHA256289f3eb70ec48e98ca7f134d19db129ef2d3bfc273315323ba214d350eb6291c
SHA5128f6b3bb54912e8fca3a91a840512ee7515fbbd2965a400134e2c28c353e8a017ec62b842e101500b79f75ff470e3706b40f587a293df82b0dccd9497439a5a8c
-
Filesize
464KB
MD57d26f78f8bff6a42e2514a51f7718b9f
SHA1b7aae96faf82904451cfb569040c37760b052743
SHA256289f3eb70ec48e98ca7f134d19db129ef2d3bfc273315323ba214d350eb6291c
SHA5128f6b3bb54912e8fca3a91a840512ee7515fbbd2965a400134e2c28c353e8a017ec62b842e101500b79f75ff470e3706b40f587a293df82b0dccd9497439a5a8c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD5550f75285675558dc07ea63335a6ba16
SHA118d9bdf3a9519cbf061c82a9817852ab8e8088d8
SHA256a022aee5c1454e0e830529bad754aeb2ec99b8f9a9e9d713e831afc4a5e28895
SHA5122da53a17e5086e08853f1dfff358d05a6a7bb79f818d43c4c7d38916ac2567f203c2a0e299138be3f3312cdf6a86b0bdb93fd9a53bf9bce7466f8e68643f2e2c
-
Filesize
478KB
MD5550f75285675558dc07ea63335a6ba16
SHA118d9bdf3a9519cbf061c82a9817852ab8e8088d8
SHA256a022aee5c1454e0e830529bad754aeb2ec99b8f9a9e9d713e831afc4a5e28895
SHA5122da53a17e5086e08853f1dfff358d05a6a7bb79f818d43c4c7d38916ac2567f203c2a0e299138be3f3312cdf6a86b0bdb93fd9a53bf9bce7466f8e68643f2e2c