Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 08:52
Static task
static1
General
-
Target
835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe
-
Size
618KB
-
MD5
5aaab778597713f92d16a8e54d4bebfc
-
SHA1
dd5a7e6f53f0412c000eebd418227d2531d7afcb
-
SHA256
835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d
-
SHA512
5d2b77203a3b3bf8da07774f758b25fa64dc29c3c1087a386e36b0898f37add959a2074d743224e64a99e103dd63e2ea0cd2b012087dad12fb492b64b2fad029
-
SSDEEP
12288:Vy90VLNZYvXF6myBhchkeRXchNPLcHcn/XyKp3:VyON+vV6mynd5QH41
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 97702388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97702388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 97702388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97702388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97702388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97702388.exe -
Executes dropped EXE 4 IoCs
pid Process 1608 st598509.exe 1644 97702388.exe 228 kp690302.exe 1504 lr150932.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 97702388.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st598509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st598509.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1720 228 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 97702388.exe 1644 97702388.exe 228 kp690302.exe 228 kp690302.exe 1504 lr150932.exe 1504 lr150932.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1644 97702388.exe Token: SeDebugPrivilege 228 kp690302.exe Token: SeDebugPrivilege 1504 lr150932.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1608 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 83 PID 1640 wrote to memory of 1608 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 83 PID 1640 wrote to memory of 1608 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 83 PID 1608 wrote to memory of 1644 1608 st598509.exe 84 PID 1608 wrote to memory of 1644 1608 st598509.exe 84 PID 1608 wrote to memory of 228 1608 st598509.exe 88 PID 1608 wrote to memory of 228 1608 st598509.exe 88 PID 1608 wrote to memory of 228 1608 st598509.exe 88 PID 1640 wrote to memory of 1504 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 91 PID 1640 wrote to memory of 1504 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 91 PID 1640 wrote to memory of 1504 1640 835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe"C:\Users\Admin\AppData\Local\Temp\835018410035751fcf2bc8564054e5d62664f84ab15ff2431f77fcd19a53692d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st598509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st598509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97702388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97702388.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp690302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp690302.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13204⤵
- Program crash
PID:1720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr150932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr150932.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 228 -ip 2281⤵PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
464KB
MD58613d78aa4c1e0057977cb316ab79425
SHA1317946042d554064e2ced2a532a2f0361d2b10e4
SHA2563989143911cd93a71cf2cb9d0484faf5ca9aa4334345c97f7896f5e18532d90f
SHA512729d1e450cb2646c3372c08b3477e7cc9b9ad210c72e72595994f8b8cd0495a30585033ab1893b8f52053f23a6a2cf7256c84b3b8281c0b23227f87496ae19b1
-
Filesize
464KB
MD58613d78aa4c1e0057977cb316ab79425
SHA1317946042d554064e2ced2a532a2f0361d2b10e4
SHA2563989143911cd93a71cf2cb9d0484faf5ca9aa4334345c97f7896f5e18532d90f
SHA512729d1e450cb2646c3372c08b3477e7cc9b9ad210c72e72595994f8b8cd0495a30585033ab1893b8f52053f23a6a2cf7256c84b3b8281c0b23227f87496ae19b1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD514b2b81b157fa290f319c09367de92b1
SHA1292a6c75bda5ca577412550ce008cbdcfabc66a7
SHA256b2e0386ad66dde60acf3b8f4aabd9c522962bc51dd30b6df7a3feed7da7d5f92
SHA5129c58ca921dca5cd18df561fc7c0eabd4267f49b68e54e13c2241bc6b6f7aab9dbd34d2c364098a40cdf03021311df98dad6816f015cb4871a520d89f1835ad90
-
Filesize
478KB
MD514b2b81b157fa290f319c09367de92b1
SHA1292a6c75bda5ca577412550ce008cbdcfabc66a7
SHA256b2e0386ad66dde60acf3b8f4aabd9c522962bc51dd30b6df7a3feed7da7d5f92
SHA5129c58ca921dca5cd18df561fc7c0eabd4267f49b68e54e13c2241bc6b6f7aab9dbd34d2c364098a40cdf03021311df98dad6816f015cb4871a520d89f1835ad90