Analysis
-
max time kernel
49s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/04/2023, 13:51
Static task
static1
General
-
Target
18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe
-
Size
747KB
-
MD5
046bcaa1454c927e6343e2b18ad6d8b3
-
SHA1
d3c0f3fd65dd2306138e07eb853520d28f605bca
-
SHA256
18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659
-
SHA512
dcd238187f3bb6dd4fe9643b82815639a2d69735a690fb4584a65527861c30457b18a30a430fc763c7e69159d6bc0e9d1d1e34953c8b078573b62235964f4bd4
-
SSDEEP
12288:py90swXftqNrhIZ/F3mTmeiVTpTg/TAtMAyLN75/HfOiyhN29BmuGubYwmp:pyV0fQNrQF8NiVT6MCAYdvfOnS7ml0JM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 08522767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 08522767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 08522767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 08522767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 08522767.exe -
Executes dropped EXE 4 IoCs
pid Process 4120 un684650.exe 4116 08522767.exe 3712 rk903510.exe 4488 si698912.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 08522767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08522767.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un684650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un684650.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4116 08522767.exe 4116 08522767.exe 3712 rk903510.exe 3712 rk903510.exe 4488 si698912.exe 4488 si698912.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 08522767.exe Token: SeDebugPrivilege 3712 rk903510.exe Token: SeDebugPrivilege 4488 si698912.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2788 wrote to memory of 4120 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 66 PID 2788 wrote to memory of 4120 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 66 PID 2788 wrote to memory of 4120 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 66 PID 4120 wrote to memory of 4116 4120 un684650.exe 67 PID 4120 wrote to memory of 4116 4120 un684650.exe 67 PID 4120 wrote to memory of 4116 4120 un684650.exe 67 PID 4120 wrote to memory of 3712 4120 un684650.exe 68 PID 4120 wrote to memory of 3712 4120 un684650.exe 68 PID 4120 wrote to memory of 3712 4120 un684650.exe 68 PID 2788 wrote to memory of 4488 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 70 PID 2788 wrote to memory of 4488 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 70 PID 2788 wrote to memory of 4488 2788 18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe"C:\Users\Admin\AppData\Local\Temp\18b1af65134cf377b322d6077b23c60700d5ac82d22bcc1f9bace6eaffff3659.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684650.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08522767.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk903510.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si698912.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
593KB
MD53794e7fd4c287eb43ede9cda982699ba
SHA1d16534eafa4d3b1725815166a61d33b44baf7816
SHA2569e40d4f957a1d5bfb4a41b746cca8ce570a4f6bd7871f622822c879097021e46
SHA5122856b691ddb99e1b77999bf5149f996a84d9f8ce81943dfeb3c94313882d537e38bdc7a763fb44fbac9c1551392606fbce6de2859c7bc32fab00ef60c40e393d
-
Filesize
593KB
MD53794e7fd4c287eb43ede9cda982699ba
SHA1d16534eafa4d3b1725815166a61d33b44baf7816
SHA2569e40d4f957a1d5bfb4a41b746cca8ce570a4f6bd7871f622822c879097021e46
SHA5122856b691ddb99e1b77999bf5149f996a84d9f8ce81943dfeb3c94313882d537e38bdc7a763fb44fbac9c1551392606fbce6de2859c7bc32fab00ef60c40e393d
-
Filesize
378KB
MD5defd4a12d7e427c133df6c6e2437ab92
SHA101744fa5145386f3c81366e2eb0d3c9522843816
SHA256c780b7dbbeeadcd83040991058bb9db4c3e31d450c7ac47b6a0708bf33bac4c0
SHA5120243fcf767440d6f6ae5b5358756efa8f839a7e95721036514ac007947d8a12983b6da62545e9e80a244c1889a46e0dd8072109b6ac102fe30eeb03be89f3400
-
Filesize
378KB
MD5defd4a12d7e427c133df6c6e2437ab92
SHA101744fa5145386f3c81366e2eb0d3c9522843816
SHA256c780b7dbbeeadcd83040991058bb9db4c3e31d450c7ac47b6a0708bf33bac4c0
SHA5120243fcf767440d6f6ae5b5358756efa8f839a7e95721036514ac007947d8a12983b6da62545e9e80a244c1889a46e0dd8072109b6ac102fe30eeb03be89f3400
-
Filesize
460KB
MD5f6f05bb9bfc229c6cd1407b8fd90b22c
SHA1a6134bc98eba208e766dd41415d6a3e79b20b76f
SHA25674a135c3c7ab2de3482067411f88abcd9f947f5d284a75dc2d06be7443bf8f4d
SHA5122ad90a3e6a6bcabc04caa0e8b249c93ceb0fdb14755ea14a0784e4e43d8339df19839cfba1c7b868cedcc674b36e51f83767001cd75ad298389067a50da6a804
-
Filesize
460KB
MD5f6f05bb9bfc229c6cd1407b8fd90b22c
SHA1a6134bc98eba208e766dd41415d6a3e79b20b76f
SHA25674a135c3c7ab2de3482067411f88abcd9f947f5d284a75dc2d06be7443bf8f4d
SHA5122ad90a3e6a6bcabc04caa0e8b249c93ceb0fdb14755ea14a0784e4e43d8339df19839cfba1c7b868cedcc674b36e51f83767001cd75ad298389067a50da6a804