Analysis
-
max time kernel
50s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/04/2023, 16:32
Static task
static1
General
-
Target
0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe
-
Size
611KB
-
MD5
9ac65334a29cc26f6b4b4abb3010076a
-
SHA1
b5778b67dad098021f5c238438b1ae4d565181b5
-
SHA256
0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76
-
SHA512
aa9012a8b5b3692103582a2cd1890db51c551639cfc1a313a533e7404e6eff8d63eaff63953052fe6b645da171da29d3a28869a1d07de1242558989b7682c6fc
-
SSDEEP
12288:6y90C+Y4fKc9hZ0LHeu+RiWdRHLW6ZXfSL8Nhy/WLM7Z3qIWZFG:6y5+YkzhEY9RrWCXfMF7ZgfG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 42684528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 42684528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 42684528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 42684528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 42684528.exe -
Executes dropped EXE 4 IoCs
pid Process 1668 st984393.exe 1924 42684528.exe 2548 kp523242.exe 336 lr499812.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 42684528.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st984393.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st984393.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1924 42684528.exe 1924 42684528.exe 2548 kp523242.exe 2548 kp523242.exe 336 lr499812.exe 336 lr499812.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1924 42684528.exe Token: SeDebugPrivilege 2548 kp523242.exe Token: SeDebugPrivilege 336 lr499812.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1668 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 66 PID 1480 wrote to memory of 1668 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 66 PID 1480 wrote to memory of 1668 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 66 PID 1668 wrote to memory of 1924 1668 st984393.exe 67 PID 1668 wrote to memory of 1924 1668 st984393.exe 67 PID 1668 wrote to memory of 2548 1668 st984393.exe 68 PID 1668 wrote to memory of 2548 1668 st984393.exe 68 PID 1668 wrote to memory of 2548 1668 st984393.exe 68 PID 1480 wrote to memory of 336 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 70 PID 1480 wrote to memory of 336 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 70 PID 1480 wrote to memory of 336 1480 0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe"C:\Users\Admin\AppData\Local\Temp\0c8c54d7ce1ccabbd3f6d20df35f3213d9f4d049f51371937e8bddbcd0662f76.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st984393.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42684528.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp523242.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr499812.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
457KB
MD57a33949c5daf34443fb19fc6296ee0de
SHA1c6dd035649f51cbce2453c6cadeb55187b7b4e8d
SHA2569ef7a7d71b5e4bdf97822cf740ae29f13cefa1a992eb872c9513bf9e42377547
SHA512d0cacae6592603276fdb8058778476511a5616d7c07c3ee5f3e2a4f36b5e5389568cf5d5a865c645216872dfe71dc522c7caa4f70e4e078805abdcb1c4a16227
-
Filesize
457KB
MD57a33949c5daf34443fb19fc6296ee0de
SHA1c6dd035649f51cbce2453c6cadeb55187b7b4e8d
SHA2569ef7a7d71b5e4bdf97822cf740ae29f13cefa1a992eb872c9513bf9e42377547
SHA512d0cacae6592603276fdb8058778476511a5616d7c07c3ee5f3e2a4f36b5e5389568cf5d5a865c645216872dfe71dc522c7caa4f70e4e078805abdcb1c4a16227
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD56368d32fa64520c1f26f19541758ebb7
SHA1b77db6989e077d8677a5c9c0c02c60a709617dc9
SHA256b98903e62d9320280589a07739dd26e96abf62e5c4d85d86c58c4257e477981a
SHA512e74beaab58c15879079a5007ea499d7ee6688849e653455d0876b9c9c6dc42dffaadab61806cd1239751284bebe77c4e61775a8c78b6d50cb266f6206c3054fc
-
Filesize
459KB
MD56368d32fa64520c1f26f19541758ebb7
SHA1b77db6989e077d8677a5c9c0c02c60a709617dc9
SHA256b98903e62d9320280589a07739dd26e96abf62e5c4d85d86c58c4257e477981a
SHA512e74beaab58c15879079a5007ea499d7ee6688849e653455d0876b9c9c6dc42dffaadab61806cd1239751284bebe77c4e61775a8c78b6d50cb266f6206c3054fc