Analysis
-
max time kernel
103s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 16:01
Static task
static1
General
-
Target
e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe
-
Size
745KB
-
MD5
87a976cdc0855156dceaa1bc6ed8edba
-
SHA1
81753061d1ed3efbd1c711dbcec9d0df95bf76b7
-
SHA256
e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0
-
SHA512
4706bf438a9ed779d6d480e581aa49a714dcb2bdf58bd0c5ab6e87e1afe959fe5546de087faded781071418db7cc6d0d2531b29f6ff3c115d06fbf049f54dd17
-
SSDEEP
12288:py90iCAA4KQ8ggsLMoSveY0CyKHzgp89GEb4X3Z+XfS+7YJN2zD1BlgN5b:pyLCAAFQhgmModnKT190Z+XfoJhfb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 59316998.exe -
Executes dropped EXE 4 IoCs
pid Process 628 un052811.exe 2180 59316998.exe 2936 rk816910.exe 4760 si894831.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 59316998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 59316998.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un052811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un052811.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4908 2180 WerFault.exe 86 4584 2936 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2180 59316998.exe 2180 59316998.exe 2936 rk816910.exe 2936 rk816910.exe 4760 si894831.exe 4760 si894831.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2180 59316998.exe Token: SeDebugPrivilege 2936 rk816910.exe Token: SeDebugPrivilege 4760 si894831.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 628 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 85 PID 2016 wrote to memory of 628 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 85 PID 2016 wrote to memory of 628 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 85 PID 628 wrote to memory of 2180 628 un052811.exe 86 PID 628 wrote to memory of 2180 628 un052811.exe 86 PID 628 wrote to memory of 2180 628 un052811.exe 86 PID 628 wrote to memory of 2936 628 un052811.exe 96 PID 628 wrote to memory of 2936 628 un052811.exe 96 PID 628 wrote to memory of 2936 628 un052811.exe 96 PID 2016 wrote to memory of 4760 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 99 PID 2016 wrote to memory of 4760 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 99 PID 2016 wrote to memory of 4760 2016 e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe"C:\Users\Admin\AppData\Local\Temp\e341750b0a1098f8894dc86189e39ad6b0b89a343f77d6316c9a575133e74be0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59316998.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 10804⤵
- Program crash
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816910.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 13284⤵
- Program crash
PID:4584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si894831.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2180 -ip 21801⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2936 -ip 29361⤵PID:3300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
136KB
MD5ace73b2b1f835de11594ea9a243a9f5c
SHA12f929d1f69784fbe499a95b064679a16947bdd84
SHA2567310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49
SHA512024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e
-
Filesize
591KB
MD55971c63104a3dfc2ddf4a8b76d418e50
SHA17ad427b1b2df83176a13f17c16d6806bb627995a
SHA256749fced96c33744d36535e1c3f65463ba3d6c0892fb839aa6d8d84455e5a7e7f
SHA5125fc75b357b66492df620ba7b118bb7796f44108c83b780b2b86d84efc84d5778da006ac91f7615dcc6367e8a1c2c842e8aa93e579bde1af7aadbd15af4926c43
-
Filesize
591KB
MD55971c63104a3dfc2ddf4a8b76d418e50
SHA17ad427b1b2df83176a13f17c16d6806bb627995a
SHA256749fced96c33744d36535e1c3f65463ba3d6c0892fb839aa6d8d84455e5a7e7f
SHA5125fc75b357b66492df620ba7b118bb7796f44108c83b780b2b86d84efc84d5778da006ac91f7615dcc6367e8a1c2c842e8aa93e579bde1af7aadbd15af4926c43
-
Filesize
376KB
MD59e41662369672bdf928cd7dd5b47c718
SHA134854976dade78f51e56bb35a0adb4513764d87f
SHA2564f3410b6af47df8264e63fc30df5e14d64f179c80de38df5a206f5175c3fe044
SHA512bd6681c98c67dcca97819b6a1339a873141a4214e42b3e61dec526ed5760b400193e85d4d4287c6e0150c68fce44b1fdf3c9c8ee39965eb046d8becdbfb99117
-
Filesize
376KB
MD59e41662369672bdf928cd7dd5b47c718
SHA134854976dade78f51e56bb35a0adb4513764d87f
SHA2564f3410b6af47df8264e63fc30df5e14d64f179c80de38df5a206f5175c3fe044
SHA512bd6681c98c67dcca97819b6a1339a873141a4214e42b3e61dec526ed5760b400193e85d4d4287c6e0150c68fce44b1fdf3c9c8ee39965eb046d8becdbfb99117
-
Filesize
459KB
MD5341e411392b9d650acf1765843c5895e
SHA1f6e02f85fcb5e826a434baa6e173fc3555521710
SHA25617ac8db1d24290d737e59b59580cf537d33e2ad87139de6b111cd100096ed122
SHA5125265f2e9b2f456a4e4342c90bc654fce920f1d1c16ded06af12c0f3e24ff8f0a99fd4bdf239de82388ace9402c705ffec0c24972772306145767163a7f0b6880
-
Filesize
459KB
MD5341e411392b9d650acf1765843c5895e
SHA1f6e02f85fcb5e826a434baa6e173fc3555521710
SHA25617ac8db1d24290d737e59b59580cf537d33e2ad87139de6b111cd100096ed122
SHA5125265f2e9b2f456a4e4342c90bc654fce920f1d1c16ded06af12c0f3e24ff8f0a99fd4bdf239de82388ace9402c705ffec0c24972772306145767163a7f0b6880