Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 21:12
Static task
static1
General
-
Target
d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe
-
Size
746KB
-
MD5
f5196113a822fecf2f0dfaec034700fc
-
SHA1
f8b869f2f6bdb056dee305c9e0b9a06f4eb9e9fd
-
SHA256
d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349
-
SHA512
0240a94afe8f36f0f32b27cf82bcd7dbfc9562bb0855b2afbfe6a5cfec525576def9f6b602281e51bd5fb70b792e64231ca77206237c0b0d2a28b981a48e670b
-
SSDEEP
12288:zy906RYszDOrW9NDA740J1CUemRbgDi3FU9mFWmaJbB4wylQxXQnzDgo:zy7zyrv740JRgDiVU9APMbBZylCXU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 12111206.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 12111206.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 12111206.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 12111206.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 12111206.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 12111206.exe -
Executes dropped EXE 4 IoCs
pid Process 1860 un482102.exe 4264 12111206.exe 5020 rk804851.exe 2128 si899925.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 12111206.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 12111206.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un482102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un482102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4264 12111206.exe 4264 12111206.exe 5020 rk804851.exe 5020 rk804851.exe 2128 si899925.exe 2128 si899925.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4264 12111206.exe Token: SeDebugPrivilege 5020 rk804851.exe Token: SeDebugPrivilege 2128 si899925.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1860 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 84 PID 1384 wrote to memory of 1860 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 84 PID 1384 wrote to memory of 1860 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 84 PID 1860 wrote to memory of 4264 1860 un482102.exe 85 PID 1860 wrote to memory of 4264 1860 un482102.exe 85 PID 1860 wrote to memory of 4264 1860 un482102.exe 85 PID 1860 wrote to memory of 5020 1860 un482102.exe 93 PID 1860 wrote to memory of 5020 1860 un482102.exe 93 PID 1860 wrote to memory of 5020 1860 un482102.exe 93 PID 1384 wrote to memory of 2128 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 94 PID 1384 wrote to memory of 2128 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 94 PID 1384 wrote to memory of 2128 1384 d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe"C:\Users\Admin\AppData\Local\Temp\d535475a00f71bcf55aa10be4a00005b35f8721277b07cd4c73da5c3aaedb349.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un482102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un482102.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12111206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12111206.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk804851.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk804851.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899925.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
592KB
MD5830af7bf9007d60863ffa536f8aec7f7
SHA1e701215cc5733f9f74565230a9ff2caf4bc73e53
SHA256d01b1f86e587f33306fa675b14b115c8ca35a55e5c76da58415f413c468e5cb9
SHA512f28ea5e9d26c802276a730b5cdd497c3bf17772c8a072fd64d1bed4d69783afc1c6efdd2b394473d19e2aaad45dbd75dd94b3919ecb484ca41971de07faad9a7
-
Filesize
592KB
MD5830af7bf9007d60863ffa536f8aec7f7
SHA1e701215cc5733f9f74565230a9ff2caf4bc73e53
SHA256d01b1f86e587f33306fa675b14b115c8ca35a55e5c76da58415f413c468e5cb9
SHA512f28ea5e9d26c802276a730b5cdd497c3bf17772c8a072fd64d1bed4d69783afc1c6efdd2b394473d19e2aaad45dbd75dd94b3919ecb484ca41971de07faad9a7
-
Filesize
377KB
MD555b0b7ab8dc08b5c680d49a5cd68e276
SHA1a8e7063a2771962f93eb242420d8dec0baa3a92e
SHA2566679c0e7c1d4e4aab1037d79c1e4e1b6c76fa1da348d3a1d070ca28dc729d737
SHA512e54fc0ba0e9fa9a6a0430ca44c53d1ec8a3ea5a58115b867f4c103fc8448db05b2f05913c8f16254676f4ad99c878703a435abc7c8c65ad2604775dc2f113b46
-
Filesize
377KB
MD555b0b7ab8dc08b5c680d49a5cd68e276
SHA1a8e7063a2771962f93eb242420d8dec0baa3a92e
SHA2566679c0e7c1d4e4aab1037d79c1e4e1b6c76fa1da348d3a1d070ca28dc729d737
SHA512e54fc0ba0e9fa9a6a0430ca44c53d1ec8a3ea5a58115b867f4c103fc8448db05b2f05913c8f16254676f4ad99c878703a435abc7c8c65ad2604775dc2f113b46
-
Filesize
459KB
MD53a5088d5f067927d3f4b5f8f23a15d4a
SHA1501ce588de552a238246cffc26be1eb2e94b1721
SHA256a8e1cbef27b34c1caba1275cce8709bb940e4f880f34daa7a0cf6c597e671225
SHA5123374eca93d951640dc2531916bd4b32dc9e18b010f5c0e6601f64f34890c64c9f95d06c87018c55262a3a4f42790ba1207c4bff380239d3a0dbad934b3ed3949
-
Filesize
459KB
MD53a5088d5f067927d3f4b5f8f23a15d4a
SHA1501ce588de552a238246cffc26be1eb2e94b1721
SHA256a8e1cbef27b34c1caba1275cce8709bb940e4f880f34daa7a0cf6c597e671225
SHA5123374eca93d951640dc2531916bd4b32dc9e18b010f5c0e6601f64f34890c64c9f95d06c87018c55262a3a4f42790ba1207c4bff380239d3a0dbad934b3ed3949