Analysis
-
max time kernel
60s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 23:11
Static task
static1
General
-
Target
50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe
-
Size
696KB
-
MD5
b4d854967873eb4ac67d91a4625e7d38
-
SHA1
6bea892356f73106ed2b6c57c14ca275dfdbd9ed
-
SHA256
50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a
-
SHA512
53f6c113f38c4e2ff06c0d46c2570a9ecb610a979c5c619a0cb4d8dd14de484100ce18bf2963f82a7ba067c434779c26c5c8e62c7ae7f8bd442d1f96cb9ae05a
-
SSDEEP
12288:Ny908ViJ0el544iq91CtwMo0ef3hVvTFjXhgbpt8ddq8ZtbcpF:NyRlP4N1fnF9g/gnnbi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 51360885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 51360885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 51360885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 51360885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 51360885.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 51360885.exe -
Executes dropped EXE 4 IoCs
pid Process 392 un556405.exe 1636 51360885.exe 4252 rk175019.exe 3712 si172818.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 51360885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 51360885.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un556405.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un556405.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3780 1636 WerFault.exe 86 4576 4252 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1636 51360885.exe 1636 51360885.exe 4252 rk175019.exe 4252 rk175019.exe 3712 si172818.exe 3712 si172818.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1636 51360885.exe Token: SeDebugPrivilege 4252 rk175019.exe Token: SeDebugPrivilege 3712 si172818.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 792 wrote to memory of 392 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 85 PID 792 wrote to memory of 392 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 85 PID 792 wrote to memory of 392 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 85 PID 392 wrote to memory of 1636 392 un556405.exe 86 PID 392 wrote to memory of 1636 392 un556405.exe 86 PID 392 wrote to memory of 1636 392 un556405.exe 86 PID 392 wrote to memory of 4252 392 un556405.exe 92 PID 392 wrote to memory of 4252 392 un556405.exe 92 PID 392 wrote to memory of 4252 392 un556405.exe 92 PID 792 wrote to memory of 3712 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 95 PID 792 wrote to memory of 3712 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 95 PID 792 wrote to memory of 3712 792 50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe"C:\Users\Admin\AppData\Local\Temp\50c0f795aa22436f45f9bc5bfde5d54efe83882915ff4eb30cc2331b75999d6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556405.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51360885.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 10844⤵
- Program crash
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175019.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 13284⤵
- Program crash
PID:4576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si172818.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1636 -ip 16361⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4252 -ip 42521⤵PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
542KB
MD56c1f608a6ad6fe55ead0f136f2794981
SHA13f0e82ed7f68a80f3bacf566675829386903c693
SHA2569a67d2baf66389954e3bc626441f1849ae5c48a2d315ba2573351664450f961a
SHA51265c12327fc8bc642cd16cf4f1905cadde7d19f6f6a27a74cf41e32a76e8c15c1d94662dc5705ec99038ab0a89ac546a03c95dcd3423cd5382103441a357604f5
-
Filesize
542KB
MD56c1f608a6ad6fe55ead0f136f2794981
SHA13f0e82ed7f68a80f3bacf566675829386903c693
SHA2569a67d2baf66389954e3bc626441f1849ae5c48a2d315ba2573351664450f961a
SHA51265c12327fc8bc642cd16cf4f1905cadde7d19f6f6a27a74cf41e32a76e8c15c1d94662dc5705ec99038ab0a89ac546a03c95dcd3423cd5382103441a357604f5
-
Filesize
258KB
MD5374a51069f5922255c498bb168519d4f
SHA145d1b58c586bf9e2fd1e368a379100e78d7220d3
SHA256b6aea1b82c782880eb7116231ca829059f3f1a016332d0792f42f4381fb8f785
SHA512fe89134ea0344524f00b99d23cafe88f2e37f93d1d9a1162cf695c1bcc4a092256fca4e5777251ec13e7d1d85e03811a3cffd1eb9faa820f79abcb9d7e4b17a1
-
Filesize
258KB
MD5374a51069f5922255c498bb168519d4f
SHA145d1b58c586bf9e2fd1e368a379100e78d7220d3
SHA256b6aea1b82c782880eb7116231ca829059f3f1a016332d0792f42f4381fb8f785
SHA512fe89134ea0344524f00b99d23cafe88f2e37f93d1d9a1162cf695c1bcc4a092256fca4e5777251ec13e7d1d85e03811a3cffd1eb9faa820f79abcb9d7e4b17a1
-
Filesize
341KB
MD5f2267f4c2e10152f4840c473bbed53b8
SHA14e6000959b5cb6cb2f05adf261942a54cab5789a
SHA2560c5ef9566e95ba9994f942777d8b39a25f950a26eb074d3c4d68721fd00cfb31
SHA512986914faa5be66b9b4f1133897c448f8511a072546a0686413e3ab1bd248153d2287eb22fbc26daff2cfc08519926b33829736bcf2be7b9ba5e56ffe7db558bd
-
Filesize
341KB
MD5f2267f4c2e10152f4840c473bbed53b8
SHA14e6000959b5cb6cb2f05adf261942a54cab5789a
SHA2560c5ef9566e95ba9994f942777d8b39a25f950a26eb074d3c4d68721fd00cfb31
SHA512986914faa5be66b9b4f1133897c448f8511a072546a0686413e3ab1bd248153d2287eb22fbc26daff2cfc08519926b33829736bcf2be7b9ba5e56ffe7db558bd