Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 22:23
Static task
static1
General
-
Target
335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe
-
Size
694KB
-
MD5
15f84eca217b2ef590adf68e070cc663
-
SHA1
0c7298c0100be5fa4df73b30931ac1c975f6b125
-
SHA256
335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc
-
SHA512
e3b42fc7a9e1e9990a2ace84ef6060c5bf39808ae6dc040e802e0e95fed811aff2a5f789e687796456cd4a78b85ce011f0ac3d05f3417247803b7b285370aebc
-
SSDEEP
12288:ky90qf2x2o7GnphW4ZDyTj0wa8AIZVa38iLdDiJufdkLxksVq3SbZeTr8JDr4db:kyV2x20GnPZDRwwILgVf0ksbZ4Iudb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35259769.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35259769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35259769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35259769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35259769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35259769.exe -
Executes dropped EXE 4 IoCs
pid Process 2848 un728620.exe 1292 35259769.exe 3892 rk600020.exe 1168 si224967.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35259769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35259769.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un728620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un728620.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 628 1292 WerFault.exe 85 4880 3892 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1292 35259769.exe 1292 35259769.exe 3892 rk600020.exe 3892 rk600020.exe 1168 si224967.exe 1168 si224967.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1292 35259769.exe Token: SeDebugPrivilege 3892 rk600020.exe Token: SeDebugPrivilege 1168 si224967.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2848 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 84 PID 4264 wrote to memory of 2848 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 84 PID 4264 wrote to memory of 2848 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 84 PID 2848 wrote to memory of 1292 2848 un728620.exe 85 PID 2848 wrote to memory of 1292 2848 un728620.exe 85 PID 2848 wrote to memory of 1292 2848 un728620.exe 85 PID 2848 wrote to memory of 3892 2848 un728620.exe 91 PID 2848 wrote to memory of 3892 2848 un728620.exe 91 PID 2848 wrote to memory of 3892 2848 un728620.exe 91 PID 4264 wrote to memory of 1168 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 94 PID 4264 wrote to memory of 1168 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 94 PID 4264 wrote to memory of 1168 4264 335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe"C:\Users\Admin\AppData\Local\Temp\335c0e036d75d3912e99386d01f0e26f5e4b3e4ea2a638c2fe1526a3219977bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un728620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un728620.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35259769.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35259769.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10964⤵
- Program crash
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk600020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk600020.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 13244⤵
- Program crash
PID:4880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si224967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si224967.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1292 -ip 12921⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3892 -ip 38921⤵PID:2480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD554a77666cfb6bd3f43017eafd156aeda
SHA1d3bcffcae12e277f74cd59a60662640b29abd13b
SHA256d755343ced214043d3b7d8a2d6bd12c65514fa4f3b197b90ec87d195f3270c1b
SHA512c50ba883732c4338e23ef19ee6329b443f1221a0d456bd0ff3d21caa8075389a9d7b28baf4958db22ad8e5a935911afa3a3deaaa15d863a9c33db5aeb6cbea68
-
Filesize
540KB
MD554a77666cfb6bd3f43017eafd156aeda
SHA1d3bcffcae12e277f74cd59a60662640b29abd13b
SHA256d755343ced214043d3b7d8a2d6bd12c65514fa4f3b197b90ec87d195f3270c1b
SHA512c50ba883732c4338e23ef19ee6329b443f1221a0d456bd0ff3d21caa8075389a9d7b28baf4958db22ad8e5a935911afa3a3deaaa15d863a9c33db5aeb6cbea68
-
Filesize
257KB
MD549d9ed711325edf43d82d25d02f60bdd
SHA14181260cc611a8acecf1f32632fe4e0976c43972
SHA256ae0a293df9db12579c4f8b36dbadbb39669737bfac3566cfb10bbf3888f6ac47
SHA512f9caa34dfe892219fec00ab18fe1bb7def80ff3797093aab7eb0f0898452e770426cb2f71b79a46dedc8e3c786f900bb7da2c28f580cdaf0fd4551b01dd8bebf
-
Filesize
257KB
MD549d9ed711325edf43d82d25d02f60bdd
SHA14181260cc611a8acecf1f32632fe4e0976c43972
SHA256ae0a293df9db12579c4f8b36dbadbb39669737bfac3566cfb10bbf3888f6ac47
SHA512f9caa34dfe892219fec00ab18fe1bb7def80ff3797093aab7eb0f0898452e770426cb2f71b79a46dedc8e3c786f900bb7da2c28f580cdaf0fd4551b01dd8bebf
-
Filesize
340KB
MD570d0f580d964bcbe318d353d69829053
SHA108066ba77a016a8329992ce0d8d1eee8b32f41e4
SHA2563b012e4ff3cca7ab739171ea9703cb94590ccd2fba81cc748ec91e9f4be1f318
SHA5128d52550724299dd4d7448fa0469a1a9264df5284488de65e675a584c47a42dc25448f2526e7b596238a9c6f6aaee9cea07f3f38305cd49efdc6e2bbe033275ba
-
Filesize
340KB
MD570d0f580d964bcbe318d353d69829053
SHA108066ba77a016a8329992ce0d8d1eee8b32f41e4
SHA2563b012e4ff3cca7ab739171ea9703cb94590ccd2fba81cc748ec91e9f4be1f318
SHA5128d52550724299dd4d7448fa0469a1a9264df5284488de65e675a584c47a42dc25448f2526e7b596238a9c6f6aaee9cea07f3f38305cd49efdc6e2bbe033275ba