Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 22:28
Static task
static1
General
-
Target
468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe
-
Size
695KB
-
MD5
ecbb832f74caf1b0473e490b0583a332
-
SHA1
23c76c83d7d03e8496f363c993ab07bd07baddb9
-
SHA256
468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf
-
SHA512
ee14a302a77ec2e89a375070d82f53df2ffac9ee8fa36e71ded8eae7bb04c34d36d0ba1cbf8d4d560f1fdccc627ec4c8b686aabbc4361f6edf1a3bc1cfc34487
-
SSDEEP
12288:Py90g3CFHAXjA3VyXYKRhgP0HR+C6axwWCqhSbZe+JuH2m2DXLL/:Py/3CFgTANK9R+6wjbZ3Jhz//
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 68730836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 68730836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 68730836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 68730836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 68730836.exe -
Executes dropped EXE 4 IoCs
pid Process 3196 un908051.exe 4360 68730836.exe 1616 rk946792.exe 4048 si174134.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 68730836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 68730836.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un908051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un908051.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4360 68730836.exe 4360 68730836.exe 1616 rk946792.exe 1616 rk946792.exe 4048 si174134.exe 4048 si174134.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4360 68730836.exe Token: SeDebugPrivilege 1616 rk946792.exe Token: SeDebugPrivilege 4048 si174134.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3196 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 66 PID 2492 wrote to memory of 3196 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 66 PID 2492 wrote to memory of 3196 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 66 PID 3196 wrote to memory of 4360 3196 un908051.exe 67 PID 3196 wrote to memory of 4360 3196 un908051.exe 67 PID 3196 wrote to memory of 4360 3196 un908051.exe 67 PID 3196 wrote to memory of 1616 3196 un908051.exe 68 PID 3196 wrote to memory of 1616 3196 un908051.exe 68 PID 3196 wrote to memory of 1616 3196 un908051.exe 68 PID 2492 wrote to memory of 4048 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 70 PID 2492 wrote to memory of 4048 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 70 PID 2492 wrote to memory of 4048 2492 468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe"C:\Users\Admin\AppData\Local\Temp\468a8e6117ef68d97968b39b4172df2b98c8a0c5641573a870c859bca8d036bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68730836.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk946792.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174134.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
542KB
MD5fcb69176d1e37339758fa1a5c82b1b04
SHA16f72898e50f06dbf4cd40687d933ddd3a7c00169
SHA256f498903257da016a9859040f373e5082432e9c45c7973980106f954d27f6ba33
SHA51274c14d5f4a589ee196acb4ab986279dc0e64303399831fb910b2780e8c0d5fec2294750a1f46748cc926c96ff0d3c45fce38c49ba2dc74d0fce648b734487824
-
Filesize
542KB
MD5fcb69176d1e37339758fa1a5c82b1b04
SHA16f72898e50f06dbf4cd40687d933ddd3a7c00169
SHA256f498903257da016a9859040f373e5082432e9c45c7973980106f954d27f6ba33
SHA51274c14d5f4a589ee196acb4ab986279dc0e64303399831fb910b2780e8c0d5fec2294750a1f46748cc926c96ff0d3c45fce38c49ba2dc74d0fce648b734487824
-
Filesize
257KB
MD5259adda282b27b6df5348dd6898bd24d
SHA17c2e44d32926af4464ce3f77327f96fcd1c6ba3b
SHA256f2c9b6693ff2acc314b318ae3965b36c73d7f38b383d9aea5d943d95f50883a0
SHA51290bd0262af48c6de7b73c61066ae0cdf2d25a76f67d7cc434d198aed82db46f24595b2c45d4cc8f851cd65675b9b566ab468bcf2b30665520d6f4895147d1e95
-
Filesize
257KB
MD5259adda282b27b6df5348dd6898bd24d
SHA17c2e44d32926af4464ce3f77327f96fcd1c6ba3b
SHA256f2c9b6693ff2acc314b318ae3965b36c73d7f38b383d9aea5d943d95f50883a0
SHA51290bd0262af48c6de7b73c61066ae0cdf2d25a76f67d7cc434d198aed82db46f24595b2c45d4cc8f851cd65675b9b566ab468bcf2b30665520d6f4895147d1e95
-
Filesize
340KB
MD589659518f8663860edd2f3afa8de173d
SHA154428db43751c417368a33043d7c79721719e2af
SHA2562be87b4898cb5a1e93a6e6672164ba9da7e5686b579a6fb92176f0937be8df88
SHA512d4dc58660ea893d79d8c26a391260c3a5f12557c86789dfd2d31742bb89197caec7da814fdeac8003c7aeb09fa13dcd3eb7390b3056ef6b42f99b3e7b194effa
-
Filesize
340KB
MD589659518f8663860edd2f3afa8de173d
SHA154428db43751c417368a33043d7c79721719e2af
SHA2562be87b4898cb5a1e93a6e6672164ba9da7e5686b579a6fb92176f0937be8df88
SHA512d4dc58660ea893d79d8c26a391260c3a5f12557c86789dfd2d31742bb89197caec7da814fdeac8003c7aeb09fa13dcd3eb7390b3056ef6b42f99b3e7b194effa