Analysis
-
max time kernel
53s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 01:16
Static task
static1
General
-
Target
bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe
-
Size
746KB
-
MD5
34a3b125cd2f5a6fd80b588c1f7cfe2a
-
SHA1
a3ff9703812728a1b03d88cde4e6503d506139fb
-
SHA256
bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669
-
SHA512
615f7f4272d99936bbd2d4574c302e9bbaae9c4a4ba06431cdbc961cde18041991f0ade35aa15bab9aed6f8526605f5d1ff4cebf8ae3b886f622f5076132727f
-
SSDEEP
12288:0y90ENBcLijf5VoD3vF2453uxneRs6nlD43NP2nnPU1eiV:0yP/NHoD3v95Uee4kNPmnscu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 17808084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 17808084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 17808084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 17808084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 17808084.exe -
Executes dropped EXE 4 IoCs
pid Process 2488 un440423.exe 2560 17808084.exe 3540 rk100627.exe 3052 si258388.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 17808084.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 17808084.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un440423.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un440423.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2560 17808084.exe 2560 17808084.exe 3540 rk100627.exe 3540 rk100627.exe 3052 si258388.exe 3052 si258388.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 17808084.exe Token: SeDebugPrivilege 3540 rk100627.exe Token: SeDebugPrivilege 3052 si258388.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2488 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 66 PID 2156 wrote to memory of 2488 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 66 PID 2156 wrote to memory of 2488 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 66 PID 2488 wrote to memory of 2560 2488 un440423.exe 67 PID 2488 wrote to memory of 2560 2488 un440423.exe 67 PID 2488 wrote to memory of 2560 2488 un440423.exe 67 PID 2488 wrote to memory of 3540 2488 un440423.exe 68 PID 2488 wrote to memory of 3540 2488 un440423.exe 68 PID 2488 wrote to memory of 3540 2488 un440423.exe 68 PID 2156 wrote to memory of 3052 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 70 PID 2156 wrote to memory of 3052 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 70 PID 2156 wrote to memory of 3052 2156 bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe"C:\Users\Admin\AppData\Local\Temp\bc27199dd969ae1fafe1424df630d63a785f4f8defbf18adcfed0690bb5ff669.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440423.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440423.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17808084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17808084.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk100627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk100627.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258388.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
592KB
MD546e3038eb77f3c6f793f6e6c5d7991b8
SHA14007c46c62698e98b179bc70876da6db4465c456
SHA256cfa720f4c2422bb9f9058edaf33c8036fcbc2e12946b7871ce3ba22aaadcce2d
SHA5127df873d90fddf890556f99f02fe0cdf1ee7e2e7a8742fa8c448235a5d4ae2a02186a045eb15e78f33b100d3c6c707f519ebd8834711b1aecdc2f7d6d936ed251
-
Filesize
592KB
MD546e3038eb77f3c6f793f6e6c5d7991b8
SHA14007c46c62698e98b179bc70876da6db4465c456
SHA256cfa720f4c2422bb9f9058edaf33c8036fcbc2e12946b7871ce3ba22aaadcce2d
SHA5127df873d90fddf890556f99f02fe0cdf1ee7e2e7a8742fa8c448235a5d4ae2a02186a045eb15e78f33b100d3c6c707f519ebd8834711b1aecdc2f7d6d936ed251
-
Filesize
377KB
MD5713eb6829bcee88a82d5f87b2b795d6a
SHA1f567e6de0841c86cbe895c38d36d7c40f8d8b28d
SHA256ae38056e61e12c2318ba7ff9cd4502e65c6c2187663e204e2c5a1e2d9bccc4a8
SHA5121fe218afd2129b2ff82419f05257cc95776ae4d1f81b6b68beb684514533bfc50dc831192dde1841160a509c3f0b8f557b60bf71ea56711de43592ef373f1844
-
Filesize
377KB
MD5713eb6829bcee88a82d5f87b2b795d6a
SHA1f567e6de0841c86cbe895c38d36d7c40f8d8b28d
SHA256ae38056e61e12c2318ba7ff9cd4502e65c6c2187663e204e2c5a1e2d9bccc4a8
SHA5121fe218afd2129b2ff82419f05257cc95776ae4d1f81b6b68beb684514533bfc50dc831192dde1841160a509c3f0b8f557b60bf71ea56711de43592ef373f1844
-
Filesize
459KB
MD503e552647d3c269f68aac27c4073968b
SHA1e2a5a077e4b80c60ebabe0bdea641f765c430c19
SHA25613eb5f282dc9196986999f2e6df6eee18087a183de935bbb64f6000ff5338149
SHA5129fc8230638d53b3757deb19ab76bfa0e3147028bb3fda8f8acc450c0aebd44038d66cdf4de8381675321a4c8688baeb1d3931cf108826d7ea5df07737d3a82aa
-
Filesize
459KB
MD503e552647d3c269f68aac27c4073968b
SHA1e2a5a077e4b80c60ebabe0bdea641f765c430c19
SHA25613eb5f282dc9196986999f2e6df6eee18087a183de935bbb64f6000ff5338149
SHA5129fc8230638d53b3757deb19ab76bfa0e3147028bb3fda8f8acc450c0aebd44038d66cdf4de8381675321a4c8688baeb1d3931cf108826d7ea5df07737d3a82aa