Analysis
-
max time kernel
59s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 04:44
Static task
static1
General
-
Target
e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe
-
Size
745KB
-
MD5
6559f0415c8c2f416aad40654ff4c028
-
SHA1
bfd1fe50dcfae70d062d73a2fabe43117f7197b2
-
SHA256
e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a
-
SHA512
8a6161ff5462e2550b11d68e65f77d5cbb67a2cbe4fa609a6636c935879e3eef2009bf5d8e5b8aabbac265b69f4a5be9de4cd0641db2be06d01fcfcce246c2b3
-
SSDEEP
12288:Ay90mOYp08Dt86v4L4V66JIcF+e+9mVBtnX7iiF6QXv+Dg7MIre2:Ay9OYpDt3l68bXVnX+iHW0ASe2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 74207595.exe -
Executes dropped EXE 4 IoCs
pid Process 224 un903262.exe 3220 74207595.exe 5108 rk165704.exe 4044 si124343.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 74207595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 74207595.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un903262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un903262.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4692 3220 WerFault.exe 86 4432 5108 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3220 74207595.exe 3220 74207595.exe 5108 rk165704.exe 5108 rk165704.exe 4044 si124343.exe 4044 si124343.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3220 74207595.exe Token: SeDebugPrivilege 5108 rk165704.exe Token: SeDebugPrivilege 4044 si124343.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4932 wrote to memory of 224 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 85 PID 4932 wrote to memory of 224 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 85 PID 4932 wrote to memory of 224 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 85 PID 224 wrote to memory of 3220 224 un903262.exe 86 PID 224 wrote to memory of 3220 224 un903262.exe 86 PID 224 wrote to memory of 3220 224 un903262.exe 86 PID 224 wrote to memory of 5108 224 un903262.exe 92 PID 224 wrote to memory of 5108 224 un903262.exe 92 PID 224 wrote to memory of 5108 224 un903262.exe 92 PID 4932 wrote to memory of 4044 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 95 PID 4932 wrote to memory of 4044 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 95 PID 4932 wrote to memory of 4044 4932 e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe"C:\Users\Admin\AppData\Local\Temp\e4da326e3c6f2f69caea03052d14f51799fba619b7c9c4119712b63a0526384a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un903262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un903262.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74207595.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74207595.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 10804⤵
- Program crash
PID:4692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk165704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk165704.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 13204⤵
- Program crash
PID:4432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124343.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3220 -ip 32201⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5108 -ip 51081⤵PID:4232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
591KB
MD59bf9693d741568fdbdf19a70b0cf2735
SHA1808208f77503c954d2ffb1452090e036be22bbd6
SHA256becaf504ef3e67dd8b3ad8205c420bdf768bac7d8c943d2c1f48d75dc78a56d8
SHA512554ebfaceb0193292d9575c18b5df34479cc2159e42bd4b779823f10db39b3d7e7292e7c6770d2d67a9a3afc5d34fdc764127bd1952ead1975a42d01949317bc
-
Filesize
591KB
MD59bf9693d741568fdbdf19a70b0cf2735
SHA1808208f77503c954d2ffb1452090e036be22bbd6
SHA256becaf504ef3e67dd8b3ad8205c420bdf768bac7d8c943d2c1f48d75dc78a56d8
SHA512554ebfaceb0193292d9575c18b5df34479cc2159e42bd4b779823f10db39b3d7e7292e7c6770d2d67a9a3afc5d34fdc764127bd1952ead1975a42d01949317bc
-
Filesize
376KB
MD5efa7351202aef026321f005f514876fe
SHA1cdbbc839c911e098f569a7a0d31f3256c6c16e62
SHA2566268878ed8b6bf3efe38ee12407f88f92b34c6b0725d0c5a7521036ac1bcecc3
SHA51204d8abd796f59ae0075e3f41f2e47bb38a7ed81f37771421d49785522175ae6fb2f66243dfa89d55be5028f5f1fcde57f44ae3014718cf64fddb442f8450da08
-
Filesize
376KB
MD5efa7351202aef026321f005f514876fe
SHA1cdbbc839c911e098f569a7a0d31f3256c6c16e62
SHA2566268878ed8b6bf3efe38ee12407f88f92b34c6b0725d0c5a7521036ac1bcecc3
SHA51204d8abd796f59ae0075e3f41f2e47bb38a7ed81f37771421d49785522175ae6fb2f66243dfa89d55be5028f5f1fcde57f44ae3014718cf64fddb442f8450da08
-
Filesize
459KB
MD5c52bbf4acb070213bd2294165b93275a
SHA1e992156a0ad6072be8d3da5d6551f652f7e96f3c
SHA25609d8209b26b0fbcec9d510c92d39d5b6f41b48c44d9b5d33e8f6f2e92c58e454
SHA512065fd46b198a74604d9bcfd8cd30df926d2e9f1db563cfc147c11dbecd2b869937c3540e7d44ab5503acf6181b34ba4f9bd46583f85e78ef7432b40983501743
-
Filesize
459KB
MD5c52bbf4acb070213bd2294165b93275a
SHA1e992156a0ad6072be8d3da5d6551f652f7e96f3c
SHA25609d8209b26b0fbcec9d510c92d39d5b6f41b48c44d9b5d33e8f6f2e92c58e454
SHA512065fd46b198a74604d9bcfd8cd30df926d2e9f1db563cfc147c11dbecd2b869937c3540e7d44ab5503acf6181b34ba4f9bd46583f85e78ef7432b40983501743