Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 05:06
Static task
static1
General
-
Target
bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe
-
Size
701KB
-
MD5
077c31e1627af858997273055bc36e79
-
SHA1
81aa9bfde069631c2d4a1f1a283ed7ef578748b5
-
SHA256
bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7
-
SHA512
b66c4abbbc550263d90a5f261185920d1e193af2135e46c7b59aa94395ab1d4fa441ec7ac8cce19b1d7d50236d23afd65c52e950b53d0dab14d4d0d1dfdf6a62
-
SSDEEP
12288:my90spL3I8EMH49lkrrQh+GaPXFzoAEG2bo9wiyih8XIF4Cdz:myF13JYj3a1zoBGzw7mzFV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 30140775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 30140775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 30140775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 30140775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 30140775.exe -
Executes dropped EXE 4 IoCs
pid Process 3620 un875056.exe 3564 30140775.exe 2964 rk201255.exe 4972 si442773.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 30140775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 30140775.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un875056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un875056.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 30140775.exe 3564 30140775.exe 2964 rk201255.exe 2964 rk201255.exe 4972 si442773.exe 4972 si442773.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3564 30140775.exe Token: SeDebugPrivilege 2964 rk201255.exe Token: SeDebugPrivilege 4972 si442773.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3452 wrote to memory of 3620 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 66 PID 3452 wrote to memory of 3620 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 66 PID 3452 wrote to memory of 3620 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 66 PID 3620 wrote to memory of 3564 3620 un875056.exe 67 PID 3620 wrote to memory of 3564 3620 un875056.exe 67 PID 3620 wrote to memory of 3564 3620 un875056.exe 67 PID 3620 wrote to memory of 2964 3620 un875056.exe 68 PID 3620 wrote to memory of 2964 3620 un875056.exe 68 PID 3620 wrote to memory of 2964 3620 un875056.exe 68 PID 3452 wrote to memory of 4972 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 70 PID 3452 wrote to memory of 4972 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 70 PID 3452 wrote to memory of 4972 3452 bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe"C:\Users\Admin\AppData\Local\Temp\bcb6dbfc1af4e7a52ab37e479b49d34a9471fd977b898bbc8eeab63f53931af7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875056.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30140775.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk201255.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si442773.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
547KB
MD5adb2930ec343813535e643120b5827de
SHA1eae1a10548854c3352b2ea60838d31a0ce4230ac
SHA2567ca317fcd888dcff74d244c57897119cfae2cc602541da0c7c6cc2c0e474baea
SHA512f8a31149e6ea52b806e3be2c782bf32311eb4a4c7f29539c29dae475b078b7893912437645da72a8459a62b3ec789ba4e9bb79a4c0e32f3c781cd8619122bec3
-
Filesize
547KB
MD5adb2930ec343813535e643120b5827de
SHA1eae1a10548854c3352b2ea60838d31a0ce4230ac
SHA2567ca317fcd888dcff74d244c57897119cfae2cc602541da0c7c6cc2c0e474baea
SHA512f8a31149e6ea52b806e3be2c782bf32311eb4a4c7f29539c29dae475b078b7893912437645da72a8459a62b3ec789ba4e9bb79a4c0e32f3c781cd8619122bec3
-
Filesize
269KB
MD5d0608369a0d88fe82238c1298286a0d2
SHA1313e8ffa3716127a399bd8791c9aba5f545de561
SHA25679f4ee66d3b50f74efdb008a86de3d10087951bad974e40060965c4d187e7510
SHA512f4ce76dba6cb4cbe24e176864ebd307d69319ac72e21aa7664f5af29cda9b4f894e81af0574d907da244e96fc7ca0dc95d3ff516c0fb205a75859d02015cedb6
-
Filesize
269KB
MD5d0608369a0d88fe82238c1298286a0d2
SHA1313e8ffa3716127a399bd8791c9aba5f545de561
SHA25679f4ee66d3b50f74efdb008a86de3d10087951bad974e40060965c4d187e7510
SHA512f4ce76dba6cb4cbe24e176864ebd307d69319ac72e21aa7664f5af29cda9b4f894e81af0574d907da244e96fc7ca0dc95d3ff516c0fb205a75859d02015cedb6
-
Filesize
353KB
MD509a87faa8f3b84d8165eee4fc93f42fc
SHA1253c198a717cf087d5c3ff90f1d21e5d9fd14c8a
SHA256e8bb480ef76b9c0197446fe62e0b267a68cab6ced5abb2582e902ed6d4e93ec9
SHA5121527e70e24a8244dd1ceb705ffb301045da4c78149efdca2cd8addd892b27ac19c605d376c10f947392533c04b651847d16fd5791fbefd4841f11c1d6ec48da0
-
Filesize
353KB
MD509a87faa8f3b84d8165eee4fc93f42fc
SHA1253c198a717cf087d5c3ff90f1d21e5d9fd14c8a
SHA256e8bb480ef76b9c0197446fe62e0b267a68cab6ced5abb2582e902ed6d4e93ec9
SHA5121527e70e24a8244dd1ceb705ffb301045da4c78149efdca2cd8addd892b27ac19c605d376c10f947392533c04b651847d16fd5791fbefd4841f11c1d6ec48da0