Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 06:46
Static task
static1
General
-
Target
524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe
-
Size
700KB
-
MD5
f33064f452ca1707152db7e62d9e8d5d
-
SHA1
73ce598b80b3f7d99790d2e396736be36c7ff0a6
-
SHA256
524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad
-
SHA512
9d9360a32e1cba90d4e9b34efe66204a7f961ca8b583682251563e2e0776cc72009bda8e23daedf3a00839b8ab6d89f79cc1e5872a565de9177ab397674d8d32
-
SSDEEP
12288:Wy900Ts35b3gHi0AjqHMQEko/AFLbimF1bFEG2To9w1iVlFjKXyHlwi0hBarce:WyDOhAkwzXmGDwQvgeKiaWh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35401221.exe -
Executes dropped EXE 4 IoCs
pid Process 3360 un859022.exe 5060 35401221.exe 2104 rk248349.exe 800 si659627.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35401221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35401221.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un859022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un859022.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4540 5060 WerFault.exe 81 4300 2104 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5060 35401221.exe 5060 35401221.exe 2104 rk248349.exe 2104 rk248349.exe 800 si659627.exe 800 si659627.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5060 35401221.exe Token: SeDebugPrivilege 2104 rk248349.exe Token: SeDebugPrivilege 800 si659627.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3360 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 80 PID 2340 wrote to memory of 3360 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 80 PID 2340 wrote to memory of 3360 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 80 PID 3360 wrote to memory of 5060 3360 un859022.exe 81 PID 3360 wrote to memory of 5060 3360 un859022.exe 81 PID 3360 wrote to memory of 5060 3360 un859022.exe 81 PID 3360 wrote to memory of 2104 3360 un859022.exe 87 PID 3360 wrote to memory of 2104 3360 un859022.exe 87 PID 3360 wrote to memory of 2104 3360 un859022.exe 87 PID 2340 wrote to memory of 800 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 90 PID 2340 wrote to memory of 800 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 90 PID 2340 wrote to memory of 800 2340 524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe"C:\Users\Admin\AppData\Local\Temp\524eb297a946c6302fceb09df13422980d34e794607c24fa1d8fcd320b61e8ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35401221.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 10804⤵
- Program crash
PID:4540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk248349.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 20324⤵
- Program crash
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659627.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5060 -ip 50601⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2104 -ip 21041⤵PID:2596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
546KB
MD50ce7fb123f32298494b8f5eaf746b894
SHA1dcce487845cc4c2d5cc2c6282503010677b32cda
SHA2560cbae64bbba56aac8f3f98032084df1bf1af85cc0c2da7dc5693f2ce7c4e9e45
SHA512e01e101d93e75589456e280bc807def195c89b4983863ebf9a604b8ae41e09232513a2f4a7072d1d20b3b80561bf2bbcda02939a56d3c922f386af7b1239de89
-
Filesize
546KB
MD50ce7fb123f32298494b8f5eaf746b894
SHA1dcce487845cc4c2d5cc2c6282503010677b32cda
SHA2560cbae64bbba56aac8f3f98032084df1bf1af85cc0c2da7dc5693f2ce7c4e9e45
SHA512e01e101d93e75589456e280bc807def195c89b4983863ebf9a604b8ae41e09232513a2f4a7072d1d20b3b80561bf2bbcda02939a56d3c922f386af7b1239de89
-
Filesize
269KB
MD5376e331e60ca40e88ff1ef7066415c1c
SHA1865f3bad4e12c19a1a9efeb6b648255622d7faa3
SHA25624a3d84578b358466e43a3d1fd6b60a9a2e513e46b7d505fdec18fe1572ba51b
SHA512bef55974e780733fae1de49f1b6b540c873fdd724f41cc1093849a7e3c4366c92aa6dd9d17b386d46fc0a7c08d3b3fb5b7ef36bb34cf80683fe65de3e4335597
-
Filesize
269KB
MD5376e331e60ca40e88ff1ef7066415c1c
SHA1865f3bad4e12c19a1a9efeb6b648255622d7faa3
SHA25624a3d84578b358466e43a3d1fd6b60a9a2e513e46b7d505fdec18fe1572ba51b
SHA512bef55974e780733fae1de49f1b6b540c873fdd724f41cc1093849a7e3c4366c92aa6dd9d17b386d46fc0a7c08d3b3fb5b7ef36bb34cf80683fe65de3e4335597
-
Filesize
353KB
MD539b9579763de8ad85c529127ea1bb05b
SHA165cfe3677a5ff61e7e8e003acf92aa9d3acadfc8
SHA25627fdd572c95c5c847aa0c467d3205bbe4179d4ded3f9d6443357ce53f79b3eb2
SHA512580df5d67191c15139c04f87249f11ed5a3a5ab56826b394e92093100acae38840799d3a4137b6828c5637ac9a796df30055307a34070f19fb1793df14b22d29
-
Filesize
353KB
MD539b9579763de8ad85c529127ea1bb05b
SHA165cfe3677a5ff61e7e8e003acf92aa9d3acadfc8
SHA25627fdd572c95c5c847aa0c467d3205bbe4179d4ded3f9d6443357ce53f79b3eb2
SHA512580df5d67191c15139c04f87249f11ed5a3a5ab56826b394e92093100acae38840799d3a4137b6828c5637ac9a796df30055307a34070f19fb1793df14b22d29