Analysis
-
max time kernel
51s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 08:43
Static task
static1
General
-
Target
50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe
-
Size
701KB
-
MD5
6e0a6e835f80fab23a473cddc94da91d
-
SHA1
677e2f05fdb36c66b1f099710691a0628e22c7e1
-
SHA256
50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f
-
SHA512
7b80625cf093717960782b32d617c987dc0f070654253de477cab5b5c1927a49c94bae230ad2f85257feee62feb4853ff42509d69461a73365b0f8efef0a459a
-
SSDEEP
12288:4y90NLNjhbui1qwt5SAfwdHn20cq2nK87R7AGZK/h1wR/BS5NI7jWD/:4yWVbhCAkHn2dlK87DI1wR/BS03W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77368012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77368012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77368012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77368012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77368012.exe -
Executes dropped EXE 4 IoCs
pid Process 5048 un145018.exe 3560 77368012.exe 3532 rk323951.exe 3692 si561408.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77368012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77368012.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un145018.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un145018.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3560 77368012.exe 3560 77368012.exe 3532 rk323951.exe 3532 rk323951.exe 3692 si561408.exe 3692 si561408.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3560 77368012.exe Token: SeDebugPrivilege 3532 rk323951.exe Token: SeDebugPrivilege 3692 si561408.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5048 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 66 PID 4452 wrote to memory of 5048 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 66 PID 4452 wrote to memory of 5048 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 66 PID 5048 wrote to memory of 3560 5048 un145018.exe 67 PID 5048 wrote to memory of 3560 5048 un145018.exe 67 PID 5048 wrote to memory of 3560 5048 un145018.exe 67 PID 5048 wrote to memory of 3532 5048 un145018.exe 68 PID 5048 wrote to memory of 3532 5048 un145018.exe 68 PID 5048 wrote to memory of 3532 5048 un145018.exe 68 PID 4452 wrote to memory of 3692 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 70 PID 4452 wrote to memory of 3692 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 70 PID 4452 wrote to memory of 3692 4452 50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe"C:\Users\Admin\AppData\Local\Temp\50eb86c5029c4d5eaa59a7d3c0000e2decaff81538026d11084276600a074c9f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145018.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77368012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77368012.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk323951.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk323951.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561408.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561408.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
547KB
MD5ae9c96930e4c4d571060b7ca5e774245
SHA14c8a299f0aaf2a53fdd3341667f4c4c0e91af9b8
SHA256d21dc2988f6f546c9ab572041f5a5d008d385c61d454fd2cfaec50cc3b044bff
SHA5127a2722341877905b8ce77ba6a56b53a8ade7f1ce18cf7c2d97d9a473c9db8a9bbe1cd0da29448cb2c2edde7236d330b8905a588846cd731cbce410aee192c7db
-
Filesize
547KB
MD5ae9c96930e4c4d571060b7ca5e774245
SHA14c8a299f0aaf2a53fdd3341667f4c4c0e91af9b8
SHA256d21dc2988f6f546c9ab572041f5a5d008d385c61d454fd2cfaec50cc3b044bff
SHA5127a2722341877905b8ce77ba6a56b53a8ade7f1ce18cf7c2d97d9a473c9db8a9bbe1cd0da29448cb2c2edde7236d330b8905a588846cd731cbce410aee192c7db
-
Filesize
269KB
MD5c44f20a45c59f6cc14109ee14b1db7ac
SHA1a0b2e2bcb8487cdc9c0bcbc51c8456dea931cf8d
SHA256afe921285bfc5d38bd7c0b77168bce08022e26b8a0811997f99f80da4a744c27
SHA51227806ec92f2cd236c0adffad415c337465f1352270ef5e930ea9d6b59ada19805d4fc09445d1ba9481fa6bf54e9bdcc29f32618284294815b9cf1f006cd44d57
-
Filesize
269KB
MD5c44f20a45c59f6cc14109ee14b1db7ac
SHA1a0b2e2bcb8487cdc9c0bcbc51c8456dea931cf8d
SHA256afe921285bfc5d38bd7c0b77168bce08022e26b8a0811997f99f80da4a744c27
SHA51227806ec92f2cd236c0adffad415c337465f1352270ef5e930ea9d6b59ada19805d4fc09445d1ba9481fa6bf54e9bdcc29f32618284294815b9cf1f006cd44d57
-
Filesize
353KB
MD5c8edbdc486f29ba420d1cf4ee0255980
SHA118b175cca2296ac8f86c4dca8e1d2baa574a73e1
SHA2561b9618c10ded402f8efc7bed6441dad8c5ab3f43206a603df979379718cd690f
SHA51237fc969a8a01e85b035c1610a5ac8c854bf3b47656e140153dfe5e13b04216446a3ef6ac042cae30da650e0ce2b8d318f6f078b5916ac2b5a33cd6e704a07ba2
-
Filesize
353KB
MD5c8edbdc486f29ba420d1cf4ee0255980
SHA118b175cca2296ac8f86c4dca8e1d2baa574a73e1
SHA2561b9618c10ded402f8efc7bed6441dad8c5ab3f43206a603df979379718cd690f
SHA51237fc969a8a01e85b035c1610a5ac8c854bf3b47656e140153dfe5e13b04216446a3ef6ac042cae30da650e0ce2b8d318f6f078b5916ac2b5a33cd6e704a07ba2