Analysis
-
max time kernel
54s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 08:49
Static task
static1
General
-
Target
e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe
-
Size
699KB
-
MD5
26b1ec85d1d93aa58a79ea545130d949
-
SHA1
d378387d414a27a9f6e220bf202761d7ed22170d
-
SHA256
e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e
-
SHA512
4e7cfccc652e4445cf6705205c2056c33dbf7eee5a043f61d8c491eb3783e3c23bc03cfd6d67aab0c51440f97166e8bc9317b107415e2ea7fcd4c4f5f3bd5289
-
SSDEEP
12288:py90htgNBRtIoj18GVWZ+kF/Bddn8yKvGbo25sjRSm2IzNDae8:pyp5tY9+kdn8yJbsjRSm2MNe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 76890483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 76890483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 76890483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 76890483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 76890483.exe -
Executes dropped EXE 4 IoCs
pid Process 3952 un347594.exe 3860 76890483.exe 2168 rk925331.exe 5080 si377547.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 76890483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 76890483.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un347594.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un347594.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3860 76890483.exe 3860 76890483.exe 2168 rk925331.exe 2168 rk925331.exe 5080 si377547.exe 5080 si377547.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3860 76890483.exe Token: SeDebugPrivilege 2168 rk925331.exe Token: SeDebugPrivilege 5080 si377547.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3952 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 66 PID 2208 wrote to memory of 3952 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 66 PID 2208 wrote to memory of 3952 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 66 PID 3952 wrote to memory of 3860 3952 un347594.exe 67 PID 3952 wrote to memory of 3860 3952 un347594.exe 67 PID 3952 wrote to memory of 3860 3952 un347594.exe 67 PID 3952 wrote to memory of 2168 3952 un347594.exe 68 PID 3952 wrote to memory of 2168 3952 un347594.exe 68 PID 3952 wrote to memory of 2168 3952 un347594.exe 68 PID 2208 wrote to memory of 5080 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 70 PID 2208 wrote to memory of 5080 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 70 PID 2208 wrote to memory of 5080 2208 e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe"C:\Users\Admin\AppData\Local\Temp\e0b3fa178b93e8e9ce74b0b0eb94e6aedeb803ec72a2f1fe26f9979fa4a46a5e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347594.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un347594.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76890483.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76890483.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk925331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk925331.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si377547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si377547.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
545KB
MD5e6be8771e324d5aed46883d23e21201a
SHA1c7ebfb00817fa3c5349249b3ed5248c07643fcc5
SHA256fe41ac952cda3d2bc068d4a790e31105c725cad233d941ddce2206d7881e4350
SHA5120219109915febb24839210d2f830aa19d186740eb4ad069a91ab6c26bbc3f972466c961907371c56a04afe8e67d1452c92c1c14a7f326fafa9d99e3beafa6985
-
Filesize
545KB
MD5e6be8771e324d5aed46883d23e21201a
SHA1c7ebfb00817fa3c5349249b3ed5248c07643fcc5
SHA256fe41ac952cda3d2bc068d4a790e31105c725cad233d941ddce2206d7881e4350
SHA5120219109915febb24839210d2f830aa19d186740eb4ad069a91ab6c26bbc3f972466c961907371c56a04afe8e67d1452c92c1c14a7f326fafa9d99e3beafa6985
-
Filesize
269KB
MD55c73f551ec6665d8773ff63d1465e4ae
SHA17990ab98165663deffafe0e31d57eb039b0cb463
SHA2566d4cacf2b39b3cb2117e0b0fd39f7f6a6904f5e32452ee68f743da97485eaaec
SHA512cb340068349ccb4bc814a746e838eeb62b6fd2ac154301e63c84a09f8d1586be052e6e0b70ae5a0c51f74d330beae467312da8b2d95554c8b37875842521c46d
-
Filesize
269KB
MD55c73f551ec6665d8773ff63d1465e4ae
SHA17990ab98165663deffafe0e31d57eb039b0cb463
SHA2566d4cacf2b39b3cb2117e0b0fd39f7f6a6904f5e32452ee68f743da97485eaaec
SHA512cb340068349ccb4bc814a746e838eeb62b6fd2ac154301e63c84a09f8d1586be052e6e0b70ae5a0c51f74d330beae467312da8b2d95554c8b37875842521c46d
-
Filesize
353KB
MD5988edc3d13083122b79409a8742cc07b
SHA1f88e2f65339a078805dc805e139f1fc69713a3c7
SHA25636b670141e800c51550741b58f871ee42bff05bcb4db218ffb7bf454a7f04b55
SHA5124108939499a68855ddb5e23988030831b790a081c58c539bb518b1bbf5e7a8a4fb23f70e4ca7946e8763aa4eee744fe45037bd15eea20f9c3946e9a434347c4a
-
Filesize
353KB
MD5988edc3d13083122b79409a8742cc07b
SHA1f88e2f65339a078805dc805e139f1fc69713a3c7
SHA25636b670141e800c51550741b58f871ee42bff05bcb4db218ffb7bf454a7f04b55
SHA5124108939499a68855ddb5e23988030831b790a081c58c539bb518b1bbf5e7a8a4fb23f70e4ca7946e8763aa4eee744fe45037bd15eea20f9c3946e9a434347c4a