Analysis
-
max time kernel
55s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 12:20
Static task
static1
General
-
Target
966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe
-
Size
696KB
-
MD5
96842a3dd27d06b66f1575bca986b743
-
SHA1
d05681403fe79b745a9e2b02162be301c9e1bed5
-
SHA256
966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8
-
SHA512
f547c20aaeb2f1667d661b85c1736d9a28a921f1b251a0262641a64ec3090f93412b8add22cf6cbca94927d421a6a6357efce248889ddcb5e0845e7c8b873875
-
SSDEEP
12288:9y90VtjHvNjo2Kgdx8e6oBYgv+Gvr5nRHZ1FNU45zykkxeCiD0Oqhk7:9yGNjoWQe6oTGIR51FNf5zykKeCiD0Jq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 73631392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 73631392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 73631392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 73631392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 73631392.exe -
Executes dropped EXE 4 IoCs
pid Process 3048 un890657.exe 4656 73631392.exe 4344 rk299972.exe 2556 si703518.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 73631392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 73631392.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un890657.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un890657.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4656 73631392.exe 4656 73631392.exe 4344 rk299972.exe 4344 rk299972.exe 2556 si703518.exe 2556 si703518.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4656 73631392.exe Token: SeDebugPrivilege 4344 rk299972.exe Token: SeDebugPrivilege 2556 si703518.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3048 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 66 PID 3704 wrote to memory of 3048 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 66 PID 3704 wrote to memory of 3048 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 66 PID 3048 wrote to memory of 4656 3048 un890657.exe 67 PID 3048 wrote to memory of 4656 3048 un890657.exe 67 PID 3048 wrote to memory of 4656 3048 un890657.exe 67 PID 3048 wrote to memory of 4344 3048 un890657.exe 68 PID 3048 wrote to memory of 4344 3048 un890657.exe 68 PID 3048 wrote to memory of 4344 3048 un890657.exe 68 PID 3704 wrote to memory of 2556 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 70 PID 3704 wrote to memory of 2556 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 70 PID 3704 wrote to memory of 2556 3704 966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe"C:\Users\Admin\AppData\Local\Temp\966df9aa6aeb18a0f7ad198f6140c88d186f9206876efb1f7fbdb10f4934e7a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890657.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73631392.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk299972.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703518.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
542KB
MD569f965729346408079e8cfbe1606f9b7
SHA131abd8de5742d7bd4bfab0a894a97323a3460068
SHA2563b22097a521811ea5054a0ad240c1956ce072d696b96537fa0c939b6dc8f6151
SHA5123b5fc3ad7a53bfdfaa206284ecf0e811fbf98d612cd660c553bda28c146c197f2fd020d7e45760df7aa2f3feba63365999472ca22907b9dd32ff04625aafbf9c
-
Filesize
542KB
MD569f965729346408079e8cfbe1606f9b7
SHA131abd8de5742d7bd4bfab0a894a97323a3460068
SHA2563b22097a521811ea5054a0ad240c1956ce072d696b96537fa0c939b6dc8f6151
SHA5123b5fc3ad7a53bfdfaa206284ecf0e811fbf98d612cd660c553bda28c146c197f2fd020d7e45760df7aa2f3feba63365999472ca22907b9dd32ff04625aafbf9c
-
Filesize
258KB
MD59389fc466503b7936bb11cf94aa87c13
SHA15c19ee1a83f67b7e7dd2a517012c87697a78ae8f
SHA256375192532fea2de9a5b0c19474740881cda1dc513dd006bcbb3943e5ca7b5e58
SHA512e161b31631586a3d341227ead86dbace85c688ed169f9f55d36a23cf4f8da094381a3afe24443c87dc95dc1b1904b8252e27c03937d18a899c46dfc45412e3e7
-
Filesize
258KB
MD59389fc466503b7936bb11cf94aa87c13
SHA15c19ee1a83f67b7e7dd2a517012c87697a78ae8f
SHA256375192532fea2de9a5b0c19474740881cda1dc513dd006bcbb3943e5ca7b5e58
SHA512e161b31631586a3d341227ead86dbace85c688ed169f9f55d36a23cf4f8da094381a3afe24443c87dc95dc1b1904b8252e27c03937d18a899c46dfc45412e3e7
-
Filesize
340KB
MD5555bbdfe5adb09ad59da1d183becabc3
SHA1a8f309a80bac831885404c9e73b8517e78b98856
SHA25621597f37e9e7bd4c0b1c632d189ac365249bfb4a99da2be5d73da4674017072c
SHA512fe18e7b5cc43653d3bdee564f0e4ea232522e14a2651b43309a6ce67dd79f956055182bb031c90d0f354f5dc736d696f3930527cda989f53cdce420ee9efc990
-
Filesize
340KB
MD5555bbdfe5adb09ad59da1d183becabc3
SHA1a8f309a80bac831885404c9e73b8517e78b98856
SHA25621597f37e9e7bd4c0b1c632d189ac365249bfb4a99da2be5d73da4674017072c
SHA512fe18e7b5cc43653d3bdee564f0e4ea232522e14a2651b43309a6ce67dd79f956055182bb031c90d0f354f5dc736d696f3930527cda989f53cdce420ee9efc990