Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 13:10
Static task
static1
General
-
Target
ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe
-
Size
694KB
-
MD5
d7d159afb2c4d6e507ce4f6a906bc63d
-
SHA1
99939613a7317775088a7af56c408fd9b12f1535
-
SHA256
ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984
-
SHA512
a3ba241616bc84760ac0c36575f3041669f85843c0e9827487344895c4e8bbe3ba440480e96862b4c6ea95784adf97f44a66f6a4a90ff96d97229f38d9459d4f
-
SSDEEP
12288:Qy90LUvx33SvsqOhgMv2ootaQkeS/AsJtbXwUn5vleu2KivgrW:QylvxyvlKgMvvoU7jbXwU3WKiv/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 45025868.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 45025868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 45025868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 45025868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 45025868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 45025868.exe -
Executes dropped EXE 4 IoCs
pid Process 4160 un389176.exe 4260 45025868.exe 3852 rk537005.exe 3928 si681973.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 45025868.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 45025868.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un389176.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un389176.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2372 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4908 4260 WerFault.exe 85 2284 3852 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4260 45025868.exe 4260 45025868.exe 3852 rk537005.exe 3852 rk537005.exe 3928 si681973.exe 3928 si681973.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4260 45025868.exe Token: SeDebugPrivilege 3852 rk537005.exe Token: SeDebugPrivilege 3928 si681973.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4160 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 84 PID 2680 wrote to memory of 4160 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 84 PID 2680 wrote to memory of 4160 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 84 PID 4160 wrote to memory of 4260 4160 un389176.exe 85 PID 4160 wrote to memory of 4260 4160 un389176.exe 85 PID 4160 wrote to memory of 4260 4160 un389176.exe 85 PID 4160 wrote to memory of 3852 4160 un389176.exe 91 PID 4160 wrote to memory of 3852 4160 un389176.exe 91 PID 4160 wrote to memory of 3852 4160 un389176.exe 91 PID 2680 wrote to memory of 3928 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 95 PID 2680 wrote to memory of 3928 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 95 PID 2680 wrote to memory of 3928 2680 ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe"C:\Users\Admin\AppData\Local\Temp\ef1928f8c4cdc932de0e93dbae780dada3f68435c668e1a089d9b70d65f42984.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un389176.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un389176.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45025868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45025868.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 10724⤵
- Program crash
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk537005.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk537005.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 18804⤵
- Program crash
PID:2284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681973.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681973.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4260 -ip 42601⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3852 -ip 38521⤵PID:452
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD5392863c25f1826930fa03919e93e10f9
SHA1f741b2e2daca66a4b1adbbf0c1a8998cab4b54e3
SHA2562af4acf2469283f9070545edc4ed919d24ed720e7d3690ac0891e53c3b898a41
SHA512f2ddb7393a79b62a61cfa74588609719af77726000c6d609fd23dc3732c9833cb5903825a134403f33143107082682245055545ec4d1c5a15d716400f2776438
-
Filesize
540KB
MD5392863c25f1826930fa03919e93e10f9
SHA1f741b2e2daca66a4b1adbbf0c1a8998cab4b54e3
SHA2562af4acf2469283f9070545edc4ed919d24ed720e7d3690ac0891e53c3b898a41
SHA512f2ddb7393a79b62a61cfa74588609719af77726000c6d609fd23dc3732c9833cb5903825a134403f33143107082682245055545ec4d1c5a15d716400f2776438
-
Filesize
257KB
MD5227ad85d7fc9e27175c13c75bf2bfd8f
SHA1a3e7f08ab00b9a054fdf04016d1ea446f3b44a21
SHA256045aaa75f96c1bb47c42ad0e20d04eda8e80ff280cbabdd862180593e197fa1a
SHA5127881c560c601c25b44830043fedb78d99db7df60bfc64bb40ab923ea775092c4a945e6576052ae0c1931ca707b3dd7bcd9aac334591288087ad5457cd134e1f3
-
Filesize
257KB
MD5227ad85d7fc9e27175c13c75bf2bfd8f
SHA1a3e7f08ab00b9a054fdf04016d1ea446f3b44a21
SHA256045aaa75f96c1bb47c42ad0e20d04eda8e80ff280cbabdd862180593e197fa1a
SHA5127881c560c601c25b44830043fedb78d99db7df60bfc64bb40ab923ea775092c4a945e6576052ae0c1931ca707b3dd7bcd9aac334591288087ad5457cd134e1f3
-
Filesize
340KB
MD5d51cce90a3ec98840fc04dbd3fd059ec
SHA1c40659fe54a1ef7400320173afdae370a266c908
SHA256f44df98a4085f23a7f4d2746797d613b7a8b4c67c2630d0bd8b6db48c6279385
SHA5129f5095c9d49ad0c726939ca7a44ef80565867ba061b9b3247631a1b024fa07ca4c0dd3d988c475f2152676f7638d7f5704876d546e866cc5dcd4840629d5ed1b
-
Filesize
340KB
MD5d51cce90a3ec98840fc04dbd3fd059ec
SHA1c40659fe54a1ef7400320173afdae370a266c908
SHA256f44df98a4085f23a7f4d2746797d613b7a8b4c67c2630d0bd8b6db48c6279385
SHA5129f5095c9d49ad0c726939ca7a44ef80565867ba061b9b3247631a1b024fa07ca4c0dd3d988c475f2152676f7638d7f5704876d546e866cc5dcd4840629d5ed1b