Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 14:04
Static task
static1
General
-
Target
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
-
Size
695KB
-
MD5
d45f82b98272f1cedb01c2faf5a6de4f
-
SHA1
6ca6384694b516fe144ea4991952acf8f4910b7b
-
SHA256
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840
-
SHA512
1e497c4547ef13875513d06d734ab7ea1d7cae6dac11abe6d78018c8096c7be0814e7d675cdbdc0bd1110969a166d9baa16ae89b0b3cdba69e6dc7cc114881e2
-
SSDEEP
12288:py90Z9lRphVbwhekrNN2Yl9jA6rwTwa6F3VGmUL5vleu2Kh+T1ZgKs:pyYlAheUNNPl9j5ZVGmUzWKh+T1s
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 94557299.exe -
Executes dropped EXE 4 IoCs
pid Process 3708 un738904.exe 4128 94557299.exe 3940 rk697725.exe 1768 si221597.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 94557299.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un738904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un738904.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4128 94557299.exe 4128 94557299.exe 3940 rk697725.exe 3940 rk697725.exe 1768 si221597.exe 1768 si221597.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4128 94557299.exe Token: SeDebugPrivilege 3940 rk697725.exe Token: SeDebugPrivilege 1768 si221597.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3708 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 66 PID 3724 wrote to memory of 3708 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 66 PID 3724 wrote to memory of 3708 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 66 PID 3708 wrote to memory of 4128 3708 un738904.exe 67 PID 3708 wrote to memory of 4128 3708 un738904.exe 67 PID 3708 wrote to memory of 4128 3708 un738904.exe 67 PID 3708 wrote to memory of 3940 3708 un738904.exe 68 PID 3708 wrote to memory of 3940 3708 un738904.exe 68 PID 3708 wrote to memory of 3940 3708 un738904.exe 68 PID 3724 wrote to memory of 1768 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 70 PID 3724 wrote to memory of 1768 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 70 PID 3724 wrote to memory of 1768 3724 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221597.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0