Analysis
-
max time kernel
56s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 15:22
Static task
static1
General
-
Target
f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe
-
Size
694KB
-
MD5
1685867c49f4297824a52c3b3b8d694b
-
SHA1
7604869abc776b8893d81653f9bc4b429d15db54
-
SHA256
f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f
-
SHA512
b3d081dc1f6fca9f791ea37a52afc03a0accaf4babfe4d83569f8d44be1e6f6f782aaf5b9c23ff3de78de407dd38cac312054987f4c01074edd5a0f9a7e806ed
-
SSDEEP
12288:vy90Uy2u2BM8x/Fwyxx9gvxNr8tSMRNRHcsFADeINJUNU0ttSHiYEeZWtrXal6wB:vylu2BM8DlPgvxZ8t5BX1GiGA9Xa4wmG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11991049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11991049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11991049.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 11991049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11991049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11991049.exe -
Executes dropped EXE 4 IoCs
pid Process 3136 un223430.exe 4832 11991049.exe 3120 rk720894.exe 4464 si552657.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 11991049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11991049.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un223430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un223430.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4760 4832 WerFault.exe 84 3652 3120 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4832 11991049.exe 4832 11991049.exe 3120 rk720894.exe 3120 rk720894.exe 4464 si552657.exe 4464 si552657.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4832 11991049.exe Token: SeDebugPrivilege 3120 rk720894.exe Token: SeDebugPrivilege 4464 si552657.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4980 wrote to memory of 3136 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 83 PID 4980 wrote to memory of 3136 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 83 PID 4980 wrote to memory of 3136 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 83 PID 3136 wrote to memory of 4832 3136 un223430.exe 84 PID 3136 wrote to memory of 4832 3136 un223430.exe 84 PID 3136 wrote to memory of 4832 3136 un223430.exe 84 PID 3136 wrote to memory of 3120 3136 un223430.exe 90 PID 3136 wrote to memory of 3120 3136 un223430.exe 90 PID 3136 wrote to memory of 3120 3136 un223430.exe 90 PID 4980 wrote to memory of 4464 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 93 PID 4980 wrote to memory of 4464 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 93 PID 4980 wrote to memory of 4464 4980 f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe"C:\Users\Admin\AppData\Local\Temp\f4187768328407d3e25626e36f753e2a9aac0f50f6dec19e53fe5c0654f9fa9f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un223430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un223430.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11991049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11991049.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 10884⤵
- Program crash
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk720894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk720894.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 15924⤵
- Program crash
PID:3652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552657.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552657.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4832 -ip 48321⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3120 -ip 31201⤵PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD554037569865732bec052ef86246d34ac
SHA1059a620ee4eb141ee48a997813feb872269b7d5e
SHA256fdf0cb4fa99ca04a4915b09f697afe8be409cb850524facc993f4d52aae393bd
SHA512e25b1e640a0f7282ee72a329cc52c3f46f530b7f88e130524ca7fc39bee00108fae1bc096dc58c762b8e6bfdda12d99df8fec0c41c262a1509274e22c69e89a2
-
Filesize
540KB
MD554037569865732bec052ef86246d34ac
SHA1059a620ee4eb141ee48a997813feb872269b7d5e
SHA256fdf0cb4fa99ca04a4915b09f697afe8be409cb850524facc993f4d52aae393bd
SHA512e25b1e640a0f7282ee72a329cc52c3f46f530b7f88e130524ca7fc39bee00108fae1bc096dc58c762b8e6bfdda12d99df8fec0c41c262a1509274e22c69e89a2
-
Filesize
258KB
MD535f28c39376dc10c73039c67d96ca95b
SHA1db5b3b126e550e55b60c08df89db5b2788bf9ae2
SHA256fcfba5db2e14d3533cc1c50d6eeac0eb4c409c786e90ddc4b7c14e8bfd4e9706
SHA512d0db24d4884cfb0ac6ae2e855128900bdd46117ef198f87ffc06c4c74a77fb5c4f88237dbc7ab3dcf710cc69985aac832cb51073b6381ca73a23e485cd144a43
-
Filesize
258KB
MD535f28c39376dc10c73039c67d96ca95b
SHA1db5b3b126e550e55b60c08df89db5b2788bf9ae2
SHA256fcfba5db2e14d3533cc1c50d6eeac0eb4c409c786e90ddc4b7c14e8bfd4e9706
SHA512d0db24d4884cfb0ac6ae2e855128900bdd46117ef198f87ffc06c4c74a77fb5c4f88237dbc7ab3dcf710cc69985aac832cb51073b6381ca73a23e485cd144a43
-
Filesize
340KB
MD543daf731bb51ec7b4efedb12340f57b2
SHA1699348ea6a1bfee13fd2b124c8711a6e156a3f9f
SHA256eaf9efaa4e76417a7dbfee36131168d964dc84065988128cdc8b7dc6a30d23d8
SHA512f54e422c23a3afcdbcccdd4054ac6952841a54e3b706e69a65bbf3bb01ed035a9332865cfa993255a98bebe89705493a15839dd44c148a22b067e41a7ada4101
-
Filesize
340KB
MD543daf731bb51ec7b4efedb12340f57b2
SHA1699348ea6a1bfee13fd2b124c8711a6e156a3f9f
SHA256eaf9efaa4e76417a7dbfee36131168d964dc84065988128cdc8b7dc6a30d23d8
SHA512f54e422c23a3afcdbcccdd4054ac6952841a54e3b706e69a65bbf3bb01ed035a9332865cfa993255a98bebe89705493a15839dd44c148a22b067e41a7ada4101