Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 19:59
Static task
static1
General
-
Target
a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe
-
Size
695KB
-
MD5
a25f21b400b2c63dac88c739b609429a
-
SHA1
762d7636a1921eba03bc88f26262531a69c420e6
-
SHA256
a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698
-
SHA512
cff0bd20ceda965664dc951904d05b6047b1cc31cea31ec799c490e0a171e5f5bacc07ee506878e4fd6df5727c6ade57e0710c95501913dcb2e1d041358b977f
-
SSDEEP
12288:ly90WwSd+CyPYo9JSG42gQq/V22bpX9wQzy6LUimIB1gJs:lyqq+CDkAGzqdXptwQrDT
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 17177740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 17177740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 17177740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 17177740.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 17177740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 17177740.exe -
Executes dropped EXE 4 IoCs
pid Process 4820 un784128.exe 4792 17177740.exe 1072 rk657745.exe 2404 si008378.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 17177740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 17177740.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un784128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un784128.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2932 4792 WerFault.exe 84 1652 1072 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4792 17177740.exe 4792 17177740.exe 1072 rk657745.exe 1072 rk657745.exe 2404 si008378.exe 2404 si008378.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4792 17177740.exe Token: SeDebugPrivilege 1072 rk657745.exe Token: SeDebugPrivilege 2404 si008378.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4820 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 83 PID 4944 wrote to memory of 4820 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 83 PID 4944 wrote to memory of 4820 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 83 PID 4820 wrote to memory of 4792 4820 un784128.exe 84 PID 4820 wrote to memory of 4792 4820 un784128.exe 84 PID 4820 wrote to memory of 4792 4820 un784128.exe 84 PID 4820 wrote to memory of 1072 4820 un784128.exe 88 PID 4820 wrote to memory of 1072 4820 un784128.exe 88 PID 4820 wrote to memory of 1072 4820 un784128.exe 88 PID 4944 wrote to memory of 2404 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 91 PID 4944 wrote to memory of 2404 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 91 PID 4944 wrote to memory of 2404 4944 a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe"C:\Users\Admin\AppData\Local\Temp\a7421aaa0eb4b35b1bd5a858c4747b8e18978c68af6976555846813bb7961698.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784128.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17177740.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10804⤵
- Program crash
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657745.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 20444⤵
- Program crash
PID:1652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si008378.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4792 -ip 47921⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 10721⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
541KB
MD5a72f34246a272a82e15237dffd5bbbfb
SHA1dd63b9775e6694f1221c7dfc1d4a17d9ef639fde
SHA2569a580a7fb1527b14819a397adbee33be68b208e0e710466979a18a3208d79ee4
SHA512d92469dd4354be32e00904db8419904264f8b388534a455f8f7675302d750dd795f6b34f6aaba91530ed5af16a9676d6cb69efe485eb1c5524805541f13475b2
-
Filesize
541KB
MD5a72f34246a272a82e15237dffd5bbbfb
SHA1dd63b9775e6694f1221c7dfc1d4a17d9ef639fde
SHA2569a580a7fb1527b14819a397adbee33be68b208e0e710466979a18a3208d79ee4
SHA512d92469dd4354be32e00904db8419904264f8b388534a455f8f7675302d750dd795f6b34f6aaba91530ed5af16a9676d6cb69efe485eb1c5524805541f13475b2
-
Filesize
258KB
MD5d1486d6edfcf705b3ee198a580f575e6
SHA18b779a76ce9ce7a3ce8e9b371ea06ae93dc78bcf
SHA25689bb127bae4c0ea466d938cdc8ba21765912cf36f194b4b55bee6a9dad8db3c7
SHA5121c5c3bc1eaf12e8134e7224c05669d6bd012e0b3e3544991c23769c455482730b36e33f0986c8a55599674f6245fe6a536c13e5392b1f8339e84926fbf937a61
-
Filesize
258KB
MD5d1486d6edfcf705b3ee198a580f575e6
SHA18b779a76ce9ce7a3ce8e9b371ea06ae93dc78bcf
SHA25689bb127bae4c0ea466d938cdc8ba21765912cf36f194b4b55bee6a9dad8db3c7
SHA5121c5c3bc1eaf12e8134e7224c05669d6bd012e0b3e3544991c23769c455482730b36e33f0986c8a55599674f6245fe6a536c13e5392b1f8339e84926fbf937a61
-
Filesize
340KB
MD5d0fc95e8f372bb49719b78b4b184e58c
SHA1ce2b859d13e7dabf0b24de48648eb9400396c743
SHA256354a47f16ec0cfa85dbc5ce751b61a1cc80e0e096e6ef34c0ae4d38e9b811657
SHA512402e5cc2ae19c52425b9f6ee10914e0c60b19c8cdde41b33d5822bcbd2fde8b66ac6b6d43db67dedaadebb75237ffc35db93072a6a4b38aceb7ec5d4804a633b
-
Filesize
340KB
MD5d0fc95e8f372bb49719b78b4b184e58c
SHA1ce2b859d13e7dabf0b24de48648eb9400396c743
SHA256354a47f16ec0cfa85dbc5ce751b61a1cc80e0e096e6ef34c0ae4d38e9b811657
SHA512402e5cc2ae19c52425b9f6ee10914e0c60b19c8cdde41b33d5822bcbd2fde8b66ac6b6d43db67dedaadebb75237ffc35db93072a6a4b38aceb7ec5d4804a633b