Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 01:44
Static task
static1
General
-
Target
abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe
-
Size
694KB
-
MD5
d81473979e22d358b7a79f8bf54d91e3
-
SHA1
3048d4d84aa7e40264e96f586e4947b3d924ea72
-
SHA256
abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb
-
SHA512
fe846eef96ea8e237888dbf92890bfb49f06b6685cf025548bf55e8d2ab62b64f6614c3db1053aacf00793309101c9d129e0288e02782061aa01c5d0e18319a4
-
SSDEEP
12288:Ly90IhL9kkK/w6ehFT4j6Zob4AmWj6FR18b2KVA+YijY/:Lyj5MqF+6ZYD6FR18b2Gfc/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 19242137.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 19242137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 19242137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 19242137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 19242137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 19242137.exe -
Executes dropped EXE 4 IoCs
pid Process 1592 un458969.exe 4568 19242137.exe 3328 rk649592.exe 2116 si717448.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 19242137.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 19242137.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un458969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un458969.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4768 4568 WerFault.exe 84 2272 3328 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4568 19242137.exe 4568 19242137.exe 3328 rk649592.exe 3328 rk649592.exe 2116 si717448.exe 2116 si717448.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4568 19242137.exe Token: SeDebugPrivilege 3328 rk649592.exe Token: SeDebugPrivilege 2116 si717448.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1592 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 83 PID 3384 wrote to memory of 1592 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 83 PID 3384 wrote to memory of 1592 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 83 PID 1592 wrote to memory of 4568 1592 un458969.exe 84 PID 1592 wrote to memory of 4568 1592 un458969.exe 84 PID 1592 wrote to memory of 4568 1592 un458969.exe 84 PID 1592 wrote to memory of 3328 1592 un458969.exe 90 PID 1592 wrote to memory of 3328 1592 un458969.exe 90 PID 1592 wrote to memory of 3328 1592 un458969.exe 90 PID 3384 wrote to memory of 2116 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 93 PID 3384 wrote to memory of 2116 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 93 PID 3384 wrote to memory of 2116 3384 abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe"C:\Users\Admin\AppData\Local\Temp\abd8d59ac0e6dd75cc43d61ad2b044e52f5d31b01f2cf636519c4bdb6c2ba8cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un458969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\19242137.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 10764⤵
- Program crash
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk649592.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 17524⤵
- Program crash
PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717448.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4568 -ip 45681⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3328 -ip 33281⤵PID:4596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
540KB
MD524293cb394b9bd11958cdc51e0574621
SHA148cb4168a76d6c4b36b28f959e62f04b18a122b7
SHA256893cdc84f9321ad6a5e6f1c3c7f545797bdea1cd7dc59a6c0364f35e53360d0e
SHA5124a765ca440d8a7a45ecb78fa3bf41012c9a057464bf51f58d65bc7641e871378343620ca1a1869144bc807b829636b0ef195df3be421441b908e0634358fac88
-
Filesize
540KB
MD524293cb394b9bd11958cdc51e0574621
SHA148cb4168a76d6c4b36b28f959e62f04b18a122b7
SHA256893cdc84f9321ad6a5e6f1c3c7f545797bdea1cd7dc59a6c0364f35e53360d0e
SHA5124a765ca440d8a7a45ecb78fa3bf41012c9a057464bf51f58d65bc7641e871378343620ca1a1869144bc807b829636b0ef195df3be421441b908e0634358fac88
-
Filesize
258KB
MD5d8e81a62ffa004ba7d04a2351727aca9
SHA185c6f2568b082a1a96967a69fde1b3d45426f2bc
SHA256cd5629c86ae774540e9fb75dec0c4766fd9502e7d1b5e90926aff2b9f0afd6c0
SHA512406b5e8f84b86342ee4a5379b916e7a8dd8da045b69782e728310c2e6bf32062a0197eca00b6b06259273448adff3cf8497c415e70f567ed09c6f86d5dd8315f
-
Filesize
258KB
MD5d8e81a62ffa004ba7d04a2351727aca9
SHA185c6f2568b082a1a96967a69fde1b3d45426f2bc
SHA256cd5629c86ae774540e9fb75dec0c4766fd9502e7d1b5e90926aff2b9f0afd6c0
SHA512406b5e8f84b86342ee4a5379b916e7a8dd8da045b69782e728310c2e6bf32062a0197eca00b6b06259273448adff3cf8497c415e70f567ed09c6f86d5dd8315f
-
Filesize
340KB
MD58d889b5d14176ee1cdfb8e78ea05d99b
SHA15b26e15b1ebb6283c1021e0c47373635f70a1708
SHA2567c41732fefd627fa922360bcf925ab2ff43ea549568544e39cb7595feb40bc19
SHA5126c7aaa8e0046b898af0dc46b4432c65c974da76886cba7eee509810995529284d59b499963a7ccadb9ece121629f62cc0ba48ae5636fdf13e00617da81b3020e
-
Filesize
340KB
MD58d889b5d14176ee1cdfb8e78ea05d99b
SHA15b26e15b1ebb6283c1021e0c47373635f70a1708
SHA2567c41732fefd627fa922360bcf925ab2ff43ea549568544e39cb7595feb40bc19
SHA5126c7aaa8e0046b898af0dc46b4432c65c974da76886cba7eee509810995529284d59b499963a7ccadb9ece121629f62cc0ba48ae5636fdf13e00617da81b3020e