Analysis
-
max time kernel
53s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/04/2023, 01:15
Static task
static1
General
-
Target
03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe
-
Size
695KB
-
MD5
a0db386e39a52ca79e56fcbfa097ed67
-
SHA1
292473d5f2dba90fb1d2f1ffab1bacc45464a327
-
SHA256
03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c
-
SHA512
9cea08d0faf9662e48b52b2fab5fe1765936f5fe3e56f68cc3416950b38ff2f3b2123105e5576b22dd9ea4239e58754dc79fca20be1b558777ebf8595bb5001f
-
SSDEEP
12288:yy90zdBJehjw/ZC/+tZ9COsJdUIx6bseYOJWw6aL18bpKJA+0O2jRbkzkBN:yyEdBJeN0C/+tXCBqm1UN6aL18bpyWV1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 68298943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 68298943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 68298943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 68298943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 68298943.exe -
Executes dropped EXE 4 IoCs
pid Process 3952 un331109.exe 3860 68298943.exe 2168 rk982072.exe 4980 si927489.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 68298943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 68298943.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un331109.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un331109.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3860 68298943.exe 3860 68298943.exe 2168 rk982072.exe 2168 rk982072.exe 4980 si927489.exe 4980 si927489.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3860 68298943.exe Token: SeDebugPrivilege 2168 rk982072.exe Token: SeDebugPrivilege 4980 si927489.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3952 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 66 PID 4120 wrote to memory of 3952 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 66 PID 4120 wrote to memory of 3952 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 66 PID 3952 wrote to memory of 3860 3952 un331109.exe 67 PID 3952 wrote to memory of 3860 3952 un331109.exe 67 PID 3952 wrote to memory of 3860 3952 un331109.exe 67 PID 3952 wrote to memory of 2168 3952 un331109.exe 68 PID 3952 wrote to memory of 2168 3952 un331109.exe 68 PID 3952 wrote to memory of 2168 3952 un331109.exe 68 PID 4120 wrote to memory of 4980 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 70 PID 4120 wrote to memory of 4980 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 70 PID 4120 wrote to memory of 4980 4120 03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe"C:\Users\Admin\AppData\Local\Temp\03edf397efd997c5bea09b0a97420b69c19d8daca546220581d551dd161d072c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un331109.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68298943.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk982072.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927489.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
541KB
MD5d19151933ab1a64a37084f997f99c14c
SHA1601995d72ef56cffdd1709a573c8495c3849f477
SHA25680ad7705b9c156055494e6b7934e3f6d5c5e6a97ad68d5247cc7ac433f07d554
SHA5122e7a4aa63f3a4fad1ad41bc7c4e179062d0f1609047a06e359e45b8d12701a310d29a509e5dd392fee116d784d56f72c73a266ea3b244a8ffe6be44a8d972a0e
-
Filesize
541KB
MD5d19151933ab1a64a37084f997f99c14c
SHA1601995d72ef56cffdd1709a573c8495c3849f477
SHA25680ad7705b9c156055494e6b7934e3f6d5c5e6a97ad68d5247cc7ac433f07d554
SHA5122e7a4aa63f3a4fad1ad41bc7c4e179062d0f1609047a06e359e45b8d12701a310d29a509e5dd392fee116d784d56f72c73a266ea3b244a8ffe6be44a8d972a0e
-
Filesize
258KB
MD582ecc2b466cbc76241cead0b6d18f2f8
SHA15c989c3d660f0257edd339468ea51f0fbac83ac5
SHA2569b83050102a07d08f6e6adf411f34577aa17673d7df4071e753d5513c755f496
SHA5120468973798814f4f0d4a4965b26c1515aa508b02a7221b60816c71d451ae76eebac256aaf40efbb7908ad5ec99be90aef5532487af98c2a0e0b1f65729c9a7ac
-
Filesize
258KB
MD582ecc2b466cbc76241cead0b6d18f2f8
SHA15c989c3d660f0257edd339468ea51f0fbac83ac5
SHA2569b83050102a07d08f6e6adf411f34577aa17673d7df4071e753d5513c755f496
SHA5120468973798814f4f0d4a4965b26c1515aa508b02a7221b60816c71d451ae76eebac256aaf40efbb7908ad5ec99be90aef5532487af98c2a0e0b1f65729c9a7ac
-
Filesize
340KB
MD5fac1cf339b363d14b0d5fe7a97cb15b6
SHA1d9b47af82ec69ce7d31c883334ebb7f9c1713a19
SHA25650bf6b3b9fc34e3aec57df1c32fec26b80747eb71fa88ced9367fb242f3e134c
SHA512b79b8a4b4109e221abd744ed5f4d5928dff32b8030267b04aaaffc28a595a3548f6ec08a38b21e2702a56523e74d17841d51adf48b16aa664266315b295e544b
-
Filesize
340KB
MD5fac1cf339b363d14b0d5fe7a97cb15b6
SHA1d9b47af82ec69ce7d31c883334ebb7f9c1713a19
SHA25650bf6b3b9fc34e3aec57df1c32fec26b80747eb71fa88ced9367fb242f3e134c
SHA512b79b8a4b4109e221abd744ed5f4d5928dff32b8030267b04aaaffc28a595a3548f6ec08a38b21e2702a56523e74d17841d51adf48b16aa664266315b295e544b