Analysis
-
max time kernel
82s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 08:10
Static task
static1
General
-
Target
893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe
-
Size
697KB
-
MD5
7e0f57d7f1a75288c62eae160fbffc3b
-
SHA1
8bb2b2d6019743a2fc155653d4fe5ef00e11643e
-
SHA256
893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24
-
SHA512
8d83df4b2f3803ba4ff7790a5ad301f7307f710e3fd8df48f8040c26c3e4bca2aa382e2ff56883bfaefef87f342fb7dc788c2cb24c3937da8179844add06f727
-
SSDEEP
12288:Ry90tdXgmjx9IuqssNHeCLQRAefxNex7BH5KIQyr8TgjnlABsz5ORhG:RybuqsssQQ28kBZKIQk8TgjlJ4m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 27394579.exe -
Executes dropped EXE 4 IoCs
pid Process 3080 un525748.exe 3124 27394579.exe 3628 rk015599.exe 864 si532313.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 27394579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 27394579.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un525748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un525748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2832 3124 WerFault.exe 86 1860 3628 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3124 27394579.exe 3124 27394579.exe 3628 rk015599.exe 3628 rk015599.exe 864 si532313.exe 864 si532313.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3124 27394579.exe Token: SeDebugPrivilege 3628 rk015599.exe Token: SeDebugPrivilege 864 si532313.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 508 wrote to memory of 3080 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 85 PID 508 wrote to memory of 3080 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 85 PID 508 wrote to memory of 3080 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 85 PID 3080 wrote to memory of 3124 3080 un525748.exe 86 PID 3080 wrote to memory of 3124 3080 un525748.exe 86 PID 3080 wrote to memory of 3124 3080 un525748.exe 86 PID 3080 wrote to memory of 3628 3080 un525748.exe 93 PID 3080 wrote to memory of 3628 3080 un525748.exe 93 PID 3080 wrote to memory of 3628 3080 un525748.exe 93 PID 508 wrote to memory of 864 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 97 PID 508 wrote to memory of 864 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 97 PID 508 wrote to memory of 864 508 893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe"C:\Users\Admin\AppData\Local\Temp\893d2d1a7547f896400ebcb5937d3815722e0655418fd4b99f7ab2201aea1f24.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525748.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525748.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27394579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27394579.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10884⤵
- Program crash
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk015599.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk015599.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 17724⤵
- Program crash
PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532313.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532313.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3124 -ip 31241⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3628 -ip 36281⤵PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
543KB
MD559008f9829678360740875b92d2ef7ea
SHA1abda88131c6ead5a512d17ea920b5b658742ac11
SHA256bdb79e06e6499277104229d3cae943b48a1d1b4d42cd1a72ae62fd92715ce18d
SHA512a11a5de34f455dbdbaadc768ad3f7dd1547a96be06ba439eee1967fc129f2f98a996ee9f6deaa79a5d067248f0cfbde1e213fde67aaafbaa4bbb4ad38facfba9
-
Filesize
543KB
MD559008f9829678360740875b92d2ef7ea
SHA1abda88131c6ead5a512d17ea920b5b658742ac11
SHA256bdb79e06e6499277104229d3cae943b48a1d1b4d42cd1a72ae62fd92715ce18d
SHA512a11a5de34f455dbdbaadc768ad3f7dd1547a96be06ba439eee1967fc129f2f98a996ee9f6deaa79a5d067248f0cfbde1e213fde67aaafbaa4bbb4ad38facfba9
-
Filesize
265KB
MD5f7e044142abf1a58b3a060a1d977aa58
SHA100b28e57c8856683cbfdf9e0f2e5dfd4b8604bdb
SHA256656519e3609b3c67a47fcda55bec12c0172f4078d5ff88e11ac541066d61fe8d
SHA5127455f8c2e92becae41d93b2c254996fdd87838fd814804733c6cea0cabbbbe95554c6ad3123f929bc7bc4b86dfac121c79facabe270f4e58e86b43a170f522d1
-
Filesize
265KB
MD5f7e044142abf1a58b3a060a1d977aa58
SHA100b28e57c8856683cbfdf9e0f2e5dfd4b8604bdb
SHA256656519e3609b3c67a47fcda55bec12c0172f4078d5ff88e11ac541066d61fe8d
SHA5127455f8c2e92becae41d93b2c254996fdd87838fd814804733c6cea0cabbbbe95554c6ad3123f929bc7bc4b86dfac121c79facabe270f4e58e86b43a170f522d1
-
Filesize
347KB
MD5910ebcf3418fa468b0e66d3e5baa78c6
SHA1f7095c64cf5cc567828ecc721bb0b8db4d94eb69
SHA256e86627f96291f8dcb0067b8608a97e0353f1891bf0f34514c76927f16aaf2882
SHA51294811d2e9b7e3ad6a093114097fa63285c6b48a11a697f03256be0924479df1c4b8ea71525255c74c42b3bbfb76c60244547e0d8167145db14989f0313281ca8
-
Filesize
347KB
MD5910ebcf3418fa468b0e66d3e5baa78c6
SHA1f7095c64cf5cc567828ecc721bb0b8db4d94eb69
SHA256e86627f96291f8dcb0067b8608a97e0353f1891bf0f34514c76927f16aaf2882
SHA51294811d2e9b7e3ad6a093114097fa63285c6b48a11a697f03256be0924479df1c4b8ea71525255c74c42b3bbfb76c60244547e0d8167145db14989f0313281ca8