Analysis
-
max time kernel
136s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 08:42
Static task
static1
General
-
Target
b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe
-
Size
697KB
-
MD5
a1662225b7a09971e67119b13a429f61
-
SHA1
612a1d95291722bc97b47f6ff51a0b78a166aa0d
-
SHA256
b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9
-
SHA512
52bcaaaae5481f77ba15bd4a33b459167fe81ad33419feb3aa0907179e654e276f4e3f8b659603e8cde5e5df5b2038a4ab577903dfd60b95d33208e2d25407b7
-
SSDEEP
12288:Wy90GeYCY9puXssNReCxL5sqEy2nNz9vH8ZrQBHQK4ucr8jgjoyH5GI:Wya+puXssaU5sqEhNz1VBwK4ua8jgjfh
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 79121392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 79121392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 79121392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 79121392.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 79121392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 79121392.exe -
Executes dropped EXE 4 IoCs
pid Process 4756 un552619.exe 2608 79121392.exe 3848 rk393119.exe 1372 si768549.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 79121392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 79121392.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un552619.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un552619.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4684 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3756 2608 WerFault.exe 83 4624 3848 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2608 79121392.exe 2608 79121392.exe 3848 rk393119.exe 3848 rk393119.exe 1372 si768549.exe 1372 si768549.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2608 79121392.exe Token: SeDebugPrivilege 3848 rk393119.exe Token: SeDebugPrivilege 1372 si768549.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4756 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 82 PID 1612 wrote to memory of 4756 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 82 PID 1612 wrote to memory of 4756 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 82 PID 4756 wrote to memory of 2608 4756 un552619.exe 83 PID 4756 wrote to memory of 2608 4756 un552619.exe 83 PID 4756 wrote to memory of 2608 4756 un552619.exe 83 PID 4756 wrote to memory of 3848 4756 un552619.exe 89 PID 4756 wrote to memory of 3848 4756 un552619.exe 89 PID 4756 wrote to memory of 3848 4756 un552619.exe 89 PID 1612 wrote to memory of 1372 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 92 PID 1612 wrote to memory of 1372 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 92 PID 1612 wrote to memory of 1372 1612 b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe"C:\Users\Admin\AppData\Local\Temp\b9ac36164ffc83b2377a2dce974a9bd48fb052dd5b3b8028c3fcdffcb1407ea9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552619.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79121392.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79121392.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 10804⤵
- Program crash
PID:3756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk393119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk393119.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 13204⤵
- Program crash
PID:4624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si768549.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si768549.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2608 -ip 26081⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3848 -ip 38481⤵PID:4020
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
543KB
MD59cb8c952dd8952e98f255a26ff3caad1
SHA120e4ba25ec61d82b40c8c7a65d054cf2d1ad15a3
SHA25663413945cc0bcd234afbd96533b9f0434f2b1fcc9650eff0f94e762d4e7ad6c6
SHA512f198a55318880b0618e93e84728470c55ad998c7e43908e276ccb15fd785d45947e75cc57021ff43a6acbecce50bf8cef0518b42ec9fb83d8ec03bb135dc9815
-
Filesize
543KB
MD59cb8c952dd8952e98f255a26ff3caad1
SHA120e4ba25ec61d82b40c8c7a65d054cf2d1ad15a3
SHA25663413945cc0bcd234afbd96533b9f0434f2b1fcc9650eff0f94e762d4e7ad6c6
SHA512f198a55318880b0618e93e84728470c55ad998c7e43908e276ccb15fd785d45947e75cc57021ff43a6acbecce50bf8cef0518b42ec9fb83d8ec03bb135dc9815
-
Filesize
265KB
MD582e51196cdc6f4ea51871c908cb86b3d
SHA170c5eb11a6495c4ecae3729242ec8bb73a967f47
SHA256c0fbbb69d889cb081dbf22f8546d9e7407843ffa97427c2f8a6440184d61cc24
SHA51248e4274669aae1aaebf6b9b3b8d898eaf0f4434051d793c4919e4ca0ef26c5e47ee3516bab1e51ebabb390ff5a9f53a9930f7cb6ba08d390064ac059d0725478
-
Filesize
265KB
MD582e51196cdc6f4ea51871c908cb86b3d
SHA170c5eb11a6495c4ecae3729242ec8bb73a967f47
SHA256c0fbbb69d889cb081dbf22f8546d9e7407843ffa97427c2f8a6440184d61cc24
SHA51248e4274669aae1aaebf6b9b3b8d898eaf0f4434051d793c4919e4ca0ef26c5e47ee3516bab1e51ebabb390ff5a9f53a9930f7cb6ba08d390064ac059d0725478
-
Filesize
347KB
MD58ba128c77962d14737d84cbb912cd53f
SHA1c264fe8f117b89464cc5a73dd8291216f7278b2c
SHA256f1d9c04abf7a4f492d49fff773e53550e03be75d15c2b1115a149714f874ffdc
SHA5129abb3d5b2adff74d768431ea72f3bca531878e19676fdfca646bfe0b30d4c19a6161794e189e48dcc66407da3fd7136d451cfb11fe3154b693dbf5f9fe4acccc
-
Filesize
347KB
MD58ba128c77962d14737d84cbb912cd53f
SHA1c264fe8f117b89464cc5a73dd8291216f7278b2c
SHA256f1d9c04abf7a4f492d49fff773e53550e03be75d15c2b1115a149714f874ffdc
SHA5129abb3d5b2adff74d768431ea72f3bca531878e19676fdfca646bfe0b30d4c19a6161794e189e48dcc66407da3fd7136d451cfb11fe3154b693dbf5f9fe4acccc