Analysis
-
max time kernel
98s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 11:48
Static task
static1
General
-
Target
903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe
-
Size
695KB
-
MD5
52f7a6a041eb915e90eaee2791eab06f
-
SHA1
a7cf771322287a3b0dc5673b5cfebf7bbd517085
-
SHA256
903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5
-
SHA512
083f140e55615279308bd395d545f1eb25c5d2e23a45256caf4c88775523157fb327206827f7708aa217acad44c94e885381c6030c919aa4c87d2c592cdbe255
-
SSDEEP
12288:ry90fstyu0xZWwpouqDGSx0QPXQ2ZRhuPHD0iDge7h8ht3C:ryisGpouyGSxJXhjuwre7h8htS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 43599876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 43599876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 43599876.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 43599876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 43599876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 43599876.exe -
Executes dropped EXE 4 IoCs
pid Process 1148 un339815.exe 2632 43599876.exe 3656 rk292000.exe 3400 si262913.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 43599876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 43599876.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un339815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un339815.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 216 2632 WerFault.exe 85 3676 3656 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2632 43599876.exe 2632 43599876.exe 3656 rk292000.exe 3656 rk292000.exe 3400 si262913.exe 3400 si262913.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2632 43599876.exe Token: SeDebugPrivilege 3656 rk292000.exe Token: SeDebugPrivilege 3400 si262913.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1148 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 84 PID 2932 wrote to memory of 1148 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 84 PID 2932 wrote to memory of 1148 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 84 PID 1148 wrote to memory of 2632 1148 un339815.exe 85 PID 1148 wrote to memory of 2632 1148 un339815.exe 85 PID 1148 wrote to memory of 2632 1148 un339815.exe 85 PID 1148 wrote to memory of 3656 1148 un339815.exe 92 PID 1148 wrote to memory of 3656 1148 un339815.exe 92 PID 1148 wrote to memory of 3656 1148 un339815.exe 92 PID 2932 wrote to memory of 3400 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 95 PID 2932 wrote to memory of 3400 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 95 PID 2932 wrote to memory of 3400 2932 903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe"C:\Users\Admin\AppData\Local\Temp\903d2749b8ecb91748bc906279cacc9b24a49234731295a6026c4606b32698f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43599876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43599876.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 10804⤵
- Program crash
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk292000.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk292000.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 20324⤵
- Program crash
PID:3676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si262913.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2632 -ip 26321⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3656 -ip 36561⤵PID:792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
541KB
MD54ae487402c91e99905cb9c298179486c
SHA18f66acb40fa972531f7c8babf6d1cb641d7e34f1
SHA256a9bf28cd17c042b296905056593090b91539e4cb91310d305f78f784046684b7
SHA5128664f8ab9dd383893d571bb18d42733ba2f12354a8e8b4b1014628dce8e045c42dfc8f9004ef37d6861c8c4ec25bcb4c952a92d96928e13121f6bcd205d55820
-
Filesize
541KB
MD54ae487402c91e99905cb9c298179486c
SHA18f66acb40fa972531f7c8babf6d1cb641d7e34f1
SHA256a9bf28cd17c042b296905056593090b91539e4cb91310d305f78f784046684b7
SHA5128664f8ab9dd383893d571bb18d42733ba2f12354a8e8b4b1014628dce8e045c42dfc8f9004ef37d6861c8c4ec25bcb4c952a92d96928e13121f6bcd205d55820
-
Filesize
264KB
MD5795d974221a84497e1c760e737490afb
SHA1615d2d6d38eb72483312f0edd5db82cc8612e411
SHA256e85c6bd981a2f27fc848ede81f30e68e83d9d68175e6badf70dcd6db2ff97623
SHA512b857d6adb6cd4e73ee7cdadf925b5e6d08ca8c84c09834ab96b056fa4c63b015df601db5a09a81912d28d6bb111917f153a1a591957a951df036803f73483249
-
Filesize
264KB
MD5795d974221a84497e1c760e737490afb
SHA1615d2d6d38eb72483312f0edd5db82cc8612e411
SHA256e85c6bd981a2f27fc848ede81f30e68e83d9d68175e6badf70dcd6db2ff97623
SHA512b857d6adb6cd4e73ee7cdadf925b5e6d08ca8c84c09834ab96b056fa4c63b015df601db5a09a81912d28d6bb111917f153a1a591957a951df036803f73483249
-
Filesize
348KB
MD5bbc748db7374bb53362a0a277aa92c2b
SHA160bfa482cceb2263343d4fc8f9384800a8c16e7e
SHA256ef324b24f8d36b6e81925364e6d70e45009ec5f364c05eecd244f4031cd4679b
SHA512db9c6c0d2d13ff03de113f65afe8dc72b60b318d9d21900c5cf9470804f78f210065afd2e3509df06e59cbc70bf731ef85223adb6ac572503640c3f153a3e98a
-
Filesize
348KB
MD5bbc748db7374bb53362a0a277aa92c2b
SHA160bfa482cceb2263343d4fc8f9384800a8c16e7e
SHA256ef324b24f8d36b6e81925364e6d70e45009ec5f364c05eecd244f4031cd4679b
SHA512db9c6c0d2d13ff03de113f65afe8dc72b60b318d9d21900c5cf9470804f78f210065afd2e3509df06e59cbc70bf731ef85223adb6ac572503640c3f153a3e98a