Analysis
-
max time kernel
85s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 16:52
Static task
static1
General
-
Target
6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe
-
Size
696KB
-
MD5
601d03c429188518122c07c29ae0f737
-
SHA1
cd394adac9b2dab5b4d18f858517ee5cbef53b3a
-
SHA256
6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc
-
SHA512
c374fba5bdf0743e929c93c4a1ef84aab1cbb6237ab568df7353c5ee5c3eaec185f0616225c542622feac672d5b64419539d7574626f5967948f2146d483493d
-
SSDEEP
12288:qy90qQT6n2AvNzQnPzmGhYsAxyuvAjj2jx7fWJEttdUlMwgTphUg:qy1CUzQnPiGhlAxypCjVeMtaPQphUg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 22330802.exe -
Executes dropped EXE 4 IoCs
pid Process 2904 un275168.exe 3940 22330802.exe 648 rk456808.exe 2520 si332601.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 22330802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 22330802.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un275168.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un275168.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2892 3940 WerFault.exe 87 3604 648 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3940 22330802.exe 3940 22330802.exe 648 rk456808.exe 648 rk456808.exe 2520 si332601.exe 2520 si332601.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3940 22330802.exe Token: SeDebugPrivilege 648 rk456808.exe Token: SeDebugPrivilege 2520 si332601.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 392 wrote to memory of 2904 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 86 PID 392 wrote to memory of 2904 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 86 PID 392 wrote to memory of 2904 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 86 PID 2904 wrote to memory of 3940 2904 un275168.exe 87 PID 2904 wrote to memory of 3940 2904 un275168.exe 87 PID 2904 wrote to memory of 3940 2904 un275168.exe 87 PID 2904 wrote to memory of 648 2904 un275168.exe 93 PID 2904 wrote to memory of 648 2904 un275168.exe 93 PID 2904 wrote to memory of 648 2904 un275168.exe 93 PID 392 wrote to memory of 2520 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 96 PID 392 wrote to memory of 2520 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 96 PID 392 wrote to memory of 2520 392 6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe"C:\Users\Admin\AppData\Local\Temp\6f74e2eebf76975fe19c69bae2a18a1aa87f48e4f5cc97c08ae7f4fc2a751dfc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275168.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275168.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22330802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\22330802.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 10804⤵
- Program crash
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456808.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 13284⤵
- Program crash
PID:3604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si332601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si332601.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3940 -ip 39401⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 648 -ip 6481⤵PID:3412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
542KB
MD536c936ffbcfc80289dcc0bbba4eb4103
SHA1800ce28ccca455b11be1647fb902aba1045f180c
SHA25622a0e4a71aa7d627866a2e1f16f9f65905ee41b7eac8cace835dd432c0f65b19
SHA5120d4e9d3924050283fb4a1649a373531710a304f7a9e5074f5465e05c86b87a4ba334977ffbf118bbe33961a7044a0e3dba2a17ee3184f9008f4af6d195582945
-
Filesize
542KB
MD536c936ffbcfc80289dcc0bbba4eb4103
SHA1800ce28ccca455b11be1647fb902aba1045f180c
SHA25622a0e4a71aa7d627866a2e1f16f9f65905ee41b7eac8cace835dd432c0f65b19
SHA5120d4e9d3924050283fb4a1649a373531710a304f7a9e5074f5465e05c86b87a4ba334977ffbf118bbe33961a7044a0e3dba2a17ee3184f9008f4af6d195582945
-
Filesize
263KB
MD55e07abeb172a62a4bea012989fe7f1fb
SHA1ed76eabf37d2d6fd7fb7243fcd17a8c91c1ababc
SHA256763f1ad31144feeac20b844a75e35311da3bf086b74b8b834a8b37a645982031
SHA512bcbe9ce6fb528c9d1ad95efc14587ab791e34997e9e93217453a8b617fa63389d2646a02b4ba57dc19f24bf7f18128bd159c527ab7981c9e64dae0bbe599f5fe
-
Filesize
263KB
MD55e07abeb172a62a4bea012989fe7f1fb
SHA1ed76eabf37d2d6fd7fb7243fcd17a8c91c1ababc
SHA256763f1ad31144feeac20b844a75e35311da3bf086b74b8b834a8b37a645982031
SHA512bcbe9ce6fb528c9d1ad95efc14587ab791e34997e9e93217453a8b617fa63389d2646a02b4ba57dc19f24bf7f18128bd159c527ab7981c9e64dae0bbe599f5fe
-
Filesize
328KB
MD5f5df550a4bf922d5699732e6733b39af
SHA1bde3e3ea65c6e349c11d29444e434d22161845a6
SHA256832658a60de623f7f9cb0dbadb9c157d06c250fbf32d60c4cf66992d58e54138
SHA512b898c7ac0b494795e7f7c897857be8c0b51b017dff1ec91659a673a1e001514e8b0c54f8f80664012099a6b293d8f7f2751dbe6fd8926bc1ed24ad598f150185
-
Filesize
328KB
MD5f5df550a4bf922d5699732e6733b39af
SHA1bde3e3ea65c6e349c11d29444e434d22161845a6
SHA256832658a60de623f7f9cb0dbadb9c157d06c250fbf32d60c4cf66992d58e54138
SHA512b898c7ac0b494795e7f7c897857be8c0b51b017dff1ec91659a673a1e001514e8b0c54f8f80664012099a6b293d8f7f2751dbe6fd8926bc1ed24ad598f150185