Analysis
-
max time kernel
53s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/04/2023, 17:42
Static task
static1
General
-
Target
c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe
-
Size
697KB
-
MD5
8d3ba47a5268d9f8b67a1ab6ba534a19
-
SHA1
3b26f19c14efd461e1f72e569deee9c38df149b8
-
SHA256
c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143
-
SHA512
d9575d67b59458b96a7597141d411e5c37578a9d6118c5371f815b7ccbf42f7ca0ebe0f8757cfae14a74897ed04012318c72881ec553f7308b7a222c941cc0d8
-
SSDEEP
12288:7y90QFD7P24wcG8z+3oo11HScpdGdooO/VL8CUL:7yhar8zX2hScpQl0BJUL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 60033391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 60033391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 60033391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 60033391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 60033391.exe -
Executes dropped EXE 4 IoCs
pid Process 5116 un894097.exe 2140 60033391.exe 1940 rk133502.exe 3944 si696123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 60033391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 60033391.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un894097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un894097.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2140 60033391.exe 2140 60033391.exe 1940 rk133502.exe 1940 rk133502.exe 3944 si696123.exe 3944 si696123.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2140 60033391.exe Token: SeDebugPrivilege 1940 rk133502.exe Token: SeDebugPrivilege 3944 si696123.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4600 wrote to memory of 5116 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 66 PID 4600 wrote to memory of 5116 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 66 PID 4600 wrote to memory of 5116 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 66 PID 5116 wrote to memory of 2140 5116 un894097.exe 67 PID 5116 wrote to memory of 2140 5116 un894097.exe 67 PID 5116 wrote to memory of 2140 5116 un894097.exe 67 PID 5116 wrote to memory of 1940 5116 un894097.exe 68 PID 5116 wrote to memory of 1940 5116 un894097.exe 68 PID 5116 wrote to memory of 1940 5116 un894097.exe 68 PID 4600 wrote to memory of 3944 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 70 PID 4600 wrote to memory of 3944 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 70 PID 4600 wrote to memory of 3944 4600 c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe"C:\Users\Admin\AppData\Local\Temp\c411e3e171fbd57d865420efc71e5a4a9b8350353fc7d569a42ead78acf01143.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un894097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un894097.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\60033391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\60033391.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk133502.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk133502.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si696123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si696123.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
543KB
MD562a62cdd229f00b7d54a5643e9034d19
SHA1dbe72c8383b3a3504b08187f7a3d0e54ffbb1ba5
SHA2563ee043d12df046cd744e99f3043cf39b145a092377bb8dbce1dd22bfa4c3cc1d
SHA51240e2655ac48734560b60c88fadae1bd805d20e6679e49c0cfeaba6c9a9d98a3a4d4d7d714ec0c887c998f2b8a7bec5313eea8c61c7253637a9f1978b8d52efd6
-
Filesize
543KB
MD562a62cdd229f00b7d54a5643e9034d19
SHA1dbe72c8383b3a3504b08187f7a3d0e54ffbb1ba5
SHA2563ee043d12df046cd744e99f3043cf39b145a092377bb8dbce1dd22bfa4c3cc1d
SHA51240e2655ac48734560b60c88fadae1bd805d20e6679e49c0cfeaba6c9a9d98a3a4d4d7d714ec0c887c998f2b8a7bec5313eea8c61c7253637a9f1978b8d52efd6
-
Filesize
263KB
MD5fab526cd68d273771894feef39b92326
SHA1548ed345c3fc99f60260a95d6ff2014e18df6e5f
SHA256700a1750505094f306bca7a1d203688b074506ae2b082369b1a380e6d546be60
SHA512b997273b47bdb19378b99e3197d0581eb6ba1787a653ca85000b2569eb7074fa2e060b557b55e035621c162a5f793dd1bf67e8e56feb24416a05a6642f8aa07f
-
Filesize
263KB
MD5fab526cd68d273771894feef39b92326
SHA1548ed345c3fc99f60260a95d6ff2014e18df6e5f
SHA256700a1750505094f306bca7a1d203688b074506ae2b082369b1a380e6d546be60
SHA512b997273b47bdb19378b99e3197d0581eb6ba1787a653ca85000b2569eb7074fa2e060b557b55e035621c162a5f793dd1bf67e8e56feb24416a05a6642f8aa07f
-
Filesize
328KB
MD56323e7d19b92703a3fd1c2f378098afe
SHA1fb0db363e649d5035f6ab5518fa887a0fe8467f3
SHA256761deae6592906ffeeddc1abf6cc31dbade40cfc68268cf22c6096c00bcd6179
SHA51275c58e240f8de7041ce7c663ec8440ddc0d18b3d6d9b7ec38f1d8e789e347b060636662321b90ff2c3531a3357c151920bb5fa48b1b5afe7317e3c2e06328d34
-
Filesize
328KB
MD56323e7d19b92703a3fd1c2f378098afe
SHA1fb0db363e649d5035f6ab5518fa887a0fe8467f3
SHA256761deae6592906ffeeddc1abf6cc31dbade40cfc68268cf22c6096c00bcd6179
SHA51275c58e240f8de7041ce7c663ec8440ddc0d18b3d6d9b7ec38f1d8e789e347b060636662321b90ff2c3531a3357c151920bb5fa48b1b5afe7317e3c2e06328d34