Analysis
-
max time kernel
110s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 19:22
Static task
static1
General
-
Target
963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe
-
Size
691KB
-
MD5
441cc16493d36eb1d009871be8285d5d
-
SHA1
0db36ee020d42378aca2b30df920e8be4bd464de
-
SHA256
963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6
-
SHA512
a73a8a558234bf47daba798147af664db849ffef0fd5fbce3bff5359cc4152f0175da44ea0da45bd5754006a15625cf2e7fc086220c17170ece464806e583809
-
SSDEEP
12288:Cy909uJ1D3KxLvsgivPRcJHCEED+6e2c7CjSANBsSDfxz:Cy1Jl3sviFEa+52gAN5DJz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 80941562.exe -
Executes dropped EXE 5 IoCs
pid Process 4600 un760705.exe 3920 80941562.exe 1804 rk916252.exe 4660 rk916252.exe 4416 si730221.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 80941562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 80941562.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un760705.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un760705.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1804 set thread context of 4660 1804 rk916252.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 228 3920 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3920 80941562.exe 3920 80941562.exe 4416 si730221.exe 4416 si730221.exe 4660 rk916252.exe 4660 rk916252.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3920 80941562.exe Token: SeDebugPrivilege 4660 rk916252.exe Token: SeDebugPrivilege 4416 si730221.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4600 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 84 PID 4100 wrote to memory of 4600 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 84 PID 4100 wrote to memory of 4600 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 84 PID 4600 wrote to memory of 3920 4600 un760705.exe 85 PID 4600 wrote to memory of 3920 4600 un760705.exe 85 PID 4600 wrote to memory of 3920 4600 un760705.exe 85 PID 4600 wrote to memory of 1804 4600 un760705.exe 88 PID 4600 wrote to memory of 1804 4600 un760705.exe 88 PID 4600 wrote to memory of 1804 4600 un760705.exe 88 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 1804 wrote to memory of 4660 1804 rk916252.exe 89 PID 4100 wrote to memory of 4416 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 90 PID 4100 wrote to memory of 4416 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 90 PID 4100 wrote to memory of 4416 4100 963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe"C:\Users\Admin\AppData\Local\Temp\963885ddbe9ae3f5dc3b683cf9c036d502cf50ece14131e30a206adce2632fb6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760705.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80941562.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80941562.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 10884⤵
- Program crash
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk916252.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk916252.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk916252.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk916252.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si730221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si730221.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3920 -ip 39201⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5b103cd28da384355169ad392960e21a8
SHA1282a6dfea60444f691da9db15144de195be27f7e
SHA25670d060470c0792edb9a9839acc3297a094af7915c193ee5e690a557754ebaba3
SHA5126d90dbf4a1583daaca0bf02a63066fe7cf23d93e550784493feacab1ac1d2aef98c2d12d606e083f465e62d19fea60a6a39c661084fe8e2089602705e664a38c
-
Filesize
537KB
MD5b103cd28da384355169ad392960e21a8
SHA1282a6dfea60444f691da9db15144de195be27f7e
SHA25670d060470c0792edb9a9839acc3297a094af7915c193ee5e690a557754ebaba3
SHA5126d90dbf4a1583daaca0bf02a63066fe7cf23d93e550784493feacab1ac1d2aef98c2d12d606e083f465e62d19fea60a6a39c661084fe8e2089602705e664a38c
-
Filesize
259KB
MD5df60364318eadd35a49cd09cd03f503c
SHA1520acb509088073a93fb0b3f4d080095e742af6b
SHA256aad2018e6b5825018db7fda8155ff434c81f77f28759fc5ed868711a47999607
SHA512c880f2d66abd289caa4b3f6719c34ce807d92118c84b363501a80c3a350f922bdcc0ebdcd55c9c822547af05934be77413d514fee10cab73afcaddf9f488ad5d
-
Filesize
259KB
MD5df60364318eadd35a49cd09cd03f503c
SHA1520acb509088073a93fb0b3f4d080095e742af6b
SHA256aad2018e6b5825018db7fda8155ff434c81f77f28759fc5ed868711a47999607
SHA512c880f2d66abd289caa4b3f6719c34ce807d92118c84b363501a80c3a350f922bdcc0ebdcd55c9c822547af05934be77413d514fee10cab73afcaddf9f488ad5d
-
Filesize
342KB
MD52214613a65c3bbe2d3b185b6ae106b34
SHA1b2c8147e9deb35974a51a4e0fb9578e9e660e54e
SHA2566465834e45b50cbd9c38b321ef2c40cf871412586b8f2165a6c417cbf4e910d8
SHA51253b5dcde37fa6603a4fe8eca3ad6ef9473f161780f6b3ee792d2420ff66626721e4fe24e85095e5fb8d2131e00a2202bf9b341d1a438f67d2f34d900873cedd1
-
Filesize
342KB
MD52214613a65c3bbe2d3b185b6ae106b34
SHA1b2c8147e9deb35974a51a4e0fb9578e9e660e54e
SHA2566465834e45b50cbd9c38b321ef2c40cf871412586b8f2165a6c417cbf4e910d8
SHA51253b5dcde37fa6603a4fe8eca3ad6ef9473f161780f6b3ee792d2420ff66626721e4fe24e85095e5fb8d2131e00a2202bf9b341d1a438f67d2f34d900873cedd1
-
Filesize
342KB
MD52214613a65c3bbe2d3b185b6ae106b34
SHA1b2c8147e9deb35974a51a4e0fb9578e9e660e54e
SHA2566465834e45b50cbd9c38b321ef2c40cf871412586b8f2165a6c417cbf4e910d8
SHA51253b5dcde37fa6603a4fe8eca3ad6ef9473f161780f6b3ee792d2420ff66626721e4fe24e85095e5fb8d2131e00a2202bf9b341d1a438f67d2f34d900873cedd1