Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 19:00
Static task
static1
General
-
Target
de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe
-
Size
691KB
-
MD5
77324118f529ba6822b10c0998e9e5e2
-
SHA1
6ff19f266a11eb4d3e5b7571b45f7590d3539f2e
-
SHA256
de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd
-
SHA512
cfaadc93c3670e5fc30d6d143b5b6a626bb69edbf3582a4f6971d5dda1e2a49dd2b9ddbd720bcd1eff885ef89cfdb74238b79de8d60a7a62a8ebfe02d7306d6e
-
SSDEEP
12288:yy90I1Blkpf2+/dMjngt4AmZ2wI7hzBv8M0dXrBYe2Z7C8AANBXbef8GD:yyRGf2YMjni4077lv0dBz2cANFbef8U
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 86628894.exe -
Executes dropped EXE 5 IoCs
pid Process 1892 un748927.exe 1836 86628894.exe 3936 rk505426.exe 1956 rk505426.exe 2460 si106810.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 86628894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 86628894.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un748927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un748927.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3936 set thread context of 1956 3936 rk505426.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 5016 1836 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1836 86628894.exe 1836 86628894.exe 2460 si106810.exe 2460 si106810.exe 1956 rk505426.exe 1956 rk505426.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1836 86628894.exe Token: SeDebugPrivilege 1956 rk505426.exe Token: SeDebugPrivilege 2460 si106810.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1892 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 82 PID 4464 wrote to memory of 1892 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 82 PID 4464 wrote to memory of 1892 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 82 PID 1892 wrote to memory of 1836 1892 un748927.exe 83 PID 1892 wrote to memory of 1836 1892 un748927.exe 83 PID 1892 wrote to memory of 1836 1892 un748927.exe 83 PID 1892 wrote to memory of 3936 1892 un748927.exe 90 PID 1892 wrote to memory of 3936 1892 un748927.exe 90 PID 1892 wrote to memory of 3936 1892 un748927.exe 90 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 3936 wrote to memory of 1956 3936 rk505426.exe 91 PID 4464 wrote to memory of 2460 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 92 PID 4464 wrote to memory of 2460 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 92 PID 4464 wrote to memory of 2460 4464 de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe"C:\Users\Admin\AppData\Local\Temp\de4d936a2d1abbed5bbd1deaf189e823fabe61287afcfa689c3de82bcea54afd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un748927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\86628894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\86628894.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 10844⤵
- Program crash
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505426.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505426.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si106810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si106810.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1836 -ip 18361⤵PID:3444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5d8e13902f5e7feb5d8991321035fdfa7
SHA11855103307f050d7aa7f6e4188021e191caf0aa6
SHA2565e0f861950df9d7e56f7f3fe30ca09547fb32435dd9dbf1eb506174b464c7a91
SHA512cefa93c4cf07e3c10a97623a0496adc4e4e5ae45be7e1e5d1e1d81a4e9c7b1a30b4f60065b81d5da032b9e9b72c5bf26773590d466cadcb1d7ca057fb5f565e2
-
Filesize
537KB
MD5d8e13902f5e7feb5d8991321035fdfa7
SHA11855103307f050d7aa7f6e4188021e191caf0aa6
SHA2565e0f861950df9d7e56f7f3fe30ca09547fb32435dd9dbf1eb506174b464c7a91
SHA512cefa93c4cf07e3c10a97623a0496adc4e4e5ae45be7e1e5d1e1d81a4e9c7b1a30b4f60065b81d5da032b9e9b72c5bf26773590d466cadcb1d7ca057fb5f565e2
-
Filesize
259KB
MD5fc61c84b619f36f9ea1e2a5b3e31bc84
SHA12dac8975484a6e6f3443a35ad3c55c2142243fd9
SHA2565dcbebbee8dfb772c1ee9ece8402f6e1fe0af645b29f783c55a8dce7c0158183
SHA5122fdb66360453c64ec35cba7e6013f9320a20597d90d1dd9e9aff1400b72314a505a1e2e4277b3c46a57912001cef20a3576fc6b010741e67e9ceab35594791a9
-
Filesize
259KB
MD5fc61c84b619f36f9ea1e2a5b3e31bc84
SHA12dac8975484a6e6f3443a35ad3c55c2142243fd9
SHA2565dcbebbee8dfb772c1ee9ece8402f6e1fe0af645b29f783c55a8dce7c0158183
SHA5122fdb66360453c64ec35cba7e6013f9320a20597d90d1dd9e9aff1400b72314a505a1e2e4277b3c46a57912001cef20a3576fc6b010741e67e9ceab35594791a9
-
Filesize
342KB
MD507604e4058fa1517fe06c0ebdd1652e6
SHA10131d1bc4ade292aa6f24db3ec7190980eaa8053
SHA256b82b6a060b85de7b847210be9b9ce0a577a3826ef67075a169ee338b5d067d34
SHA51247db11a4d2da2020e3b5624d5e52ca56c2a1fa84a6a552a5a34a76b50c2f2babbfe5972aace6ef9e84889d42c2a8e280da1ec2330ea3f0a3217530437daf936c
-
Filesize
342KB
MD507604e4058fa1517fe06c0ebdd1652e6
SHA10131d1bc4ade292aa6f24db3ec7190980eaa8053
SHA256b82b6a060b85de7b847210be9b9ce0a577a3826ef67075a169ee338b5d067d34
SHA51247db11a4d2da2020e3b5624d5e52ca56c2a1fa84a6a552a5a34a76b50c2f2babbfe5972aace6ef9e84889d42c2a8e280da1ec2330ea3f0a3217530437daf936c
-
Filesize
342KB
MD507604e4058fa1517fe06c0ebdd1652e6
SHA10131d1bc4ade292aa6f24db3ec7190980eaa8053
SHA256b82b6a060b85de7b847210be9b9ce0a577a3826ef67075a169ee338b5d067d34
SHA51247db11a4d2da2020e3b5624d5e52ca56c2a1fa84a6a552a5a34a76b50c2f2babbfe5972aace6ef9e84889d42c2a8e280da1ec2330ea3f0a3217530437daf936c