Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/05/2023, 13:44
Static task
static1
General
-
Target
da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe
-
Size
1.5MB
-
MD5
4848db22ad84b74302a30b580dc16f0a
-
SHA1
abe5a2f51af8c2f9851c14fbd84dd65a45911121
-
SHA256
da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e
-
SHA512
db36e9b1b569dbb8bcc1abfc11fcd03f8c66ed832b8060df37e8610298cca6286ca1980800d954ae12915a9eb7b743d813dc142be0756e0b19b75890a8b764ad
-
SSDEEP
24576:Py819EBWTPcgPDPBKWYOD24LVaXIAes+PMNxyxrQZ0p4:a8WuP5PDPBxbLmuM7ekZ0p
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7602052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7602052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7602052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7602052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7602052.exe -
Executes dropped EXE 7 IoCs
pid Process 4112 v2617617.exe 4484 v3802421.exe 4908 v9965567.exe 2124 v1062150.exe 1628 a7602052.exe 4632 b2974787.exe 4440 c6577705.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7602052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7602052.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9965567.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1062150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2617617.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3802421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3802421.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9965567.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1062150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2617617.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 1700 4440 WerFault.exe 73 3536 4440 WerFault.exe 73 2984 4440 WerFault.exe 73 3796 4440 WerFault.exe 73 4528 4440 WerFault.exe 73 3100 4440 WerFault.exe 73 5004 4440 WerFault.exe 73 4728 4440 WerFault.exe 73 3204 4440 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 a7602052.exe 1628 a7602052.exe 4632 b2974787.exe 4632 b2974787.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 a7602052.exe Token: SeDebugPrivilege 4632 b2974787.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4112 3732 da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe 66 PID 3732 wrote to memory of 4112 3732 da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe 66 PID 3732 wrote to memory of 4112 3732 da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe 66 PID 4112 wrote to memory of 4484 4112 v2617617.exe 67 PID 4112 wrote to memory of 4484 4112 v2617617.exe 67 PID 4112 wrote to memory of 4484 4112 v2617617.exe 67 PID 4484 wrote to memory of 4908 4484 v3802421.exe 68 PID 4484 wrote to memory of 4908 4484 v3802421.exe 68 PID 4484 wrote to memory of 4908 4484 v3802421.exe 68 PID 4908 wrote to memory of 2124 4908 v9965567.exe 69 PID 4908 wrote to memory of 2124 4908 v9965567.exe 69 PID 4908 wrote to memory of 2124 4908 v9965567.exe 69 PID 2124 wrote to memory of 1628 2124 v1062150.exe 70 PID 2124 wrote to memory of 1628 2124 v1062150.exe 70 PID 2124 wrote to memory of 1628 2124 v1062150.exe 70 PID 2124 wrote to memory of 4632 2124 v1062150.exe 71 PID 2124 wrote to memory of 4632 2124 v1062150.exe 71 PID 2124 wrote to memory of 4632 2124 v1062150.exe 71 PID 4908 wrote to memory of 4440 4908 v9965567.exe 73 PID 4908 wrote to memory of 4440 4908 v9965567.exe 73 PID 4908 wrote to memory of 4440 4908 v9965567.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe"C:\Users\Admin\AppData\Local\Temp\da5c2ed6d146ae06a0405125bb3d461c85a5280b8ff2bd66495d8f3eb950a44e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2617617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2617617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3802421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3802421.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9965567.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9965567.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1062150.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1062150.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7602052.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7602052.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2974787.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2974787.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6577705.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6577705.exe5⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 6206⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 7006⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 8406⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 8486⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 8766⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 8886⤵
- Program crash
PID:3100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 11206⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 11526⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 11326⤵
- Program crash
PID:3204
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a534594e53fdbd914ffdcb23def1f5b7
SHA1584cace88ff95594b6d3cdeb1678d0f538a08ec4
SHA256d773ce08dcbf90e30aecb3dbdf15947ccb0b579af5d91fe561b8e8730ad4afed
SHA512bbcdbffc9021866332ddef5ad4e9cdf6b0bf4b55f2968638c108a4b457576635a9f333492597a72a39fe53ae0563dc4a2db2b70ad422caf4e57941a919592c3f
-
Filesize
1.4MB
MD5a534594e53fdbd914ffdcb23def1f5b7
SHA1584cace88ff95594b6d3cdeb1678d0f538a08ec4
SHA256d773ce08dcbf90e30aecb3dbdf15947ccb0b579af5d91fe561b8e8730ad4afed
SHA512bbcdbffc9021866332ddef5ad4e9cdf6b0bf4b55f2968638c108a4b457576635a9f333492597a72a39fe53ae0563dc4a2db2b70ad422caf4e57941a919592c3f
-
Filesize
913KB
MD5bd5548c45c08d8d1322b80515c75dedd
SHA1d4852e8f9ae2d320525feeec744d986499f1bbfb
SHA256321a5dd32c16cd7b07b3040a801a23a8c2cd4d537435f890d0235c36555a1f34
SHA5123f7d1a1c70e3baf732395b9b036680955e3a9ab1ade62274ff33471e4787d7a1cae01ee978baba019453323fc2f6d180017c72d91d2e50b9b246052d79f9dcc5
-
Filesize
913KB
MD5bd5548c45c08d8d1322b80515c75dedd
SHA1d4852e8f9ae2d320525feeec744d986499f1bbfb
SHA256321a5dd32c16cd7b07b3040a801a23a8c2cd4d537435f890d0235c36555a1f34
SHA5123f7d1a1c70e3baf732395b9b036680955e3a9ab1ade62274ff33471e4787d7a1cae01ee978baba019453323fc2f6d180017c72d91d2e50b9b246052d79f9dcc5
-
Filesize
708KB
MD59be8d3fb52a3489792be0634f4ab43fd
SHA12c99357e2e938a8316de693832305f12be61cba9
SHA256bb32fe7e20db4a36d1a847410cc2cf688ca52f386be61f624b6ae792981b6e83
SHA51206fccf45952fb7af8e77ce3ffe66828b7e6eda17ce6c2ce3566ca837dc1d4e41c3f0fec1e5171d1e67ee84991df51cb09074be9bb39f3d049a291fd019e53aab
-
Filesize
708KB
MD59be8d3fb52a3489792be0634f4ab43fd
SHA12c99357e2e938a8316de693832305f12be61cba9
SHA256bb32fe7e20db4a36d1a847410cc2cf688ca52f386be61f624b6ae792981b6e83
SHA51206fccf45952fb7af8e77ce3ffe66828b7e6eda17ce6c2ce3566ca837dc1d4e41c3f0fec1e5171d1e67ee84991df51cb09074be9bb39f3d049a291fd019e53aab
-
Filesize
340KB
MD5d00d447234974ecdf521385f117f7b91
SHA13b589a338afa9d955dfae231a355bf90334d99c2
SHA25603ea2ee0f3ac22687e535e5a8b3757847487f8af3102c737e8d97fa01b06f247
SHA5121ce0020db42c12a4743c5512ce58cbdf5b5c1ba81798328b3c88f86f14b5e6dced92fd77c22b21afa70679aeffd310be2d1feb546dca93708c33594128d38869
-
Filesize
340KB
MD5d00d447234974ecdf521385f117f7b91
SHA13b589a338afa9d955dfae231a355bf90334d99c2
SHA25603ea2ee0f3ac22687e535e5a8b3757847487f8af3102c737e8d97fa01b06f247
SHA5121ce0020db42c12a4743c5512ce58cbdf5b5c1ba81798328b3c88f86f14b5e6dced92fd77c22b21afa70679aeffd310be2d1feb546dca93708c33594128d38869
-
Filesize
417KB
MD5040ab52c7bb80f335bd9567655361609
SHA160c2aa0005c46d5b2986ab3f4f013f97fb46b24e
SHA256efc9e85484949e7963c39195a6fb984993f3bd4444a26c742413ca84e3eae7c4
SHA512afc56cec2c0bb7cba2220b8a8305d56e69d2d674bd59cc4f7950f125523f183dd75c292345096c456f6ad210b540246d01e2ca352183eb57e68bbbc57c6f493d
-
Filesize
417KB
MD5040ab52c7bb80f335bd9567655361609
SHA160c2aa0005c46d5b2986ab3f4f013f97fb46b24e
SHA256efc9e85484949e7963c39195a6fb984993f3bd4444a26c742413ca84e3eae7c4
SHA512afc56cec2c0bb7cba2220b8a8305d56e69d2d674bd59cc4f7950f125523f183dd75c292345096c456f6ad210b540246d01e2ca352183eb57e68bbbc57c6f493d
-
Filesize
360KB
MD5c4fe2e625b6bfe283cfa482bcdb03e30
SHA107ec7bc45edc8465a61c4d11be13d3ef1eea306b
SHA2568cc930dc5949f044fcc22f501ffc21a2436a4fe23c9b47ff50d3c3ec1d01b25b
SHA5124fee9672599fd023b9812453135d193839143baf041d0322aef0222281f6d18f2d3f1cfde05d5f36f093f34395e2a1756dc38c2f8a172dc493fb971ca49f9cc7
-
Filesize
360KB
MD5c4fe2e625b6bfe283cfa482bcdb03e30
SHA107ec7bc45edc8465a61c4d11be13d3ef1eea306b
SHA2568cc930dc5949f044fcc22f501ffc21a2436a4fe23c9b47ff50d3c3ec1d01b25b
SHA5124fee9672599fd023b9812453135d193839143baf041d0322aef0222281f6d18f2d3f1cfde05d5f36f093f34395e2a1756dc38c2f8a172dc493fb971ca49f9cc7
-
Filesize
136KB
MD5646e73ec5c2400877f45fa3a600ea494
SHA1d9325641ff8301c96037fc5c1c682df878576a56
SHA25620c9e94b5bcaa7b080fd248d2533c5c57c39ca3cd051e72d33d5c6a2223be6c3
SHA5126321ff037c37573eb4e709370a33f99b86d538d97cc32945610ebf1f0d1b44175bf3cf954f96b4074e17baf12c3deb27dc30d0e5df6ec70a9298a7592226471c
-
Filesize
136KB
MD5646e73ec5c2400877f45fa3a600ea494
SHA1d9325641ff8301c96037fc5c1c682df878576a56
SHA25620c9e94b5bcaa7b080fd248d2533c5c57c39ca3cd051e72d33d5c6a2223be6c3
SHA5126321ff037c37573eb4e709370a33f99b86d538d97cc32945610ebf1f0d1b44175bf3cf954f96b4074e17baf12c3deb27dc30d0e5df6ec70a9298a7592226471c