Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 11:03
Static task
static1
Behavioral task
behavioral1
Sample
3715ca8d93d5a5bdc499013cf.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3715ca8d93d5a5bdc499013cf.exe
Resource
win10v2004-20230703-en
General
-
Target
3715ca8d93d5a5bdc499013cf.exe
-
Size
343KB
-
MD5
3715ca8d93d5a5bdc499013cfc55da11
-
SHA1
e6c0c9a85aa722a06f3d4dd15e0aec7c779fad25
-
SHA256
bb90c8c39ba60347b2d5f2a73a11f9c1f9f7e16251ca3098e4c087257bcce09b
-
SHA512
b0983bbae356957a988ef707f1ac06c87757588735af779b7ce02b6ec245b274f1b5e778c3a3ef23a4004a85dda980fc6dad728046c81c1803c5b2eb142d9750
-
SSDEEP
6144:5ahOlp0yN90QE+8/3rwzkz3KKkg1sXLQphN1oF2U++wBS8:5ity90g8/bwzkmg7hNd88
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rundetermine.exerundetermine.exerundetermiine.exepid process 3876 rundetermine.exe 3176 rundetermine.exe 896 rundetermiine.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3715ca8d93d5a5bdc499013cf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 3715ca8d93d5a5bdc499013cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3715ca8d93d5a5bdc499013cf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundetermine.exedescription pid process target process PID 3876 set thread context of 3176 3876 rundetermine.exe rundetermine.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundetermine.exerundetermiine.exedescription pid process Token: SeDebugPrivilege 3876 rundetermine.exe Token: SeDebugPrivilege 896 rundetermiine.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3715ca8d93d5a5bdc499013cf.exerundetermine.exedescription pid process target process PID 2300 wrote to memory of 3876 2300 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 2300 wrote to memory of 3876 2300 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 2300 wrote to memory of 3876 2300 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 3876 wrote to memory of 3176 3876 rundetermine.exe rundetermine.exe PID 2300 wrote to memory of 896 2300 3715ca8d93d5a5bdc499013cf.exe rundetermiine.exe PID 2300 wrote to memory of 896 2300 3715ca8d93d5a5bdc499013cf.exe rundetermiine.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3715ca8d93d5a5bdc499013cf.exe"C:\Users\Admin\AppData\Local\Temp\3715ca8d93d5a5bdc499013cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exe3⤵
- Executes dropped EXE
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermiine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermiine.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD52a7387a06163caefa162347a684b47b4
SHA10d2e0c9b80d3d92fc6b7fe9e9fe23e4fdb4f5681
SHA2561ac6fc089599caa76c2154e799535fcaa8a03a723e5fae434b3afce2b47edce6
SHA51201f6dcd4fb1e3145c87a97a851cba4e6c2d2274976f3961aa288cc836618f800b5a08e2b7a747e44471bb5cb5953e2ba4f8392ba681d92c51cdc7d1e227ccb58
-
Filesize
292KB
MD52a7387a06163caefa162347a684b47b4
SHA10d2e0c9b80d3d92fc6b7fe9e9fe23e4fdb4f5681
SHA2561ac6fc089599caa76c2154e799535fcaa8a03a723e5fae434b3afce2b47edce6
SHA51201f6dcd4fb1e3145c87a97a851cba4e6c2d2274976f3961aa288cc836618f800b5a08e2b7a747e44471bb5cb5953e2ba4f8392ba681d92c51cdc7d1e227ccb58
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf