Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
3715ca8d93d5a5bdc499013cf.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3715ca8d93d5a5bdc499013cf.exe
Resource
win10v2004-20230703-en
General
-
Target
3715ca8d93d5a5bdc499013cf.exe
-
Size
343KB
-
MD5
3715ca8d93d5a5bdc499013cfc55da11
-
SHA1
e6c0c9a85aa722a06f3d4dd15e0aec7c779fad25
-
SHA256
bb90c8c39ba60347b2d5f2a73a11f9c1f9f7e16251ca3098e4c087257bcce09b
-
SHA512
b0983bbae356957a988ef707f1ac06c87757588735af779b7ce02b6ec245b274f1b5e778c3a3ef23a4004a85dda980fc6dad728046c81c1803c5b2eb142d9750
-
SSDEEP
6144:5ahOlp0yN90QE+8/3rwzkz3KKkg1sXLQphN1oF2U++wBS8:5ity90g8/bwzkmg7hNd88
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
rundetermine.exerundetermine.exerundetermine.exerundetermiine.exepid process 2780 rundetermine.exe 2760 rundetermine.exe 1164 rundetermine.exe 1280 rundetermiine.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3715ca8d93d5a5bdc499013cf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 3715ca8d93d5a5bdc499013cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3715ca8d93d5a5bdc499013cf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundetermine.exedescription pid process target process PID 2780 set thread context of 1164 2780 rundetermine.exe rundetermine.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundetermine.exepid process 2780 rundetermine.exe 2780 rundetermine.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundetermine.exerundetermiine.exedescription pid process Token: SeDebugPrivilege 2780 rundetermine.exe Token: SeDebugPrivilege 1280 rundetermiine.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
3715ca8d93d5a5bdc499013cf.exerundetermine.exedescription pid process target process PID 3628 wrote to memory of 2780 3628 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 3628 wrote to memory of 2780 3628 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 3628 wrote to memory of 2780 3628 3715ca8d93d5a5bdc499013cf.exe rundetermine.exe PID 2780 wrote to memory of 2760 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 2760 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 2760 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 2780 wrote to memory of 1164 2780 rundetermine.exe rundetermine.exe PID 3628 wrote to memory of 1280 3628 3715ca8d93d5a5bdc499013cf.exe rundetermiine.exe PID 3628 wrote to memory of 1280 3628 3715ca8d93d5a5bdc499013cf.exe rundetermiine.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3715ca8d93d5a5bdc499013cf.exe"C:\Users\Admin\AppData\Local\Temp\3715ca8d93d5a5bdc499013cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exe3⤵
- Executes dropped EXE
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermine.exe3⤵
- Executes dropped EXE
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermiine.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rundetermiine.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD52a7387a06163caefa162347a684b47b4
SHA10d2e0c9b80d3d92fc6b7fe9e9fe23e4fdb4f5681
SHA2561ac6fc089599caa76c2154e799535fcaa8a03a723e5fae434b3afce2b47edce6
SHA51201f6dcd4fb1e3145c87a97a851cba4e6c2d2274976f3961aa288cc836618f800b5a08e2b7a747e44471bb5cb5953e2ba4f8392ba681d92c51cdc7d1e227ccb58
-
Filesize
292KB
MD52a7387a06163caefa162347a684b47b4
SHA10d2e0c9b80d3d92fc6b7fe9e9fe23e4fdb4f5681
SHA2561ac6fc089599caa76c2154e799535fcaa8a03a723e5fae434b3afce2b47edce6
SHA51201f6dcd4fb1e3145c87a97a851cba4e6c2d2274976f3961aa288cc836618f800b5a08e2b7a747e44471bb5cb5953e2ba4f8392ba681d92c51cdc7d1e227ccb58
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf
-
Filesize
207KB
MD5ad4b59ad0a43f64ad7cd725799903a9a
SHA110faa3c43f8100f6e76a137444fbd870feada6fb
SHA2560eb4f83c40fc9bf8879d752c3a91cf01f026055baaaf83df2bf126242cc562fa
SHA512d33236bd7b656b725dccffbd2a9da41caa20e6b391a400a05986b402cdb99fd7adff4003f7c3320dbc1bfb921285e828d1729d319b2ff862006fd62adeee5cdf