Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 20:46
Static task
static1
Behavioral task
behavioral1
Sample
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe
Resource
win7-20220718-en
General
-
Target
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe
-
Size
478KB
-
MD5
27b5a2ae4b7829e5c4a6be8c05f0af66
-
SHA1
f0a03d7f0aff41e5458436f0241c8a1e59002e76
-
SHA256
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb
-
SHA512
7d2b5a3731f3e38118bc1d25354782e79913e79408439a74d121bef546ab21e60330d9cf73a083bdcf19d20327d5ace3b3261fbb97acbb0318556050b4d917a8
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
lokibot
http://mclhk-net.com/hiswounds/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" AppLaunch.exe -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" AppLaunch.exe -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" AppLaunch.exe -
Processes:
resource yara_rule behavioral1/memory/1908-61-0x0000000001F50000-0x000000000300A000-memory.dmp upx behavioral1/memory/1908-63-0x0000000001F50000-0x000000000300A000-memory.dmp upx behavioral1/memory/1908-68-0x0000000001F50000-0x000000000300A000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook AppLaunch.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AppLaunch.exedescription ioc process File opened (read-only) \??\X: AppLaunch.exe File opened (read-only) \??\U: AppLaunch.exe File opened (read-only) \??\Z: AppLaunch.exe File opened (read-only) \??\E: AppLaunch.exe File opened (read-only) \??\F: AppLaunch.exe File opened (read-only) \??\H: AppLaunch.exe File opened (read-only) \??\I: AppLaunch.exe File opened (read-only) \??\M: AppLaunch.exe File opened (read-only) \??\N: AppLaunch.exe File opened (read-only) \??\O: AppLaunch.exe File opened (read-only) \??\P: AppLaunch.exe File opened (read-only) \??\G: AppLaunch.exe File opened (read-only) \??\J: AppLaunch.exe File opened (read-only) \??\K: AppLaunch.exe File opened (read-only) \??\L: AppLaunch.exe File opened (read-only) \??\Y: AppLaunch.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
AppLaunch.exedescription ioc process File opened for modification C:\autorun.inf AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exedescription pid process target process PID 1768 set thread context of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe -
Drops file in Program Files directory 1 IoCs
Processes:
AppLaunch.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe AppLaunch.exe -
Drops file in Windows directory 4 IoCs
Processes:
AppLaunch.exe53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exedescription ioc process File created C:\Windows\6d8ca7 AppLaunch.exe File opened for modification C:\Windows\SYSTEM.INI AppLaunch.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AppLaunch.exepid process 1908 AppLaunch.exe 1908 AppLaunch.exe 1908 AppLaunch.exe 1908 AppLaunch.exe 1908 AppLaunch.exe 1908 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe Token: SeDebugPrivilege 1908 AppLaunch.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exeAppLaunch.exedescription pid process target process PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1768 wrote to memory of 1908 1768 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1768 1908 AppLaunch.exe 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe PID 1908 wrote to memory of 1768 1908 AppLaunch.exe 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1380 1908 AppLaunch.exe DllHost.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1380 1908 AppLaunch.exe DllHost.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1380 1908 AppLaunch.exe DllHost.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1380 1908 AppLaunch.exe DllHost.exe PID 1908 wrote to memory of 1136 1908 AppLaunch.exe taskhost.exe PID 1908 wrote to memory of 1232 1908 AppLaunch.exe Dwm.exe PID 1908 wrote to memory of 1256 1908 AppLaunch.exe Explorer.EXE PID 1908 wrote to memory of 1380 1908 AppLaunch.exe DllHost.exe -
outlook_office_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AppLaunch.exe -
outlook_win_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppLaunch.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe"C:\Users\Admin\AppData\Local\Temp\53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1768-64-0x00000000005E0000-0x00000000005E2000-memory.dmpFilesize
8KB
-
memory/1768-55-0x0000000074E30000-0x00000000753DB000-memory.dmpFilesize
5.7MB
-
memory/1768-56-0x0000000074E30000-0x00000000753DB000-memory.dmpFilesize
5.7MB
-
memory/1768-54-0x0000000075871000-0x0000000075873000-memory.dmpFilesize
8KB
-
memory/1768-66-0x0000000074E30000-0x00000000753DB000-memory.dmpFilesize
5.7MB
-
memory/1908-57-0x0000000000401000-0x0000000000414800-memory.dmpFilesize
78KB
-
memory/1908-61-0x0000000001F50000-0x000000000300A000-memory.dmpFilesize
16.7MB
-
memory/1908-62-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/1908-63-0x0000000001F50000-0x000000000300A000-memory.dmpFilesize
16.7MB
-
memory/1908-59-0x0000000000415000-0x0000000000419200-memory.dmpFilesize
16KB
-
memory/1908-65-0x00000000002E0000-0x00000000002E2000-memory.dmpFilesize
8KB
-
memory/1908-58-0x0000000000415000-0x0000000000419200-memory.dmpFilesize
16KB
-
memory/1908-67-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/1908-68-0x0000000001F50000-0x000000000300A000-memory.dmpFilesize
16.7MB
-
memory/1908-69-0x00000000002E0000-0x00000000002E2000-memory.dmpFilesize
8KB