Analysis
-
max time kernel
97s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:21
Static task
static1
Behavioral task
behavioral1
Sample
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
Resource
win10v2004-20220901-en
General
-
Target
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
-
Size
192KB
-
MD5
8fe743f958f4ca5a89ee2c657be5c563
-
SHA1
3c1a0a86130c039bd390566be128454889e846b3
-
SHA256
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee
-
SHA512
838863b67383a068404fe06655a7f16754409cdbfa732cb7253cdffb5e9ba1f46e23620782b8dcb3d3690e6317f378f1bed114ecf037ced3eff0a8b0f1fc1136
-
SSDEEP
3072:YynHhtd1uiJ16SyejfHoJGK7zsgYGaThNKKTGlq9Ngy9:ZTdMiJ16cbX/GaNNKf4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\My Product = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe" b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
applaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira applaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus applaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exedescription pid process target process PID 1184 set thread context of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
applaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 applaunch.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
applaunch.exepid process 1776 applaunch.exe 1776 applaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exedescription pid process Token: SeDebugPrivilege 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exeapplaunch.exedescription pid process target process PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1184 wrote to memory of 1776 1184 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe PID 1776 wrote to memory of 1488 1776 applaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe"C:\Users\Admin\AppData\Local\Temp\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"2⤵
- Checks for any installed AV software in registry
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"3⤵PID:1488
-
-