Analysis
-
max time kernel
128s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:21
Static task
static1
Behavioral task
behavioral1
Sample
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
Resource
win10v2004-20220901-en
General
-
Target
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe
-
Size
192KB
-
MD5
8fe743f958f4ca5a89ee2c657be5c563
-
SHA1
3c1a0a86130c039bd390566be128454889e846b3
-
SHA256
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee
-
SHA512
838863b67383a068404fe06655a7f16754409cdbfa732cb7253cdffb5e9ba1f46e23620782b8dcb3d3690e6317f378f1bed114ecf037ced3eff0a8b0f1fc1136
-
SSDEEP
3072:YynHhtd1uiJ16SyejfHoJGK7zsgYGaThNKKTGlq9Ngy9:ZTdMiJ16cbX/GaNNKf4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\My Product = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe" b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
applaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus applaunch.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira applaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exedescription pid process target process PID 1048 set thread context of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
applaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 applaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exeapplaunch.exedescription pid process Token: SeDebugPrivilege 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe Token: SeDebugPrivilege 2280 applaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exeapplaunch.exedescription pid process target process PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 1048 wrote to memory of 2280 1048 b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe applaunch.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe PID 2280 wrote to memory of 2488 2280 applaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe"C:\Users\Admin\AppData\Local\Temp\b1a31ac04ef31fac527e647b31e916be98f50a476a9bc56c94da005d0526a5ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"2⤵
- Checks for any installed AV software in registry
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"3⤵PID:2488
-
-