Analysis
-
max time kernel
42s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 22:51
Static task
static1
Behavioral task
behavioral1
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win10-20230220-en
General
-
Target
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
-
Size
4.7MB
-
MD5
e51f56cff8d20eabff2f5097e89617f0
-
SHA1
bb44250f7c7b658e0b004d1a50e8311401047f74
-
SHA256
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792
-
SHA512
a8db7f2e6ded80f4052d91083ff3ba5bb26af14cea16378cb840924792be42628b1770f0c977530383c8929c5fadb47c40a557012fb2aeeae53384f8c50ea7b3
-
SSDEEP
98304:XrNDnifgPgjhcObmRCevTu6QDiU98WJONhZ9gsb0jJu/2vJYL4oo2:XFBMuOCTpDLaqiRYLv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1832 DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe 1112 DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe -
Loads dropped DLL 4 IoCs
pid Process 668 AppLaunch.exe 668 AppLaunch.exe 1636 taskeng.exe 1636 taskeng.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1460 icacls.exe 1124 icacls.exe 1000 icacls.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1996 set thread context of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1948 set thread context of 668 1948 AppLaunch.exe 30 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1968 schtasks.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1996 wrote to memory of 1948 1996 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 28 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 1948 wrote to memory of 668 1948 AppLaunch.exe 30 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1460 668 AppLaunch.exe 31 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1124 668 AppLaunch.exe 33 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1000 668 AppLaunch.exe 34 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1968 668 AppLaunch.exe 37 PID 668 wrote to memory of 1832 668 AppLaunch.exe 39 PID 668 wrote to memory of 1832 668 AppLaunch.exe 39 PID 668 wrote to memory of 1832 668 AppLaunch.exe 39 PID 668 wrote to memory of 1832 668 AppLaunch.exe 39 PID 1636 wrote to memory of 1112 1636 taskeng.exe 41 PID 1636 wrote to memory of 1112 1636 taskeng.exe 41 PID 1636 wrote to memory of 1112 1636 taskeng.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:1460
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:1124
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3" /inheritance:e /deny "admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:1000
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3" /TR "C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe" /SC MINUTE4⤵
- Creates scheduled task(s)
PID:1968
-
-
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe"C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Executes dropped EXE
PID:1832
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {10FCA529-1354-40EE-930A-F7D5C03131B1} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exeC:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe2⤵
- Executes dropped EXE
PID:1112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize560.2MB
MD56aba15396d26458c550cf738ff53be95
SHA191be4a39d37e0d180e408c35bd9e090386af8875
SHA2566443eca28c68af7dfa7320e1d642e5af5da5cff9946b4b21a9cedddf706b8c91
SHA512f54419ee318de36af984c3eac8f30ea8bcfa517f8c4cbb302dec42bc03c60af62d12be5a8d7e4820c5294182d9a13455269de41d6e1834a616c731b9a5142184
-
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize583.3MB
MD578021fca49cc9fc02df81a0435abca49
SHA156942c5b79cd2312f55907afe373dde46c94788d
SHA2566b5b5d7d955a568a158d84bf8e87e4e8240f477b1ef2c80abd4d0ca364a4667b
SHA512c2d30e9892353d6fe6420f1cc62aea8ed71ecba5b234794cf95b8ae82c924b7a084edc947ccbdce7d7c4e46f6d86c5bd8675c83ffb1d91d96330bada13e995ee
-
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize508.3MB
MD5283258bdd76274889d7e5ea5d695532c
SHA150721aebc94dfe50a3227a49e502e7618edbfbe9
SHA2561eaafcb2fbcc558b8734f5f6ae8fc32649072254068b602cb1b3eaaf8770a21a
SHA512d7bf3cf82b7124944768853883eff618cfc477667f2bc0b354353da453eb6b7e98918d7d4b53331369dfabc6f7689316dab0c20591d747d643802074de0a69e3
-
C:\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize489.9MB
MD52e95074f2f3ccd8d4de0b88c62d82de7
SHA1e6fddcb3d068fef6b683605acc337ea0f8d65bd6
SHA256dbce63b8f143ef735e5b1c9da03ecff006e8c5901aee9ab3a4b17f04530c427d
SHA5122726dbb387c6cd2608b953e606c8d0a78f1ee62158cf7da1c2e5d6ba8ee3ba91ee97d53267caf507c39ac93715cbfabe1c7610af2beb88e60ca913c4278e28e2
-
\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize560.9MB
MD5816ab7f26cf95bbdda4ebd38b73f5ff2
SHA1763e34ffa60c3544371fe0fa85e3e9712d4fbae9
SHA25628bc74e17f89a71061669c61ed19f14c9436fae112f4f2882383c19da06e26df
SHA5122894a6c3a49ab6e250e1b41a258b529c95fb852d2ebe85488a65e137dffee85077443ebf9185e8ce3194a8239e3bed9810e9695a5398317b68d9c6408d11ad8b
-
\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize565.1MB
MD5f2cc0905f8decdadc6d82f32b2859e7a
SHA1fbdbc82ed234b0ca807b536d0f254df21aa1f3cf
SHA2561aadf2d3b89ad86f576f352653849b101ee603c98d05a3ee4bdc04a9b4fecb00
SHA512fe60194d26c9103718771488e9d388e042649f9ebf397891db7a2dfdd70b28c581a8178a30e6d69a6bd54397488f799b1e1ba223dec2aa5f8a431958eac6007f
-
\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize557.9MB
MD56af24fef579dd6a8c70bd31b6ea48bee
SHA13346712f3baf4dba9a33d4e3390350f43a39a575
SHA2560ca6b54582ec13e7494556c9ebc0f274e3c5bf407ed56933a321c16dc02cb9c6
SHA512dc13eb9afa1c7929f893b43f2ecdf1c8ed0d2cf5c44aabc9b47982f6b3c1811946993523e796b74a33cc5f32117632e9af063e8332fff0f3c4dd8a77d84e13af
-
\ProgramData\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3\DocumentsMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type7.4.2.3.exe
Filesize495.1MB
MD59dbdde39cc4ed57efe28ad9e81227f55
SHA15d34a5a7847d64feee288a5c94b38c65b374e563
SHA256089309816c80290b3fce1587a78937c0685ba83df5264baa466048b05d40ca34
SHA5123a97a80f97b6fdfe650f6bf10e932c40ef7429f14273cbdbb8e468b0be6d38d761592bc4a25c11e6a58570a26788eb5412e7af4eeae066175742dd0e378f0603