Analysis
-
max time kernel
10s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 00:40
Static task
static1
Behavioral task
behavioral1
Sample
CMLauncher.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CMLauncher.exe
Resource
win10v2004-20230220-en
General
-
Target
CMLauncher.exe
-
Size
14.7MB
-
MD5
bb3e00f34a96cce79549e72d1b1a439d
-
SHA1
11b57260f75f8ac1dfa39dea6098506830baf440
-
SHA256
463a3af1bd39ae2cd2e84286b377694a33fd740d9ed767e82569743ef184068e
-
SHA512
4fcf526b27ff9244c56b33bf66837f65e3a6245b3f4f4537b0d8ad81cf1a3415a5a952ba70f81cb00381dbfcef7d9792bfc47e8ee2138dfea3fb874b5d1840ae
-
SSDEEP
393216:JgukY3Ix2Rpa5W4WAot7j9P1pz3/ue5vy7vi2C1aE:TH38CAotn9P1pz3/ue5vlZ
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
CMLauncher.exedescription ioc process File opened (read-only) \??\E: CMLauncher.exe File opened (read-only) \??\F: CMLauncher.exe File opened (read-only) \??\O: CMLauncher.exe File opened (read-only) \??\P: CMLauncher.exe File opened (read-only) \??\Q: CMLauncher.exe File opened (read-only) \??\W: CMLauncher.exe File opened (read-only) \??\X: CMLauncher.exe File opened (read-only) \??\A: CMLauncher.exe File opened (read-only) \??\H: CMLauncher.exe File opened (read-only) \??\R: CMLauncher.exe File opened (read-only) \??\V: CMLauncher.exe File opened (read-only) \??\Y: CMLauncher.exe File opened (read-only) \??\T: CMLauncher.exe File opened (read-only) \??\B: CMLauncher.exe File opened (read-only) \??\J: CMLauncher.exe File opened (read-only) \??\K: CMLauncher.exe File opened (read-only) \??\L: CMLauncher.exe File opened (read-only) \??\M: CMLauncher.exe File opened (read-only) \??\N: CMLauncher.exe File opened (read-only) \??\S: CMLauncher.exe File opened (read-only) \??\G: CMLauncher.exe File opened (read-only) \??\I: CMLauncher.exe File opened (read-only) \??\U: CMLauncher.exe File opened (read-only) \??\Z: CMLauncher.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
CMLauncher.exedescription ioc process File opened for modification \??\PhysicalDrive0 CMLauncher.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
CMLauncher.exepid process 816 CMLauncher.exe 816 CMLauncher.exe 816 CMLauncher.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/816-54-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/816-55-0x00000000003B0000-0x00000000003BA000-memory.dmpFilesize
40KB
-
memory/816-56-0x00000000003B0000-0x00000000003BA000-memory.dmpFilesize
40KB
-
memory/816-58-0x0000000004180000-0x00000000041E1000-memory.dmpFilesize
388KB
-
memory/816-59-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/816-57-0x0000000003450000-0x00000000034B8000-memory.dmpFilesize
416KB