Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
g7490994.exe
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
g7490994.exe
-
Size
166KB
-
MD5
028d08dcf431d3f81b79a38e796a9c06
-
SHA1
3bcbc521eb7e3c0fb9c13c35f0c32e75a39401fa
-
SHA256
f57b70974adb1f316c1397ca03c9440ff4a28151d32c6036907a0ae9a67afc13
-
SHA512
4a08e03df1f18fb24e0b1e5ab410d749f97a3ad614c60eee06fe5f0a3002ea6656b3e712cabeaf6c2e8a2b048dc661ba55d79b843fe51a9ef8ca37daba8de06f
-
SSDEEP
3072:TW3JZrSVCyIGCH6KX0pAkuUTyUuvd6sOx5ITx:SDSVhCaK0pAk5uvdQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 1372 2012 g7490994.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1372 AppLaunch.exe 1372 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1372 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29 PID 2012 wrote to memory of 1372 2012 g7490994.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\g7490994.exe"C:\Users\Admin\AppData\Local\Temp\g7490994.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-