Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 13:46
Static task
static1
General
-
Target
6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe
-
Size
102KB
-
MD5
9b111308d9275f5a03e34a9ea0b5be11
-
SHA1
b3176a9aa802dbdc59b83009e9110e4699209c29
-
SHA256
6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267
-
SHA512
a67309181705553e37b21aefcac31e6e78f739d9f412a43d28153145fc18f590857c8d20e57b21c2b9c89b7a404847399925674b4b0afc17062470df290c5ea7
-
SSDEEP
1536:ifp6kE69sL+kPINN+gB75eGFiqp525ynX9di2YDHLYjzDm:AVht1iS5iy3xYDHcj/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 952 1888 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1220 AppLaunch.exe 1220 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1220 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82 PID 1888 wrote to memory of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82 PID 1888 wrote to memory of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82 PID 1888 wrote to memory of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82 PID 1888 wrote to memory of 1220 1888 6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe"C:\Users\Admin\AppData\Local\Temp\6dd12fb35f034c84307a47060d58d1b1f2897a391b87398a8ac20703e4c86267.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 1522⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1888 -ip 18881⤵PID:5028