Analysis
-
max time kernel
54s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-06-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe
Resource
win10-20230220-en
General
-
Target
20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe
-
Size
767KB
-
MD5
79a5352ba85efe5195ff8dc6cab2ee90
-
SHA1
50fc48e7e0c793eb1c9fa4ec817cb79467c0cfbc
-
SHA256
20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33
-
SHA512
d837099ffe93a236e18de1e0a2285fd41cfecf95043b1ad3e2491aee0b3e7ce3653f23e661741a040a57602ac7335692d8044365f27c21ef444756b6aa0e0747
-
SSDEEP
12288:wMr+y90TGNIcEgz9CD0X9PObAs7Yt1Gj/8kGKO6sqf9RikBfBhiI+npiWO1fbRTu:eyWa9CDmUAs7YtwqjifbikjQrpiWOPSF
Malware Config
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
Processes:
y6786656.exey4492066.exey9828602.exej8533872.exepid process 3668 y6786656.exe 4120 y4492066.exe 4116 y9828602.exe 4072 j8533872.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
y6786656.exey4492066.exey9828602.exe20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6786656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6786656.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4492066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4492066.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9828602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y9828602.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
j8533872.exedescription pid process target process PID 4072 set thread context of 1820 4072 j8533872.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2504 4072 WerFault.exe j8533872.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1820 AppLaunch.exe 1820 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1820 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exey6786656.exey4492066.exey9828602.exej8533872.exedescription pid process target process PID 2164 wrote to memory of 3668 2164 20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe y6786656.exe PID 2164 wrote to memory of 3668 2164 20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe y6786656.exe PID 2164 wrote to memory of 3668 2164 20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe y6786656.exe PID 3668 wrote to memory of 4120 3668 y6786656.exe y4492066.exe PID 3668 wrote to memory of 4120 3668 y6786656.exe y4492066.exe PID 3668 wrote to memory of 4120 3668 y6786656.exe y4492066.exe PID 4120 wrote to memory of 4116 4120 y4492066.exe y9828602.exe PID 4120 wrote to memory of 4116 4120 y4492066.exe y9828602.exe PID 4120 wrote to memory of 4116 4120 y4492066.exe y9828602.exe PID 4116 wrote to memory of 4072 4116 y9828602.exe j8533872.exe PID 4116 wrote to memory of 4072 4116 y9828602.exe j8533872.exe PID 4116 wrote to memory of 4072 4116 y9828602.exe j8533872.exe PID 4072 wrote to memory of 1820 4072 j8533872.exe AppLaunch.exe PID 4072 wrote to memory of 1820 4072 j8533872.exe AppLaunch.exe PID 4072 wrote to memory of 1820 4072 j8533872.exe AppLaunch.exe PID 4072 wrote to memory of 1820 4072 j8533872.exe AppLaunch.exe PID 4072 wrote to memory of 1820 4072 j8533872.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe"C:\Users\Admin\AppData\Local\Temp\20ad54843f6b794f29cb2405c2e9c4e613bbe7d3a7471f1b2be4475061dc9e33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6786656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6786656.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4492066.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4492066.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9828602.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9828602.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8533872.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8533872.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 1486⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6786656.exeFilesize
546KB
MD508df2cbd7106f105e6621f5daa16a135
SHA168471ed83f5e3f0b25e77b7131ff6b38bc5267e7
SHA256d20945b71f8e9277bfd2ef440f660f2d3aed8186f128bc727ff8b7ad738e57a4
SHA512dfdca0e25e01e06a12be1eca18eb92e9b36e27be0e34eab9a232f84af136feda0be0aaecb2ce31db115ee72d31a85ac25c404f7be4228738803034dbb75f43f7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6786656.exeFilesize
546KB
MD508df2cbd7106f105e6621f5daa16a135
SHA168471ed83f5e3f0b25e77b7131ff6b38bc5267e7
SHA256d20945b71f8e9277bfd2ef440f660f2d3aed8186f128bc727ff8b7ad738e57a4
SHA512dfdca0e25e01e06a12be1eca18eb92e9b36e27be0e34eab9a232f84af136feda0be0aaecb2ce31db115ee72d31a85ac25c404f7be4228738803034dbb75f43f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4492066.exeFilesize
373KB
MD5f02c20cf74dcb76be7acab76ac6785c1
SHA1ff59d3bf1005b2df42929361d4eb20da915444a8
SHA256cdd919afccca22a1d3aa3611e474a357d4521d7a362c4065bc51cd2993e57cf0
SHA512a7e94cf273c485cbdacfe4193d515cdb9ef0809bfaecea58498cfb223e8ddc1ca5ad8e63daacb761c9bacdc340638383fe22c35b634d66eac4c39c710d2d09f4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4492066.exeFilesize
373KB
MD5f02c20cf74dcb76be7acab76ac6785c1
SHA1ff59d3bf1005b2df42929361d4eb20da915444a8
SHA256cdd919afccca22a1d3aa3611e474a357d4521d7a362c4065bc51cd2993e57cf0
SHA512a7e94cf273c485cbdacfe4193d515cdb9ef0809bfaecea58498cfb223e8ddc1ca5ad8e63daacb761c9bacdc340638383fe22c35b634d66eac4c39c710d2d09f4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9828602.exeFilesize
218KB
MD5c15f5cb383d94c2ad4a4e0c178362717
SHA11626f71100aecd2d9a72b184dc44c8eca12d6f85
SHA2560c82a74f4efb8eac4b624525e82e2f934bd69d05a0d0559276a3e8afa5f3a922
SHA512150e33962c42ebe9effdbe85e5230b091c6a4d721c0e06a12c300e8cbb9adcb82a7bcb6a34f6258c27723f81bb9abbdc24bed5bcbfa8cd52cad52978cc5ae31d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9828602.exeFilesize
218KB
MD5c15f5cb383d94c2ad4a4e0c178362717
SHA11626f71100aecd2d9a72b184dc44c8eca12d6f85
SHA2560c82a74f4efb8eac4b624525e82e2f934bd69d05a0d0559276a3e8afa5f3a922
SHA512150e33962c42ebe9effdbe85e5230b091c6a4d721c0e06a12c300e8cbb9adcb82a7bcb6a34f6258c27723f81bb9abbdc24bed5bcbfa8cd52cad52978cc5ae31d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8533872.exeFilesize
141KB
MD5d74eecd8bf1cddf47b28aa8750f237a0
SHA1db78fa68f926732edaa1a4347e73cf607f3d833e
SHA2569715629de13395b5e03ea716b8998d3023ddd70519d7dcb6688988cc8cf7336a
SHA512b47961f1a69f8cd328bd23964574a4b4348ab482e9085fdcb994bde0eab991ad1144de20e909e124ab4e4ef65435a335238f3a0fa82a6799904a954ecb5fd8ee
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8533872.exeFilesize
141KB
MD5d74eecd8bf1cddf47b28aa8750f237a0
SHA1db78fa68f926732edaa1a4347e73cf607f3d833e
SHA2569715629de13395b5e03ea716b8998d3023ddd70519d7dcb6688988cc8cf7336a
SHA512b47961f1a69f8cd328bd23964574a4b4348ab482e9085fdcb994bde0eab991ad1144de20e909e124ab4e4ef65435a335238f3a0fa82a6799904a954ecb5fd8ee
-
memory/1820-148-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB