Analysis
-
max time kernel
144s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-06-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe
Resource
win10-20230220-en
General
-
Target
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe
-
Size
757KB
-
MD5
f19fa90ff55e27340dd39410e6dffd39
-
SHA1
6ff2b0805f5766dfeb73ffb74bb5bee154a33222
-
SHA256
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d
-
SHA512
431076378298da465fac2cf50680cd66d868949724e6d98ec8f0e5681aee799edadb3428f19957602b7ad6c8e47a40e9850df403cc3304d540bcf2da90188b15
-
SSDEEP
12288:aMrly905KP0huYxgMOj1rZed5MA76VesQjREgZ/lzvBR7A6UsbjpisKe4z+0e:fyLP0NqMeZG5v76VesQ9EM/lzvT7NUsP
Malware Config
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
Processes:
y9653224.exey9180950.exey5428767.exej8855625.exepid process 3912 y9653224.exe 5100 y9180950.exe 4808 y5428767.exe 2012 j8855625.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exey9653224.exey9180950.exey5428767.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9653224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9653224.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9180950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9180950.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5428767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y5428767.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
j8855625.exedescription pid process target process PID 2012 set thread context of 4248 2012 j8855625.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3836 2012 WerFault.exe j8855625.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4248 AppLaunch.exe 4248 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4248 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exey9653224.exey9180950.exey5428767.exej8855625.exedescription pid process target process PID 3236 wrote to memory of 3912 3236 09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe y9653224.exe PID 3236 wrote to memory of 3912 3236 09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe y9653224.exe PID 3236 wrote to memory of 3912 3236 09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe y9653224.exe PID 3912 wrote to memory of 5100 3912 y9653224.exe y9180950.exe PID 3912 wrote to memory of 5100 3912 y9653224.exe y9180950.exe PID 3912 wrote to memory of 5100 3912 y9653224.exe y9180950.exe PID 5100 wrote to memory of 4808 5100 y9180950.exe y5428767.exe PID 5100 wrote to memory of 4808 5100 y9180950.exe y5428767.exe PID 5100 wrote to memory of 4808 5100 y9180950.exe y5428767.exe PID 4808 wrote to memory of 2012 4808 y5428767.exe j8855625.exe PID 4808 wrote to memory of 2012 4808 y5428767.exe j8855625.exe PID 4808 wrote to memory of 2012 4808 y5428767.exe j8855625.exe PID 2012 wrote to memory of 4248 2012 j8855625.exe AppLaunch.exe PID 2012 wrote to memory of 4248 2012 j8855625.exe AppLaunch.exe PID 2012 wrote to memory of 4248 2012 j8855625.exe AppLaunch.exe PID 2012 wrote to memory of 4248 2012 j8855625.exe AppLaunch.exe PID 2012 wrote to memory of 4248 2012 j8855625.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe"C:\Users\Admin\AppData\Local\Temp\09165d1bb48ef976dac9b9cee3c66d2a2bf5c36b455f480c5db49cd0ab50865d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9653224.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9653224.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9180950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9180950.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5428767.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5428767.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8855625.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8855625.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 1446⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9653224.exeFilesize
541KB
MD5e04b4c081f4036dee5bee4d15ccc948e
SHA1d6bdfae5c1cf2a8612afa43f31570e25c8825b0a
SHA2566015a4de2702e6fc2e3c6ee8a5d0d095e3c12f49e3051d25fe7bd4e6f1fe59d6
SHA51293a5687a4bdbbf0197ca1772faf52e3064a7c8f368b02d6e573663b50acd1ea2803a9d1ddddd27132da5c030a0978e58ae99ef758dfd2fbc54cace19d1c8f18f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9653224.exeFilesize
541KB
MD5e04b4c081f4036dee5bee4d15ccc948e
SHA1d6bdfae5c1cf2a8612afa43f31570e25c8825b0a
SHA2566015a4de2702e6fc2e3c6ee8a5d0d095e3c12f49e3051d25fe7bd4e6f1fe59d6
SHA51293a5687a4bdbbf0197ca1772faf52e3064a7c8f368b02d6e573663b50acd1ea2803a9d1ddddd27132da5c030a0978e58ae99ef758dfd2fbc54cace19d1c8f18f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9180950.exeFilesize
369KB
MD5d28218022e0b5c21c862730bd48b1dbf
SHA120bbd2199c3fc27228da17114162d4b34effa325
SHA2560e2b85faabfdddcf5f1db306fc7484fb0c44d5adf29dfabaf57a4a3715b9a454
SHA5123c98f65475c0dcac6718a3f9d4bd708f81cf2f6ae7af52d9eec93466cba1e8ba5d6f5e040ea51010b9520d2d40afe3151df2516ccc1a2a13a841ccd3018c69d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9180950.exeFilesize
369KB
MD5d28218022e0b5c21c862730bd48b1dbf
SHA120bbd2199c3fc27228da17114162d4b34effa325
SHA2560e2b85faabfdddcf5f1db306fc7484fb0c44d5adf29dfabaf57a4a3715b9a454
SHA5123c98f65475c0dcac6718a3f9d4bd708f81cf2f6ae7af52d9eec93466cba1e8ba5d6f5e040ea51010b9520d2d40afe3151df2516ccc1a2a13a841ccd3018c69d5
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5428767.exeFilesize
214KB
MD549e98eae6b8c5eee6c9a97630f1bb2f0
SHA1b91123187d495296806ea9527385f36f102a2d3b
SHA256243f091e8c6011ac7c5082a137030873b32b057d649d70fbf4d50725538dffed
SHA5124d4b9a756356517c3215028bc77a0396d294996fc4780d6cca82c47f8a591eb4292ae9d6004b9979524f7556c000da303671d272fcaeb33fee09eada8da66e81
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5428767.exeFilesize
214KB
MD549e98eae6b8c5eee6c9a97630f1bb2f0
SHA1b91123187d495296806ea9527385f36f102a2d3b
SHA256243f091e8c6011ac7c5082a137030873b32b057d649d70fbf4d50725538dffed
SHA5124d4b9a756356517c3215028bc77a0396d294996fc4780d6cca82c47f8a591eb4292ae9d6004b9979524f7556c000da303671d272fcaeb33fee09eada8da66e81
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8855625.exeFilesize
143KB
MD596536ef5b1eb8b93c8182988954362ff
SHA192353b18b9aa7d16fab0fe3da4d99b9c7abec5a0
SHA256aa7fa3819d07fac778e9a95e99e48fcf3ee47bcee2d66cabfcfb43d872fe2dff
SHA512acfc986d39c6528343a3d0ee27092c749f1fe2590a24e03af3017508816adbf08b531b55777e0183a14b1076d336ac5facd05eea4d6116e8812a3053504635d1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j8855625.exeFilesize
143KB
MD596536ef5b1eb8b93c8182988954362ff
SHA192353b18b9aa7d16fab0fe3da4d99b9c7abec5a0
SHA256aa7fa3819d07fac778e9a95e99e48fcf3ee47bcee2d66cabfcfb43d872fe2dff
SHA512acfc986d39c6528343a3d0ee27092c749f1fe2590a24e03af3017508816adbf08b531b55777e0183a14b1076d336ac5facd05eea4d6116e8812a3053504635d1
-
memory/4248-148-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB