Analysis
-
max time kernel
138s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-06-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe
Resource
win10-20230220-en
General
-
Target
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe
-
Size
763KB
-
MD5
ff00d6b0dbc192ace7b8501bc296f70c
-
SHA1
4c1fcc6e153add978819da0425354a9c070cf0a8
-
SHA256
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b
-
SHA512
ebe15b008931f90dda8a710796593b5031d652618e92ecc0a15977abe2b688e0089c658d4b2942368c1284ceb034bbf0b7af1f6b023cbdbec3036ee55fb7afa9
-
SSDEEP
12288:TMrqy90db041cEM2/PGvRPNZT8LjrGi7A36nm5cu9zNbKtPjBkhh39:pyYb51vM2/mPHojhE3/h9zd4439
Malware Config
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
Processes:
y5237077.exey3173451.exey6834943.exej0020880.exepid process 4032 y5237077.exe 4292 y3173451.exe 2740 y6834943.exe 2744 j0020880.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exey5237077.exey3173451.exey6834943.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5237077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5237077.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3173451.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3173451.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6834943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y6834943.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
j0020880.exedescription pid process target process PID 2744 set thread context of 4236 2744 j0020880.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2792 2744 WerFault.exe j0020880.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4236 AppLaunch.exe 4236 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4236 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exey5237077.exey3173451.exey6834943.exej0020880.exedescription pid process target process PID 2896 wrote to memory of 4032 2896 fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe y5237077.exe PID 2896 wrote to memory of 4032 2896 fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe y5237077.exe PID 2896 wrote to memory of 4032 2896 fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe y5237077.exe PID 4032 wrote to memory of 4292 4032 y5237077.exe y3173451.exe PID 4032 wrote to memory of 4292 4032 y5237077.exe y3173451.exe PID 4032 wrote to memory of 4292 4032 y5237077.exe y3173451.exe PID 4292 wrote to memory of 2740 4292 y3173451.exe y6834943.exe PID 4292 wrote to memory of 2740 4292 y3173451.exe y6834943.exe PID 4292 wrote to memory of 2740 4292 y3173451.exe y6834943.exe PID 2740 wrote to memory of 2744 2740 y6834943.exe j0020880.exe PID 2740 wrote to memory of 2744 2740 y6834943.exe j0020880.exe PID 2740 wrote to memory of 2744 2740 y6834943.exe j0020880.exe PID 2744 wrote to memory of 4236 2744 j0020880.exe AppLaunch.exe PID 2744 wrote to memory of 4236 2744 j0020880.exe AppLaunch.exe PID 2744 wrote to memory of 4236 2744 j0020880.exe AppLaunch.exe PID 2744 wrote to memory of 4236 2744 j0020880.exe AppLaunch.exe PID 2744 wrote to memory of 4236 2744 j0020880.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe"C:\Users\Admin\AppData\Local\Temp\fdca79085867f759f16f8452a86fe82f0e2710d07d3b4aad3908524ba3fead0b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5237077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5237077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3173451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3173451.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6834943.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6834943.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0020880.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0020880.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1446⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5237077.exeFilesize
544KB
MD5e83f2e331ba0b473db5abec5181c6356
SHA1405e8ba141bba1deb92246316ee2fcf97af3eec0
SHA2568d8aeabc22a7c0f73e77b815320ebbe2192ffb8907272f1def0887315f9e97f6
SHA512f16e3e3e90a4521c320b4073357b601255fd7c29249ec81fd16cd287b972c5b5eb8232df8f9650783c6e6588612a68051b40e3d592c026af791cde5248d747f0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5237077.exeFilesize
544KB
MD5e83f2e331ba0b473db5abec5181c6356
SHA1405e8ba141bba1deb92246316ee2fcf97af3eec0
SHA2568d8aeabc22a7c0f73e77b815320ebbe2192ffb8907272f1def0887315f9e97f6
SHA512f16e3e3e90a4521c320b4073357b601255fd7c29249ec81fd16cd287b972c5b5eb8232df8f9650783c6e6588612a68051b40e3d592c026af791cde5248d747f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3173451.exeFilesize
372KB
MD51218167261bffaf0805e36bbc63f275c
SHA1ec9170472341512d8229ee0f890b0a25962d8a1d
SHA25638ebc46d94cfd2596e9fd3d47ebe717224d001a29750bd086989f65762f0dc21
SHA5126c5ae4e1a9e031664db4bb18f7d3b40c8fced7c535360b1fc3f0cce015374c589a984c13a3312c74c3b44fcfc3527b40053653996b059760d864df39ffcd53f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3173451.exeFilesize
372KB
MD51218167261bffaf0805e36bbc63f275c
SHA1ec9170472341512d8229ee0f890b0a25962d8a1d
SHA25638ebc46d94cfd2596e9fd3d47ebe717224d001a29750bd086989f65762f0dc21
SHA5126c5ae4e1a9e031664db4bb18f7d3b40c8fced7c535360b1fc3f0cce015374c589a984c13a3312c74c3b44fcfc3527b40053653996b059760d864df39ffcd53f1
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6834943.exeFilesize
216KB
MD518a58a3b1d890902e80e381da8d23e25
SHA181b0c4b8325f27bfd62784fb9c206f9b2f0b4862
SHA2561e8e94dacdda9c8170e2f4c7f9748a811c29955a26724dc5d4e3b7960617f23d
SHA512f093bd6b86ba7c2f99b5a6cab74996a384e6b5282c1700919468953a353c5680b5af5fa0418ca15bf5160a0f12bf8e6352047638558885db3ba8a928dcc4e3cd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6834943.exeFilesize
216KB
MD518a58a3b1d890902e80e381da8d23e25
SHA181b0c4b8325f27bfd62784fb9c206f9b2f0b4862
SHA2561e8e94dacdda9c8170e2f4c7f9748a811c29955a26724dc5d4e3b7960617f23d
SHA512f093bd6b86ba7c2f99b5a6cab74996a384e6b5282c1700919468953a353c5680b5af5fa0418ca15bf5160a0f12bf8e6352047638558885db3ba8a928dcc4e3cd
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0020880.exeFilesize
139KB
MD599d7ee2c5f6ef0495a738954860cbd0b
SHA1e85ddb2c2dde25bbb244e1605ca1c981c1be089d
SHA2566dda06a2338ce192bb1a2c9be2825ae8f5d1797b31bb296c1076069c91b81886
SHA512cd4e8df0cf506fcd5af38e3b3dfcb36c6a462b4bec44b10d3d8d3ce038dae2820f13d953a069490aa58435d4fee83a2ce2c13910f6eec8deb263eb0a1c7403ba
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j0020880.exeFilesize
139KB
MD599d7ee2c5f6ef0495a738954860cbd0b
SHA1e85ddb2c2dde25bbb244e1605ca1c981c1be089d
SHA2566dda06a2338ce192bb1a2c9be2825ae8f5d1797b31bb296c1076069c91b81886
SHA512cd4e8df0cf506fcd5af38e3b3dfcb36c6a462b4bec44b10d3d8d3ce038dae2820f13d953a069490aa58435d4fee83a2ce2c13910f6eec8deb263eb0a1c7403ba
-
memory/4236-150-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB