Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 08:41
Static task
static1
Behavioral task
behavioral1
Sample
LAUNCHERALLDAY.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
LAUNCHERALLDAY.exe
Resource
win10v2004-20230831-en
General
-
Target
LAUNCHERALLDAY.exe
-
Size
3.7MB
-
MD5
239e56f36d96bdf953432774ea1fe02f
-
SHA1
68e2f085e6ddfa842d28ca78a8a12ff4cfe6673d
-
SHA256
a66fd9674785fd0794a95f4c9413b4e6b1781143d22d02c08dd6ac5f4760a473
-
SHA512
86698214958dddbdd250cb7c8e4c31c4d2655a21b34d8b7adec4e6337dd4db11591bf58eb00fc59b5eccb753ab330ae2afd9f92f8f2d205ba201f9381248f2ac
-
SSDEEP
49152:NBuZrEUH+okZt+JhQUbN0/hRieQE2nELGl38Im9F0xqkFmN6Y:bkLoZt+J3bN07iNEL2tm3Upm9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3420 LAUNCHERALLDAY.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3420 3376 LAUNCHERALLDAY.exe 85 PID 3376 wrote to memory of 3420 3376 LAUNCHERALLDAY.exe 85 PID 3376 wrote to memory of 3420 3376 LAUNCHERALLDAY.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\LAUNCHERALLDAY.exe"C:\Users\Admin\AppData\Local\Temp\LAUNCHERALLDAY.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\is-6UAR7.tmp\LAUNCHERALLDAY.tmp"C:\Users\Admin\AppData\Local\Temp\is-6UAR7.tmp\LAUNCHERALLDAY.tmp" /SL5="$701BC,2980035,806400,C:\Users\Admin\AppData\Local\Temp\LAUNCHERALLDAY.exe"2⤵
- Executes dropped EXE
PID:3420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5abe2ed6c385a52a712928a6248afd0a2
SHA17814ec8a7170bfe5d93bc837edc0b4f81879b774
SHA25628c0c0f6b7f4ae3f1f466ad50b308bc080d02359898ac53e28d2aa69d6f01385
SHA5125cdbeb596adb6a5e7e95a9bff2146a34ac8e9efe6f79f677ec0da316db795315fb500dfd2e105b641f22e049925973556f828bf7d617f1a2a2de3038bdf570f0
-
Filesize
3.0MB
MD5abe2ed6c385a52a712928a6248afd0a2
SHA17814ec8a7170bfe5d93bc837edc0b4f81879b774
SHA25628c0c0f6b7f4ae3f1f466ad50b308bc080d02359898ac53e28d2aa69d6f01385
SHA5125cdbeb596adb6a5e7e95a9bff2146a34ac8e9efe6f79f677ec0da316db795315fb500dfd2e105b641f22e049925973556f828bf7d617f1a2a2de3038bdf570f0