Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05/10/2023, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
afa609df1a40837b445b849bf2c38fa9
-
SHA1
fdb7e282bb4ae52e01584a2012182dc00f740e6a
-
SHA256
eadfa96ccc8310d66e17163dca4825b97b5ca5d510faf53449a85caafdc66809
-
SHA512
7efae8e627d984b1851ed8a735f2f09e2726c0bb7b71e2a9d2f8493b8df85377518bd7dc22ee9be180f3bda26f263db799e8ac2bc1d131ad64f9dae5d1f2ecc5
-
SSDEEP
49152:oq5qM4OTO/Nz4oRZ8mnl8s9gGSFZBIjyanymo6vo+L8GbOkU:pHK/Nz4uZ8mnWGSbBITyFOhbOb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1732 Ho1yU43.exe 2112 Wn5ZA58.exe 2756 gP0GU95.exe 2940 1Tj17kT0.exe -
Loads dropped DLL 13 IoCs
pid Process 2080 file.exe 1732 Ho1yU43.exe 1732 Ho1yU43.exe 2112 Wn5ZA58.exe 2112 Wn5ZA58.exe 2756 gP0GU95.exe 2756 gP0GU95.exe 2756 gP0GU95.exe 2940 1Tj17kT0.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Wn5ZA58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gP0GU95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ho1yU43.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 2608 2940 1Tj17kT0.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2940 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2608 AppLaunch.exe 2608 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2608 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 2080 wrote to memory of 1732 2080 file.exe 28 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 1732 wrote to memory of 2112 1732 Ho1yU43.exe 29 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2112 wrote to memory of 2756 2112 Wn5ZA58.exe 30 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2756 wrote to memory of 2940 2756 gP0GU95.exe 31 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2608 2940 1Tj17kT0.exe 32 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33 PID 2940 wrote to memory of 2912 2940 1Tj17kT0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ho1yU43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ho1yU43.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Wn5ZA58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Wn5ZA58.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gP0GU95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gP0GU95.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tj17kT0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tj17kT0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5738f64e8f699e0c77662f60a26d2536f
SHA105253239a7ad90c64255c87e5229fe56ec6d8b8e
SHA2562100b9b63e44e3857c32584250af5abac1709e1c10b77b2d06cc5d47080047fc
SHA512e82da64ce522a4ac9bb73758223ad438baea3504536e439bfa53720c7820b153133d370ef6b454f555c91db3f13f0ce12e74084a2f6bc7e437b0d7a73bbbfd6d
-
Filesize
1.7MB
MD5738f64e8f699e0c77662f60a26d2536f
SHA105253239a7ad90c64255c87e5229fe56ec6d8b8e
SHA2562100b9b63e44e3857c32584250af5abac1709e1c10b77b2d06cc5d47080047fc
SHA512e82da64ce522a4ac9bb73758223ad438baea3504536e439bfa53720c7820b153133d370ef6b454f555c91db3f13f0ce12e74084a2f6bc7e437b0d7a73bbbfd6d
-
Filesize
1.2MB
MD50413dcfbd79445706c8d681fd0dc37b5
SHA1c67af7b97531f07f8595069cfe123cf307354aa6
SHA2564616e67c74d8ed0b48ed4ec194ee0b0041bca384cfdd9d73d927f033fd8f790a
SHA512fdf5e401316e9e3394dac527415e4aef187f7ddb19a6b240484514e0c9ba36cbdc78a8a2dc3bb1b0022747ca096a8d7dda4160a99614e371d51ea901c68dcf7b
-
Filesize
1.2MB
MD50413dcfbd79445706c8d681fd0dc37b5
SHA1c67af7b97531f07f8595069cfe123cf307354aa6
SHA2564616e67c74d8ed0b48ed4ec194ee0b0041bca384cfdd9d73d927f033fd8f790a
SHA512fdf5e401316e9e3394dac527415e4aef187f7ddb19a6b240484514e0c9ba36cbdc78a8a2dc3bb1b0022747ca096a8d7dda4160a99614e371d51ea901c68dcf7b
-
Filesize
754KB
MD58554d44695f27103d38507592d0d9d55
SHA1948baa45981d812094f1b946f930c214f2204611
SHA256f167a0f42e95c1f72e01138ad6105c5b4f8f0079f2b638cc0e7d1d1fbb607371
SHA5126549ec8e7f8cfcf2bac38821a18b48fdafaeb6d2f1d0026d4735eda8e4634e096b707c37c255a5c9b96e781e56423e8dd123b83b1db5823714948530f66a209d
-
Filesize
754KB
MD58554d44695f27103d38507592d0d9d55
SHA1948baa45981d812094f1b946f930c214f2204611
SHA256f167a0f42e95c1f72e01138ad6105c5b4f8f0079f2b638cc0e7d1d1fbb607371
SHA5126549ec8e7f8cfcf2bac38821a18b48fdafaeb6d2f1d0026d4735eda8e4634e096b707c37c255a5c9b96e781e56423e8dd123b83b1db5823714948530f66a209d
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.7MB
MD5738f64e8f699e0c77662f60a26d2536f
SHA105253239a7ad90c64255c87e5229fe56ec6d8b8e
SHA2562100b9b63e44e3857c32584250af5abac1709e1c10b77b2d06cc5d47080047fc
SHA512e82da64ce522a4ac9bb73758223ad438baea3504536e439bfa53720c7820b153133d370ef6b454f555c91db3f13f0ce12e74084a2f6bc7e437b0d7a73bbbfd6d
-
Filesize
1.7MB
MD5738f64e8f699e0c77662f60a26d2536f
SHA105253239a7ad90c64255c87e5229fe56ec6d8b8e
SHA2562100b9b63e44e3857c32584250af5abac1709e1c10b77b2d06cc5d47080047fc
SHA512e82da64ce522a4ac9bb73758223ad438baea3504536e439bfa53720c7820b153133d370ef6b454f555c91db3f13f0ce12e74084a2f6bc7e437b0d7a73bbbfd6d
-
Filesize
1.2MB
MD50413dcfbd79445706c8d681fd0dc37b5
SHA1c67af7b97531f07f8595069cfe123cf307354aa6
SHA2564616e67c74d8ed0b48ed4ec194ee0b0041bca384cfdd9d73d927f033fd8f790a
SHA512fdf5e401316e9e3394dac527415e4aef187f7ddb19a6b240484514e0c9ba36cbdc78a8a2dc3bb1b0022747ca096a8d7dda4160a99614e371d51ea901c68dcf7b
-
Filesize
1.2MB
MD50413dcfbd79445706c8d681fd0dc37b5
SHA1c67af7b97531f07f8595069cfe123cf307354aa6
SHA2564616e67c74d8ed0b48ed4ec194ee0b0041bca384cfdd9d73d927f033fd8f790a
SHA512fdf5e401316e9e3394dac527415e4aef187f7ddb19a6b240484514e0c9ba36cbdc78a8a2dc3bb1b0022747ca096a8d7dda4160a99614e371d51ea901c68dcf7b
-
Filesize
754KB
MD58554d44695f27103d38507592d0d9d55
SHA1948baa45981d812094f1b946f930c214f2204611
SHA256f167a0f42e95c1f72e01138ad6105c5b4f8f0079f2b638cc0e7d1d1fbb607371
SHA5126549ec8e7f8cfcf2bac38821a18b48fdafaeb6d2f1d0026d4735eda8e4634e096b707c37c255a5c9b96e781e56423e8dd123b83b1db5823714948530f66a209d
-
Filesize
754KB
MD58554d44695f27103d38507592d0d9d55
SHA1948baa45981d812094f1b946f930c214f2204611
SHA256f167a0f42e95c1f72e01138ad6105c5b4f8f0079f2b638cc0e7d1d1fbb607371
SHA5126549ec8e7f8cfcf2bac38821a18b48fdafaeb6d2f1d0026d4735eda8e4634e096b707c37c255a5c9b96e781e56423e8dd123b83b1db5823714948530f66a209d
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd
-
Filesize
1.8MB
MD5dabc2e949605d95f0906e2c010ab6c67
SHA1c24164238e8470cbe2eff6bed666e9f5ce24b7f3
SHA256f092338697cdb1bf9892324b9ec5295a74b814e82639c73037ad39d0be9f14b4
SHA512bf48f2e946e254f8e11cd6979515afa015f1d2c897489ec08b23e01ec6e34bbd8472e92e6fe09cc48046f63da2689e66f2c35f6faafc865324cc6ca922da28bd