Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05/10/2023, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe
-
Size
1.9MB
-
MD5
a0e649f875205aeaa3f874a69a4a37b2
-
SHA1
44b6540998a3406ffbaff397d162f019a815b514
-
SHA256
2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8
-
SHA512
84cbc799b5e2c8a945668d1670886f5c5e3e704185c261715c3a09ca4a2811466c510c55eb0984850242eb590c212180fd6d952ba2200b7c4c00948533f31f42
-
SSDEEP
49152:w84Ccw0tMdYxUIaCo+AIn82qDOMA1x3zDEF3E4:w7naJIeRAP3zE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3020 nd1Gb69.exe 2360 zi3II92.exe 2764 YC1Kf17.exe 2836 1FL14Hh9.exe -
Loads dropped DLL 13 IoCs
pid Process 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 3020 nd1Gb69.exe 3020 nd1Gb69.exe 2360 zi3II92.exe 2360 zi3II92.exe 2764 YC1Kf17.exe 2764 YC1Kf17.exe 2764 YC1Kf17.exe 2836 1FL14Hh9.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nd1Gb69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zi3II92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" YC1Kf17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 2776 2836 1FL14Hh9.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 800 2836 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 AppLaunch.exe 2776 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 1720 wrote to memory of 3020 1720 2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe 28 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 3020 wrote to memory of 2360 3020 nd1Gb69.exe 29 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2360 wrote to memory of 2764 2360 zi3II92.exe 30 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2764 wrote to memory of 2836 2764 YC1Kf17.exe 31 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 2776 2836 1FL14Hh9.exe 32 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33 PID 2836 wrote to memory of 800 2836 1FL14Hh9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5a66d33474d0926b29d01ef886fd36172
SHA1f12ff32269484cbc08c965e0f7ac58dbb897d242
SHA256461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562
SHA512d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8
-
Filesize
1.7MB
MD5a66d33474d0926b29d01ef886fd36172
SHA1f12ff32269484cbc08c965e0f7ac58dbb897d242
SHA256461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562
SHA512d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8
-
Filesize
1.2MB
MD57c729f48efcc49f7b55225f8c66d361e
SHA169f75b20f6f8957f8565d3e6661ed6da55271afc
SHA2569938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e
SHA5124ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205
-
Filesize
1.2MB
MD57c729f48efcc49f7b55225f8c66d361e
SHA169f75b20f6f8957f8565d3e6661ed6da55271afc
SHA2569938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e
SHA5124ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205
-
Filesize
748KB
MD5cfdfd7540523c6fadf1c6b337a3312bc
SHA19c0e42b4a286d4816ea28457616033cf0dc6c8cd
SHA256cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737
SHA51244ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf
-
Filesize
748KB
MD5cfdfd7540523c6fadf1c6b337a3312bc
SHA19c0e42b4a286d4816ea28457616033cf0dc6c8cd
SHA256cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737
SHA51244ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.7MB
MD5a66d33474d0926b29d01ef886fd36172
SHA1f12ff32269484cbc08c965e0f7ac58dbb897d242
SHA256461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562
SHA512d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8
-
Filesize
1.7MB
MD5a66d33474d0926b29d01ef886fd36172
SHA1f12ff32269484cbc08c965e0f7ac58dbb897d242
SHA256461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562
SHA512d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8
-
Filesize
1.2MB
MD57c729f48efcc49f7b55225f8c66d361e
SHA169f75b20f6f8957f8565d3e6661ed6da55271afc
SHA2569938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e
SHA5124ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205
-
Filesize
1.2MB
MD57c729f48efcc49f7b55225f8c66d361e
SHA169f75b20f6f8957f8565d3e6661ed6da55271afc
SHA2569938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e
SHA5124ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205
-
Filesize
748KB
MD5cfdfd7540523c6fadf1c6b337a3312bc
SHA19c0e42b4a286d4816ea28457616033cf0dc6c8cd
SHA256cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737
SHA51244ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf
-
Filesize
748KB
MD5cfdfd7540523c6fadf1c6b337a3312bc
SHA19c0e42b4a286d4816ea28457616033cf0dc6c8cd
SHA256cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737
SHA51244ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220