Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05/10/2023, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe
-
Size
1.8MB
-
MD5
cc82f18bba5d84b4971e91fbf589097c
-
SHA1
7c79e33c219d70f2bdf1ceb83ac991f1ed0e6c82
-
SHA256
806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02
-
SHA512
20acb22bac2a4bc5fea72952cd96762054ff07fb25469173fc81c2712c01c0eb430a16999424e6b4e0b452c1827ec06878a35807ab8e0460f24cbf80a55a3c5a
-
SSDEEP
49152:9o/+pXFpPkE4xOfTt86+5mrs0+tbBOa75NflvUO/j++:G+VLPIOLC/001BOG5N9sOK+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1992 DD5sP61.exe 2192 Ji3Iu02.exe 3004 Pi5GB14.exe 2728 1kv58Be7.exe -
Loads dropped DLL 13 IoCs
pid Process 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 1992 DD5sP61.exe 1992 DD5sP61.exe 2192 Ji3Iu02.exe 2192 Ji3Iu02.exe 3004 Pi5GB14.exe 3004 Pi5GB14.exe 3004 Pi5GB14.exe 2728 1kv58Be7.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" DD5sP61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ji3Iu02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Pi5GB14.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 2580 2728 1kv58Be7.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2756 2728 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 AppLaunch.exe 2580 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2580 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1116 wrote to memory of 1992 1116 806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe 28 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 1992 wrote to memory of 2192 1992 DD5sP61.exe 29 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 2192 wrote to memory of 3004 2192 Ji3Iu02.exe 30 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 3004 wrote to memory of 2728 3004 Pi5GB14.exe 31 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2580 2728 1kv58Be7.exe 32 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33 PID 2728 wrote to memory of 2756 2728 1kv58Be7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe"C:\Users\Admin\AppData\Local\Temp\806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2756
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d55ecd6f7e1abc01af1f8d39a44eeac3
SHA1c6f4601efccc05ceeae067a5cf6f0f5d7700472b
SHA256bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf
SHA5123d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720
-
Filesize
1.7MB
MD5d55ecd6f7e1abc01af1f8d39a44eeac3
SHA1c6f4601efccc05ceeae067a5cf6f0f5d7700472b
SHA256bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf
SHA5123d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720
-
Filesize
1.2MB
MD5d849d56e4c245f83b4d6b8d8fe01df57
SHA1e63633f351c897510a0ae4e36e053c0f46c4c20a
SHA2563d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb
SHA512d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd
-
Filesize
1.2MB
MD5d849d56e4c245f83b4d6b8d8fe01df57
SHA1e63633f351c897510a0ae4e36e053c0f46c4c20a
SHA2563d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb
SHA512d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd
-
Filesize
734KB
MD5f03a9ade23cba172099218e18fd2fb0f
SHA1be6cf64411529df80e0fc0fdd304c06476baa3cf
SHA256831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164
SHA5129e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249
-
Filesize
734KB
MD5f03a9ade23cba172099218e18fd2fb0f
SHA1be6cf64411529df80e0fc0fdd304c06476baa3cf
SHA256831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164
SHA5129e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.7MB
MD5d55ecd6f7e1abc01af1f8d39a44eeac3
SHA1c6f4601efccc05ceeae067a5cf6f0f5d7700472b
SHA256bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf
SHA5123d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720
-
Filesize
1.7MB
MD5d55ecd6f7e1abc01af1f8d39a44eeac3
SHA1c6f4601efccc05ceeae067a5cf6f0f5d7700472b
SHA256bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf
SHA5123d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720
-
Filesize
1.2MB
MD5d849d56e4c245f83b4d6b8d8fe01df57
SHA1e63633f351c897510a0ae4e36e053c0f46c4c20a
SHA2563d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb
SHA512d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd
-
Filesize
1.2MB
MD5d849d56e4c245f83b4d6b8d8fe01df57
SHA1e63633f351c897510a0ae4e36e053c0f46c4c20a
SHA2563d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb
SHA512d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd
-
Filesize
734KB
MD5f03a9ade23cba172099218e18fd2fb0f
SHA1be6cf64411529df80e0fc0fdd304c06476baa3cf
SHA256831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164
SHA5129e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249
-
Filesize
734KB
MD5f03a9ade23cba172099218e18fd2fb0f
SHA1be6cf64411529df80e0fc0fdd304c06476baa3cf
SHA256831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164
SHA5129e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a
-
Filesize
1.8MB
MD555c019d7f24b0c2291b6297a999800ef
SHA19cb5e50da25f09c5f2e56d9ec645dfc1bcf00045
SHA2566e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8
SHA5129368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a