Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe
Resource
win10v2004-20230915-en
General
-
Target
ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe
-
Size
1.8MB
-
MD5
846ed43a3492fc173b26ea7beee0af79
-
SHA1
7f1e9fb420b4f1d273ac960a329e6850e5c78972
-
SHA256
ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e
-
SHA512
7d65c2fd48e363a0363176d9b4c2b167a9f53dc2adcae0855c10bdbe99fe0e1d4e80c8773cb306693e399a8ce8d975562878a38dda3f4361d0799042ad4b6f57
-
SSDEEP
49152:CQsKaFYRq1FBh/QPvMsiBccPJ2Z/ueqVgfp+qO:/+ecPsCJPQ/uzCxy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2036 iP7pu89.exe 2380 Ol6ru32.exe 2316 EU3nM15.exe 2724 1Lc32VT0.exe -
Loads dropped DLL 13 IoCs
pid Process 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 2036 iP7pu89.exe 2036 iP7pu89.exe 2380 Ol6ru32.exe 2380 Ol6ru32.exe 2316 EU3nM15.exe 2316 EU3nM15.exe 2316 EU3nM15.exe 2724 1Lc32VT0.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" iP7pu89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ol6ru32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" EU3nM15.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2612 2724 1Lc32VT0.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2696 2724 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2612 AppLaunch.exe 2612 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2456 wrote to memory of 2036 2456 ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe 28 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2036 wrote to memory of 2380 2036 iP7pu89.exe 29 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2380 wrote to memory of 2316 2380 Ol6ru32.exe 30 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2316 wrote to memory of 2724 2316 EU3nM15.exe 31 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2612 2724 1Lc32VT0.exe 32 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33 PID 2724 wrote to memory of 2696 2724 1Lc32VT0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe"C:\Users\Admin\AppData\Local\Temp\ceec8600f1ab6b470e281bcc99ac1a8ba3403a2d6c308b6fd9f0339e358f8f5e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iP7pu89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iP7pu89.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ol6ru32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ol6ru32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EU3nM15.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EU3nM15.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lc32VT0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lc32VT0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD58075c50324247d25ed2285a9ec0b0dab
SHA192966f87f0fc85eb03dc772a910d92c42ae4c008
SHA256cf74f215ad5f0da954c7fb46782a9cccb565457f4c5954922acb9db47c92c635
SHA512a853cfcbf1e7664a90dfdd5732f0faae1461d19c90ac6601a2de515cad6d803dd5359659dc5d610075e62ec7918bf3ae2a8bcec65ec3959d0bf49d4e888cc9bb
-
Filesize
1.7MB
MD58075c50324247d25ed2285a9ec0b0dab
SHA192966f87f0fc85eb03dc772a910d92c42ae4c008
SHA256cf74f215ad5f0da954c7fb46782a9cccb565457f4c5954922acb9db47c92c635
SHA512a853cfcbf1e7664a90dfdd5732f0faae1461d19c90ac6601a2de515cad6d803dd5359659dc5d610075e62ec7918bf3ae2a8bcec65ec3959d0bf49d4e888cc9bb
-
Filesize
1.2MB
MD577fe37a7a8dc3b90a7d629db520627e3
SHA19b46f25b1dedb19046204379ca82441c3d0d9219
SHA25612aca05909b420222a66912e76a04e58ab8b3f8fd74696a3b64bfb21af95efa3
SHA5129297d516bd96f3da34be4353c2ec2e5ed3b9a3e90857821729c7bb3a6c3a621a4eb9e70f0df0803076cb25348c09829d5fdfb001b26aa48f82a0087387fa841d
-
Filesize
1.2MB
MD577fe37a7a8dc3b90a7d629db520627e3
SHA19b46f25b1dedb19046204379ca82441c3d0d9219
SHA25612aca05909b420222a66912e76a04e58ab8b3f8fd74696a3b64bfb21af95efa3
SHA5129297d516bd96f3da34be4353c2ec2e5ed3b9a3e90857821729c7bb3a6c3a621a4eb9e70f0df0803076cb25348c09829d5fdfb001b26aa48f82a0087387fa841d
-
Filesize
725KB
MD5e00bcce8b3261111e2fdc8739d14a51d
SHA1c67252128af680b393e96ddf84014da07e729df0
SHA256e7034cd159bed31a3f370c7d15ba07f03debc54ab8ff6255ccfe2542ea691d8c
SHA51231956d1a90ae572ad042511602607e2a2934341c7ec6024f3bebfe8f6625bbd9e9bb056cbfadd9a56fc87b83cb689917d70ffe144fb36710a9ae128987f40e88
-
Filesize
725KB
MD5e00bcce8b3261111e2fdc8739d14a51d
SHA1c67252128af680b393e96ddf84014da07e729df0
SHA256e7034cd159bed31a3f370c7d15ba07f03debc54ab8ff6255ccfe2542ea691d8c
SHA51231956d1a90ae572ad042511602607e2a2934341c7ec6024f3bebfe8f6625bbd9e9bb056cbfadd9a56fc87b83cb689917d70ffe144fb36710a9ae128987f40e88
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.7MB
MD58075c50324247d25ed2285a9ec0b0dab
SHA192966f87f0fc85eb03dc772a910d92c42ae4c008
SHA256cf74f215ad5f0da954c7fb46782a9cccb565457f4c5954922acb9db47c92c635
SHA512a853cfcbf1e7664a90dfdd5732f0faae1461d19c90ac6601a2de515cad6d803dd5359659dc5d610075e62ec7918bf3ae2a8bcec65ec3959d0bf49d4e888cc9bb
-
Filesize
1.7MB
MD58075c50324247d25ed2285a9ec0b0dab
SHA192966f87f0fc85eb03dc772a910d92c42ae4c008
SHA256cf74f215ad5f0da954c7fb46782a9cccb565457f4c5954922acb9db47c92c635
SHA512a853cfcbf1e7664a90dfdd5732f0faae1461d19c90ac6601a2de515cad6d803dd5359659dc5d610075e62ec7918bf3ae2a8bcec65ec3959d0bf49d4e888cc9bb
-
Filesize
1.2MB
MD577fe37a7a8dc3b90a7d629db520627e3
SHA19b46f25b1dedb19046204379ca82441c3d0d9219
SHA25612aca05909b420222a66912e76a04e58ab8b3f8fd74696a3b64bfb21af95efa3
SHA5129297d516bd96f3da34be4353c2ec2e5ed3b9a3e90857821729c7bb3a6c3a621a4eb9e70f0df0803076cb25348c09829d5fdfb001b26aa48f82a0087387fa841d
-
Filesize
1.2MB
MD577fe37a7a8dc3b90a7d629db520627e3
SHA19b46f25b1dedb19046204379ca82441c3d0d9219
SHA25612aca05909b420222a66912e76a04e58ab8b3f8fd74696a3b64bfb21af95efa3
SHA5129297d516bd96f3da34be4353c2ec2e5ed3b9a3e90857821729c7bb3a6c3a621a4eb9e70f0df0803076cb25348c09829d5fdfb001b26aa48f82a0087387fa841d
-
Filesize
725KB
MD5e00bcce8b3261111e2fdc8739d14a51d
SHA1c67252128af680b393e96ddf84014da07e729df0
SHA256e7034cd159bed31a3f370c7d15ba07f03debc54ab8ff6255ccfe2542ea691d8c
SHA51231956d1a90ae572ad042511602607e2a2934341c7ec6024f3bebfe8f6625bbd9e9bb056cbfadd9a56fc87b83cb689917d70ffe144fb36710a9ae128987f40e88
-
Filesize
725KB
MD5e00bcce8b3261111e2fdc8739d14a51d
SHA1c67252128af680b393e96ddf84014da07e729df0
SHA256e7034cd159bed31a3f370c7d15ba07f03debc54ab8ff6255ccfe2542ea691d8c
SHA51231956d1a90ae572ad042511602607e2a2934341c7ec6024f3bebfe8f6625bbd9e9bb056cbfadd9a56fc87b83cb689917d70ffe144fb36710a9ae128987f40e88
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158