Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 10:51
Static task
static1
Behavioral task
behavioral1
Sample
4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe
Resource
win10v2004-20230915-en
General
-
Target
4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe
-
Size
1.8MB
-
MD5
169b6a20fea6f9c6e68eb87e4a07db0d
-
SHA1
126fe5d3b39d0e1ae549edbc5e4b615db11454e7
-
SHA256
4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150
-
SHA512
967b70bc4073a949659d765e74786a94d77688123856c381c4a6462976a9bab3b9d6634512bf1b4d24d067373ccdb7a422600ad6c687325cf504191e12eb01b1
-
SSDEEP
49152:qFV8hLZda2Oxs537fOhRnjekVYZcsRCOpulN/H:MV8LZ/+98ZcsIOpOF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3016 Da1MZ02.exe 2940 uw0Ic44.exe 2120 LK3xq94.exe 2784 1Xn41Yv2.exe -
Loads dropped DLL 13 IoCs
pid Process 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 3016 Da1MZ02.exe 3016 Da1MZ02.exe 2940 uw0Ic44.exe 2940 uw0Ic44.exe 2120 LK3xq94.exe 2120 LK3xq94.exe 2120 LK3xq94.exe 2784 1Xn41Yv2.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Da1MZ02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" uw0Ic44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" LK3xq94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2484 2784 1Xn41Yv2.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2784 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 AppLaunch.exe 2484 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 2256 wrote to memory of 3016 2256 4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe 28 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 3016 wrote to memory of 2940 3016 Da1MZ02.exe 29 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2940 wrote to memory of 2120 2940 uw0Ic44.exe 30 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2120 wrote to memory of 2784 2120 LK3xq94.exe 31 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2484 2784 1Xn41Yv2.exe 32 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33 PID 2784 wrote to memory of 2504 2784 1Xn41Yv2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe"C:\Users\Admin\AppData\Local\Temp\4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2504
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5b237ee777ed80e71fcaac3db3003cc57
SHA13b3f8be131b830655c6620c46bfeeef91c231e19
SHA256900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390
SHA5120cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a
-
Filesize
1.7MB
MD5b237ee777ed80e71fcaac3db3003cc57
SHA13b3f8be131b830655c6620c46bfeeef91c231e19
SHA256900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390
SHA5120cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a
-
Filesize
1.2MB
MD5c9ce1186e23400bb11d422517d716bea
SHA185a6c17373c8094f2bb156f4fc2c158ed3e0ffda
SHA256c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3
SHA51204664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1
-
Filesize
1.2MB
MD5c9ce1186e23400bb11d422517d716bea
SHA185a6c17373c8094f2bb156f4fc2c158ed3e0ffda
SHA256c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3
SHA51204664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1
-
Filesize
732KB
MD52548cd0e30f2677ba53186fa823fe50f
SHA1e7ce80a16236e7e4b2bfd368f458c97117261b0a
SHA2565ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a
SHA5127585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5
-
Filesize
732KB
MD52548cd0e30f2677ba53186fa823fe50f
SHA1e7ce80a16236e7e4b2bfd368f458c97117261b0a
SHA2565ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a
SHA5127585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.7MB
MD5b237ee777ed80e71fcaac3db3003cc57
SHA13b3f8be131b830655c6620c46bfeeef91c231e19
SHA256900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390
SHA5120cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a
-
Filesize
1.7MB
MD5b237ee777ed80e71fcaac3db3003cc57
SHA13b3f8be131b830655c6620c46bfeeef91c231e19
SHA256900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390
SHA5120cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a
-
Filesize
1.2MB
MD5c9ce1186e23400bb11d422517d716bea
SHA185a6c17373c8094f2bb156f4fc2c158ed3e0ffda
SHA256c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3
SHA51204664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1
-
Filesize
1.2MB
MD5c9ce1186e23400bb11d422517d716bea
SHA185a6c17373c8094f2bb156f4fc2c158ed3e0ffda
SHA256c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3
SHA51204664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1
-
Filesize
732KB
MD52548cd0e30f2677ba53186fa823fe50f
SHA1e7ce80a16236e7e4b2bfd368f458c97117261b0a
SHA2565ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a
SHA5127585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5
-
Filesize
732KB
MD52548cd0e30f2677ba53186fa823fe50f
SHA1e7ce80a16236e7e4b2bfd368f458c97117261b0a
SHA2565ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a
SHA5127585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71
-
Filesize
1.8MB
MD554d6ada673609443faad54246d0c0c99
SHA1c8b385d71ebf088b46e399c4a6d999d4e9444a99
SHA256ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb
SHA512db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71