Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 03:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
a82226aa52c0be50b8485764558466c7
-
SHA1
6f63ef7d0db073e6882129bafd39be00564f2ee6
-
SHA256
2e3a55006d972b0b509781a017d1749c5b32c436d96e1943478a79e444645067
-
SHA512
aaf5df7fefea3cf878fc013d89529f8477c165aafd617df6f5e68c2156f6dc7c3ce49479158a05765a05c9c4d2d26721559cde49b4b7b14b805a45383c5f9dbb
-
SSDEEP
24576:VyaxS8wEIVWpO7tP9fRpS5xFKWz4a51pLlChmht4Gj/ri7o4VV:waAyIw07tPtaFPzFle0tX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2948 Ky1AC15.exe 2664 Op9Fk77.exe 2784 rI7FK34.exe 2772 1Ff69WZ4.exe -
Loads dropped DLL 12 IoCs
pid Process 2600 file.exe 2948 Ky1AC15.exe 2948 Ky1AC15.exe 2664 Op9Fk77.exe 2664 Op9Fk77.exe 2784 rI7FK34.exe 2784 rI7FK34.exe 2772 1Ff69WZ4.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Op9Fk77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rI7FK34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ky1AC15.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 2808 2772 1Ff69WZ4.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2772 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 AppLaunch.exe 2808 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2600 wrote to memory of 2948 2600 file.exe 28 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2948 wrote to memory of 2664 2948 Ky1AC15.exe 29 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2664 wrote to memory of 2784 2664 Op9Fk77.exe 30 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2784 wrote to memory of 2772 2784 rI7FK34.exe 31 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2808 2772 1Ff69WZ4.exe 32 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33 PID 2772 wrote to memory of 2912 2772 1Ff69WZ4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ky1AC15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ky1AC15.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Op9Fk77.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Op9Fk77.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rI7FK34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rI7FK34.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ff69WZ4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ff69WZ4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD5c7d606e2c52cb54347c035c4f20385af
SHA1fd14a9789a5cb3291a9fc9a21fc6a7011df32cfc
SHA2563ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3
SHA512c3a07f6ef78ffdf38fee9613b451476e0c17aceebe9115bfd63c02350989197b15426fc854a3cc7a59878a3baa274c1a55b988374003389ee3ccbfa346ebce22
-
Filesize
956KB
MD5c7d606e2c52cb54347c035c4f20385af
SHA1fd14a9789a5cb3291a9fc9a21fc6a7011df32cfc
SHA2563ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3
SHA512c3a07f6ef78ffdf38fee9613b451476e0c17aceebe9115bfd63c02350989197b15426fc854a3cc7a59878a3baa274c1a55b988374003389ee3ccbfa346ebce22
-
Filesize
654KB
MD506b98319424809f40aab2aa25a0eaa97
SHA129f5653c0c8ab96dfc5448dfa7905065e0b30eca
SHA256bfe6775656ff4b278516ca6770f7e49cdee3e0634740689f1861860ee20ed7c5
SHA512934a7379d9ad87c00a29ee0c217359e938488d7fba16e7cf0a21bbd8645b1eb7d7466afbaef6ddf03d41e8b1173ab014d08f53c0f34c6bcaf3cf748b8736763e
-
Filesize
654KB
MD506b98319424809f40aab2aa25a0eaa97
SHA129f5653c0c8ab96dfc5448dfa7905065e0b30eca
SHA256bfe6775656ff4b278516ca6770f7e49cdee3e0634740689f1861860ee20ed7c5
SHA512934a7379d9ad87c00a29ee0c217359e938488d7fba16e7cf0a21bbd8645b1eb7d7466afbaef6ddf03d41e8b1173ab014d08f53c0f34c6bcaf3cf748b8736763e
-
Filesize
403KB
MD55b0f6bb73b28259e867536399af3480c
SHA1d10b298aeb766e21d47408fc73f505a7187cbf0c
SHA256fbe4d3d9dd6925d40a98ede371080a34a3e68fef342f5c66f4d8eceaec5c342e
SHA512eca50c7f7b38a83eed685669579714c568b9198860c2dd60ead8f039f81ed9a2b241b208e31e5829fe480557f23a12fc5030796750396f0fa6ea50f310362f23
-
Filesize
403KB
MD55b0f6bb73b28259e867536399af3480c
SHA1d10b298aeb766e21d47408fc73f505a7187cbf0c
SHA256fbe4d3d9dd6925d40a98ede371080a34a3e68fef342f5c66f4d8eceaec5c342e
SHA512eca50c7f7b38a83eed685669579714c568b9198860c2dd60ead8f039f81ed9a2b241b208e31e5829fe480557f23a12fc5030796750396f0fa6ea50f310362f23
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
956KB
MD5c7d606e2c52cb54347c035c4f20385af
SHA1fd14a9789a5cb3291a9fc9a21fc6a7011df32cfc
SHA2563ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3
SHA512c3a07f6ef78ffdf38fee9613b451476e0c17aceebe9115bfd63c02350989197b15426fc854a3cc7a59878a3baa274c1a55b988374003389ee3ccbfa346ebce22
-
Filesize
956KB
MD5c7d606e2c52cb54347c035c4f20385af
SHA1fd14a9789a5cb3291a9fc9a21fc6a7011df32cfc
SHA2563ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3
SHA512c3a07f6ef78ffdf38fee9613b451476e0c17aceebe9115bfd63c02350989197b15426fc854a3cc7a59878a3baa274c1a55b988374003389ee3ccbfa346ebce22
-
Filesize
654KB
MD506b98319424809f40aab2aa25a0eaa97
SHA129f5653c0c8ab96dfc5448dfa7905065e0b30eca
SHA256bfe6775656ff4b278516ca6770f7e49cdee3e0634740689f1861860ee20ed7c5
SHA512934a7379d9ad87c00a29ee0c217359e938488d7fba16e7cf0a21bbd8645b1eb7d7466afbaef6ddf03d41e8b1173ab014d08f53c0f34c6bcaf3cf748b8736763e
-
Filesize
654KB
MD506b98319424809f40aab2aa25a0eaa97
SHA129f5653c0c8ab96dfc5448dfa7905065e0b30eca
SHA256bfe6775656ff4b278516ca6770f7e49cdee3e0634740689f1861860ee20ed7c5
SHA512934a7379d9ad87c00a29ee0c217359e938488d7fba16e7cf0a21bbd8645b1eb7d7466afbaef6ddf03d41e8b1173ab014d08f53c0f34c6bcaf3cf748b8736763e
-
Filesize
403KB
MD55b0f6bb73b28259e867536399af3480c
SHA1d10b298aeb766e21d47408fc73f505a7187cbf0c
SHA256fbe4d3d9dd6925d40a98ede371080a34a3e68fef342f5c66f4d8eceaec5c342e
SHA512eca50c7f7b38a83eed685669579714c568b9198860c2dd60ead8f039f81ed9a2b241b208e31e5829fe480557f23a12fc5030796750396f0fa6ea50f310362f23
-
Filesize
403KB
MD55b0f6bb73b28259e867536399af3480c
SHA1d10b298aeb766e21d47408fc73f505a7187cbf0c
SHA256fbe4d3d9dd6925d40a98ede371080a34a3e68fef342f5c66f4d8eceaec5c342e
SHA512eca50c7f7b38a83eed685669579714c568b9198860c2dd60ead8f039f81ed9a2b241b208e31e5829fe480557f23a12fc5030796750396f0fa6ea50f310362f23
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a
-
Filesize
277KB
MD557b209441e027b6f046eb096af754dea
SHA1c0ba339a2e2f0452f92504dc457ed0a13c75d60f
SHA25617f767d30ed32e2a7cd42ac45ef3335bde326720e7b5a04c856a2cc3ab7076b8
SHA512a93a70f7dc32d4416b392359df22da01fcc73ef84ff9484437dc6ef6d11b678abbeb7cfc4ae5b168823c44573b7ba112fc2ce3ae978240e558774cd2d738c86a