Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
19a9ce312c50848a69ab8fa1aed5a9e7
-
SHA1
a84f7ee87eb89fcd833a2a2ebc406fdbe849d60b
-
SHA256
16c749bd31b89bd8ba0a20bbbd4884f5385c8071090bf9817348f31304191a78
-
SHA512
10856fc5ebe95a770faa688165eeaf744b9bd30be7492392bdd77e647fb5783362040a775951338bbb760cc6f92a78d434dff06fab3084620199e459dc30e1ea
-
SSDEEP
24576:/y0rz2aogTtf90h9jKKNr1POogyLqFTi1l:K0ragO9jKKNpDgF8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2104 Lc9LU48.exe 828 Cn8tH72.exe 2704 Qx9tF21.exe 2632 1yf74IR1.exe -
Loads dropped DLL 12 IoCs
pid Process 2076 file.exe 2104 Lc9LU48.exe 2104 Lc9LU48.exe 828 Cn8tH72.exe 828 Cn8tH72.exe 2704 Qx9tF21.exe 2704 Qx9tF21.exe 2632 1yf74IR1.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Lc9LU48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Cn8tH72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qx9tF21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 2340 2632 1yf74IR1.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2632 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2340 AppLaunch.exe 2340 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2076 wrote to memory of 2104 2076 file.exe 28 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 2104 wrote to memory of 828 2104 Lc9LU48.exe 29 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 828 wrote to memory of 2704 828 Cn8tH72.exe 30 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2704 wrote to memory of 2632 2704 Qx9tF21.exe 31 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2340 2632 1yf74IR1.exe 32 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33 PID 2632 wrote to memory of 2636 2632 1yf74IR1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lc9LU48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lc9LU48.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cn8tH72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cn8tH72.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx9tF21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx9tF21.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1yf74IR1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1yf74IR1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD541d21c74c96504f8611ecdc16d9dd904
SHA180ae9742429d5de7e8529fdf312fbf549a3918a0
SHA256686efe1fb41593d09bd8317e3c9ca8bd308515010bcfa7ef082fcbf944ae2332
SHA512c794d966248b792445ca43985125e13e4406f727b375e368996c8c2b1858f1b7410420deb794016939880b259fe287b07688e64800f6b005098839778bc91087
-
Filesize
960KB
MD541d21c74c96504f8611ecdc16d9dd904
SHA180ae9742429d5de7e8529fdf312fbf549a3918a0
SHA256686efe1fb41593d09bd8317e3c9ca8bd308515010bcfa7ef082fcbf944ae2332
SHA512c794d966248b792445ca43985125e13e4406f727b375e368996c8c2b1858f1b7410420deb794016939880b259fe287b07688e64800f6b005098839778bc91087
-
Filesize
656KB
MD58be3fc8b6a7803f96d285553b6490b92
SHA1bc1a11ebdf0a52ffe48c9ee14e1462eba32bd04b
SHA256087a8f4ecb1413449b2f669a5e15ed0569ed170cd5f8cc48d97ad4d10ae493dd
SHA51290c0aade621f05dbf0a3c914ebae0b59c4338d414ee06019dcdf324a63fc676e9814f2e2a4c155f03f4606e5f52e276e8615b2fcb4026e6d176b78e8dcc23ebd
-
Filesize
656KB
MD58be3fc8b6a7803f96d285553b6490b92
SHA1bc1a11ebdf0a52ffe48c9ee14e1462eba32bd04b
SHA256087a8f4ecb1413449b2f669a5e15ed0569ed170cd5f8cc48d97ad4d10ae493dd
SHA51290c0aade621f05dbf0a3c914ebae0b59c4338d414ee06019dcdf324a63fc676e9814f2e2a4c155f03f4606e5f52e276e8615b2fcb4026e6d176b78e8dcc23ebd
-
Filesize
402KB
MD5a7455300c5fad2cb169832e4f8348da1
SHA1991cc1cc9a842709a4da48fbf8792fb7977c67a4
SHA2566baf68319000c872999285cde45e7f9903ce2e4fb0ce320f9672b84fb956ec5a
SHA512985b3c74ee9dd33d479e68d3706e1d3c8ed809b9f4f6ff0f801a6787be276cef986198918258678fd0e6b8d537d19b95f0271f01f4cef63b0209cf948249ba92
-
Filesize
402KB
MD5a7455300c5fad2cb169832e4f8348da1
SHA1991cc1cc9a842709a4da48fbf8792fb7977c67a4
SHA2566baf68319000c872999285cde45e7f9903ce2e4fb0ce320f9672b84fb956ec5a
SHA512985b3c74ee9dd33d479e68d3706e1d3c8ed809b9f4f6ff0f801a6787be276cef986198918258678fd0e6b8d537d19b95f0271f01f4cef63b0209cf948249ba92
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
960KB
MD541d21c74c96504f8611ecdc16d9dd904
SHA180ae9742429d5de7e8529fdf312fbf549a3918a0
SHA256686efe1fb41593d09bd8317e3c9ca8bd308515010bcfa7ef082fcbf944ae2332
SHA512c794d966248b792445ca43985125e13e4406f727b375e368996c8c2b1858f1b7410420deb794016939880b259fe287b07688e64800f6b005098839778bc91087
-
Filesize
960KB
MD541d21c74c96504f8611ecdc16d9dd904
SHA180ae9742429d5de7e8529fdf312fbf549a3918a0
SHA256686efe1fb41593d09bd8317e3c9ca8bd308515010bcfa7ef082fcbf944ae2332
SHA512c794d966248b792445ca43985125e13e4406f727b375e368996c8c2b1858f1b7410420deb794016939880b259fe287b07688e64800f6b005098839778bc91087
-
Filesize
656KB
MD58be3fc8b6a7803f96d285553b6490b92
SHA1bc1a11ebdf0a52ffe48c9ee14e1462eba32bd04b
SHA256087a8f4ecb1413449b2f669a5e15ed0569ed170cd5f8cc48d97ad4d10ae493dd
SHA51290c0aade621f05dbf0a3c914ebae0b59c4338d414ee06019dcdf324a63fc676e9814f2e2a4c155f03f4606e5f52e276e8615b2fcb4026e6d176b78e8dcc23ebd
-
Filesize
656KB
MD58be3fc8b6a7803f96d285553b6490b92
SHA1bc1a11ebdf0a52ffe48c9ee14e1462eba32bd04b
SHA256087a8f4ecb1413449b2f669a5e15ed0569ed170cd5f8cc48d97ad4d10ae493dd
SHA51290c0aade621f05dbf0a3c914ebae0b59c4338d414ee06019dcdf324a63fc676e9814f2e2a4c155f03f4606e5f52e276e8615b2fcb4026e6d176b78e8dcc23ebd
-
Filesize
402KB
MD5a7455300c5fad2cb169832e4f8348da1
SHA1991cc1cc9a842709a4da48fbf8792fb7977c67a4
SHA2566baf68319000c872999285cde45e7f9903ce2e4fb0ce320f9672b84fb956ec5a
SHA512985b3c74ee9dd33d479e68d3706e1d3c8ed809b9f4f6ff0f801a6787be276cef986198918258678fd0e6b8d537d19b95f0271f01f4cef63b0209cf948249ba92
-
Filesize
402KB
MD5a7455300c5fad2cb169832e4f8348da1
SHA1991cc1cc9a842709a4da48fbf8792fb7977c67a4
SHA2566baf68319000c872999285cde45e7f9903ce2e4fb0ce320f9672b84fb956ec5a
SHA512985b3c74ee9dd33d479e68d3706e1d3c8ed809b9f4f6ff0f801a6787be276cef986198918258678fd0e6b8d537d19b95f0271f01f4cef63b0209cf948249ba92
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08
-
Filesize
276KB
MD53fefbe7df55b6a01a2e309529f81771b
SHA139a810fcabc85add2ddb3e5bd67d4f8b2251f3a4
SHA256c9bf36e37fd601fbd135c82c466c970c030bd78a3e8cf8d28b5206920377699f
SHA5127704cba675a3f3eae077744bf9b3473e275e4d1ffe4a6c76ee5ad3554aa95ff26f855f684f3d716f6459857c1e379e53780103e064fc178f383dcae03e39ce08