Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 07:00
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
6b043f7b06e1cd30fd2cb9c027c2e49e
-
SHA1
0f43fe7998c933a625ef9415599c3fc30652fb3b
-
SHA256
be9d5bb1cec536aa80f16fcc1f9c5d4245d2e9bda7c8c15ca417a12526d43c2c
-
SHA512
d1738abf081485079d4e0e3aee557b1ce660b5b520991ea5eedf37bf16f29ab1c77c9d0634174d69167c17c3aea0dc9682d46cdb3a5d53e154c11e003d46671d
-
SSDEEP
24576:myFOdL0IdHppyQOjw/f2i5hnZiYKVp793JSXz/LK:1FOl0IpyQZfDfY/v0z/L
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2356 DB0lD55.exe 2068 Nj0BH71.exe 2772 VD5it37.exe 2660 1Mr82Vy3.exe -
Loads dropped DLL 12 IoCs
pid Process 1968 file.exe 2356 DB0lD55.exe 2356 DB0lD55.exe 2068 Nj0BH71.exe 2068 Nj0BH71.exe 2772 VD5it37.exe 2772 VD5it37.exe 2660 1Mr82Vy3.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" DB0lD55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Nj0BH71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" VD5it37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 2848 2660 1Mr82Vy3.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2952 2660 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2848 AppLaunch.exe 2848 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 1968 wrote to memory of 2356 1968 file.exe 29 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2356 wrote to memory of 2068 2356 DB0lD55.exe 30 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2068 wrote to memory of 2772 2068 Nj0BH71.exe 31 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2772 wrote to memory of 2660 2772 VD5it37.exe 32 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2848 2660 1Mr82Vy3.exe 34 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35 PID 2660 wrote to memory of 2952 2660 1Mr82Vy3.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0lD55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0lD55.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nj0BH71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nj0BH71.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VD5it37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VD5it37.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Mr82Vy3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Mr82Vy3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2952
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
909KB
MD5ba42e20d227b4c0e8c235a03d247f150
SHA1a14a6f290e540d57dda0fc46c4b9097c43ddb110
SHA25602e51d503a0b527652b4c056faf3c5aeada709b8081f414c54208d2884181daa
SHA5123ec45774915168905c7aa27314c2e892d3dbf40a83f2118d6758b183a3cdb7b789282f0f8aeb2135519765396f970f116ec5819b36735d0a15525202dfe6e36b
-
Filesize
909KB
MD5ba42e20d227b4c0e8c235a03d247f150
SHA1a14a6f290e540d57dda0fc46c4b9097c43ddb110
SHA25602e51d503a0b527652b4c056faf3c5aeada709b8081f414c54208d2884181daa
SHA5123ec45774915168905c7aa27314c2e892d3dbf40a83f2118d6758b183a3cdb7b789282f0f8aeb2135519765396f970f116ec5819b36735d0a15525202dfe6e36b
-
Filesize
621KB
MD592e4574bc98d05528c9c42167f630971
SHA13303dd8f823690c169d49492c1ea52d784796d25
SHA256a17673d87dac3dbdf22ba7601f959b161afbcf2a2791590cf805068f7148b759
SHA512d16938abaf4b19c97451d9332087c97a3cb1c0ec7887c3b32e9a8641336bc54d686e8cb9fcbf5d515932de53017735a7ca1892ae1ae453123a4edad3f0132cbe
-
Filesize
621KB
MD592e4574bc98d05528c9c42167f630971
SHA13303dd8f823690c169d49492c1ea52d784796d25
SHA256a17673d87dac3dbdf22ba7601f959b161afbcf2a2791590cf805068f7148b759
SHA512d16938abaf4b19c97451d9332087c97a3cb1c0ec7887c3b32e9a8641336bc54d686e8cb9fcbf5d515932de53017735a7ca1892ae1ae453123a4edad3f0132cbe
-
Filesize
382KB
MD500b2832b8c738ae03c71614a8c020e84
SHA10daf365f2db562a88c502915c3d635308b661329
SHA256500e453ddcb616d01b5214dfacc22541de70ee4402b126d6bb9680ce8086b8d4
SHA512f63e240c2970b9eff6be47025b41f0040d07ea17efac194fde1dfe9d42f45127030e7909f729c2f55b117ee31f820a042c830c9de9a236b3fb61fe9e1bd50431
-
Filesize
382KB
MD500b2832b8c738ae03c71614a8c020e84
SHA10daf365f2db562a88c502915c3d635308b661329
SHA256500e453ddcb616d01b5214dfacc22541de70ee4402b126d6bb9680ce8086b8d4
SHA512f63e240c2970b9eff6be47025b41f0040d07ea17efac194fde1dfe9d42f45127030e7909f729c2f55b117ee31f820a042c830c9de9a236b3fb61fe9e1bd50431
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
909KB
MD5ba42e20d227b4c0e8c235a03d247f150
SHA1a14a6f290e540d57dda0fc46c4b9097c43ddb110
SHA25602e51d503a0b527652b4c056faf3c5aeada709b8081f414c54208d2884181daa
SHA5123ec45774915168905c7aa27314c2e892d3dbf40a83f2118d6758b183a3cdb7b789282f0f8aeb2135519765396f970f116ec5819b36735d0a15525202dfe6e36b
-
Filesize
909KB
MD5ba42e20d227b4c0e8c235a03d247f150
SHA1a14a6f290e540d57dda0fc46c4b9097c43ddb110
SHA25602e51d503a0b527652b4c056faf3c5aeada709b8081f414c54208d2884181daa
SHA5123ec45774915168905c7aa27314c2e892d3dbf40a83f2118d6758b183a3cdb7b789282f0f8aeb2135519765396f970f116ec5819b36735d0a15525202dfe6e36b
-
Filesize
621KB
MD592e4574bc98d05528c9c42167f630971
SHA13303dd8f823690c169d49492c1ea52d784796d25
SHA256a17673d87dac3dbdf22ba7601f959b161afbcf2a2791590cf805068f7148b759
SHA512d16938abaf4b19c97451d9332087c97a3cb1c0ec7887c3b32e9a8641336bc54d686e8cb9fcbf5d515932de53017735a7ca1892ae1ae453123a4edad3f0132cbe
-
Filesize
621KB
MD592e4574bc98d05528c9c42167f630971
SHA13303dd8f823690c169d49492c1ea52d784796d25
SHA256a17673d87dac3dbdf22ba7601f959b161afbcf2a2791590cf805068f7148b759
SHA512d16938abaf4b19c97451d9332087c97a3cb1c0ec7887c3b32e9a8641336bc54d686e8cb9fcbf5d515932de53017735a7ca1892ae1ae453123a4edad3f0132cbe
-
Filesize
382KB
MD500b2832b8c738ae03c71614a8c020e84
SHA10daf365f2db562a88c502915c3d635308b661329
SHA256500e453ddcb616d01b5214dfacc22541de70ee4402b126d6bb9680ce8086b8d4
SHA512f63e240c2970b9eff6be47025b41f0040d07ea17efac194fde1dfe9d42f45127030e7909f729c2f55b117ee31f820a042c830c9de9a236b3fb61fe9e1bd50431
-
Filesize
382KB
MD500b2832b8c738ae03c71614a8c020e84
SHA10daf365f2db562a88c502915c3d635308b661329
SHA256500e453ddcb616d01b5214dfacc22541de70ee4402b126d6bb9680ce8086b8d4
SHA512f63e240c2970b9eff6be47025b41f0040d07ea17efac194fde1dfe9d42f45127030e7909f729c2f55b117ee31f820a042c830c9de9a236b3fb61fe9e1bd50431
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a
-
Filesize
237KB
MD5677d51755f3b271dfec873b7aa9feb57
SHA14551cef3d30ff8e8e9b08631f1e0bfefb9d69a8d
SHA2562c4924323f046045c48eb80d9df482a34395ff0cf40b1c8745bfb3fb1b73ccac
SHA51249ed6ce0f83dffcf80fd7865205dfbcffe40a2aab0a66ace740ab9f33898cb64364299c93e8fdbc0dce79edc2cd52ce95b476d40fb61db4b712ee958b3958e5a