Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 15:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
e097be295f35b05aa29c034d54fc95cc
-
SHA1
29446ae9538142fe4c6c8d8df5b488352296888a
-
SHA256
b695ad94565fb8b3e343f4d8636369f6acf45a9d2081c4aef87dff845c092a94
-
SHA512
bceecd52c6b6dc9d611ab03c5e96b8d8ab38c360f440f9ec73fcec91c44ca67fa63ccc610859080e4427e8784198c40beddbabcab4c65dabb35a2c4c11762c3f
-
SSDEEP
24576:eyUNimDolVLEW6EWe7kfWi+Oflhr4CQvERtbiVeecVSw1K218v:t6QVLL6EWIkuJCzjME7oeeQ58
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2320 hj9sE16.exe 2740 qJ4is96.exe 2908 VO2NX62.exe 2620 1Dp81oC4.exe -
Loads dropped DLL 12 IoCs
pid Process 2692 file.exe 2320 hj9sE16.exe 2320 hj9sE16.exe 2740 qJ4is96.exe 2740 qJ4is96.exe 2908 VO2NX62.exe 2908 VO2NX62.exe 2620 1Dp81oC4.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hj9sE16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qJ4is96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" VO2NX62.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 2528 2620 1Dp81oC4.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2620 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 AppLaunch.exe 2528 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2692 wrote to memory of 2320 2692 file.exe 27 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2320 wrote to memory of 2740 2320 hj9sE16.exe 28 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2740 wrote to memory of 2908 2740 qJ4is96.exe 29 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2908 wrote to memory of 2620 2908 VO2NX62.exe 30 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2528 2620 1Dp81oC4.exe 31 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32 PID 2620 wrote to memory of 2504 2620 1Dp81oC4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hj9sE16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hj9sE16.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qJ4is96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qJ4is96.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VO2NX62.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VO2NX62.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp81oC4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp81oC4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2504
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD534d9cd0ac2670a91af46fd2c67952836
SHA1860636fe102db23c880677194da13e23f2483896
SHA2562b11219db41a5f0484eca2dcd18606cd19e8cfcc9626a6031aab51f54f855bf7
SHA512ff69a6f3ad017525fdcc042ca3de8c1b3fc8347caec5eae8ec573f352d0c10e362c77b84955b3b15e6f20630113662e1366f3784f63f9ef685c39327636497d7
-
Filesize
917KB
MD534d9cd0ac2670a91af46fd2c67952836
SHA1860636fe102db23c880677194da13e23f2483896
SHA2562b11219db41a5f0484eca2dcd18606cd19e8cfcc9626a6031aab51f54f855bf7
SHA512ff69a6f3ad017525fdcc042ca3de8c1b3fc8347caec5eae8ec573f352d0c10e362c77b84955b3b15e6f20630113662e1366f3784f63f9ef685c39327636497d7
-
Filesize
627KB
MD5509b8ce2525a28886f045a5e7eea3410
SHA1227ba9c27c8ba14edee0ecafa1501457bab66513
SHA2566075e0fea6fd54ea8371bdac0e95cfadcdb57602da976403e772889a05443c4c
SHA512fa9d2c31bf5f79424d2d124663c59540f8030bac6b9cbf4157ad4019559f9a88001df1ced067db96aa95d1cca3b8d4a7dff5319d964b69c5a83483c09a8202d9
-
Filesize
627KB
MD5509b8ce2525a28886f045a5e7eea3410
SHA1227ba9c27c8ba14edee0ecafa1501457bab66513
SHA2566075e0fea6fd54ea8371bdac0e95cfadcdb57602da976403e772889a05443c4c
SHA512fa9d2c31bf5f79424d2d124663c59540f8030bac6b9cbf4157ad4019559f9a88001df1ced067db96aa95d1cca3b8d4a7dff5319d964b69c5a83483c09a8202d9
-
Filesize
388KB
MD507d212ee1529820462782d5d2be0262b
SHA131e05f78a6ba5588befef77042e7803fb76846c7
SHA256d6b07709bfd318b32d97e6fef1335cac3d812aa56a70aa02a0a253955a94706f
SHA51221991850a1d530990a7acddcbceb5c6aa83321a194d2e9012edec3ebce44fea4c26b4ef1e4b7dca0df4b0ab9127eac3ebf01b145cab50673baf1c6707f492de2
-
Filesize
388KB
MD507d212ee1529820462782d5d2be0262b
SHA131e05f78a6ba5588befef77042e7803fb76846c7
SHA256d6b07709bfd318b32d97e6fef1335cac3d812aa56a70aa02a0a253955a94706f
SHA51221991850a1d530990a7acddcbceb5c6aa83321a194d2e9012edec3ebce44fea4c26b4ef1e4b7dca0df4b0ab9127eac3ebf01b145cab50673baf1c6707f492de2
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
917KB
MD534d9cd0ac2670a91af46fd2c67952836
SHA1860636fe102db23c880677194da13e23f2483896
SHA2562b11219db41a5f0484eca2dcd18606cd19e8cfcc9626a6031aab51f54f855bf7
SHA512ff69a6f3ad017525fdcc042ca3de8c1b3fc8347caec5eae8ec573f352d0c10e362c77b84955b3b15e6f20630113662e1366f3784f63f9ef685c39327636497d7
-
Filesize
917KB
MD534d9cd0ac2670a91af46fd2c67952836
SHA1860636fe102db23c880677194da13e23f2483896
SHA2562b11219db41a5f0484eca2dcd18606cd19e8cfcc9626a6031aab51f54f855bf7
SHA512ff69a6f3ad017525fdcc042ca3de8c1b3fc8347caec5eae8ec573f352d0c10e362c77b84955b3b15e6f20630113662e1366f3784f63f9ef685c39327636497d7
-
Filesize
627KB
MD5509b8ce2525a28886f045a5e7eea3410
SHA1227ba9c27c8ba14edee0ecafa1501457bab66513
SHA2566075e0fea6fd54ea8371bdac0e95cfadcdb57602da976403e772889a05443c4c
SHA512fa9d2c31bf5f79424d2d124663c59540f8030bac6b9cbf4157ad4019559f9a88001df1ced067db96aa95d1cca3b8d4a7dff5319d964b69c5a83483c09a8202d9
-
Filesize
627KB
MD5509b8ce2525a28886f045a5e7eea3410
SHA1227ba9c27c8ba14edee0ecafa1501457bab66513
SHA2566075e0fea6fd54ea8371bdac0e95cfadcdb57602da976403e772889a05443c4c
SHA512fa9d2c31bf5f79424d2d124663c59540f8030bac6b9cbf4157ad4019559f9a88001df1ced067db96aa95d1cca3b8d4a7dff5319d964b69c5a83483c09a8202d9
-
Filesize
388KB
MD507d212ee1529820462782d5d2be0262b
SHA131e05f78a6ba5588befef77042e7803fb76846c7
SHA256d6b07709bfd318b32d97e6fef1335cac3d812aa56a70aa02a0a253955a94706f
SHA51221991850a1d530990a7acddcbceb5c6aa83321a194d2e9012edec3ebce44fea4c26b4ef1e4b7dca0df4b0ab9127eac3ebf01b145cab50673baf1c6707f492de2
-
Filesize
388KB
MD507d212ee1529820462782d5d2be0262b
SHA131e05f78a6ba5588befef77042e7803fb76846c7
SHA256d6b07709bfd318b32d97e6fef1335cac3d812aa56a70aa02a0a253955a94706f
SHA51221991850a1d530990a7acddcbceb5c6aa83321a194d2e9012edec3ebce44fea4c26b4ef1e4b7dca0df4b0ab9127eac3ebf01b145cab50673baf1c6707f492de2
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81