Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 02:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
36fe87e17f698cee62cb37407e5599c3
-
SHA1
32c76beb60b164ae4e3ad941fb69fa0cfc4501fc
-
SHA256
cebb46df2451d64834e9c9a3e383bc2eeb2b0ac7aaecd44830133b0d5d2bc9c1
-
SHA512
6198609939809780f95e3fc4749b2df305b2aa55d7c135957f569ad267177cdce185d70843a015beb77199265226b28ccf343c651ab788f0f7b13a77722632e4
-
SSDEEP
24576:gydoOxEAJJOe+78yRiBg44XzCJ+rPyX+SAN1SWv/DoP7vihwM7FwT9qgefACy:npJo8GFjCJ+PyxA6RM7Fo9qgeYC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2404 Ak3yW35.exe 2260 ZX6Pt86.exe 2724 Df3MJ69.exe 1952 1Xb80qM6.exe -
Loads dropped DLL 12 IoCs
pid Process 2192 file.exe 2404 Ak3yW35.exe 2404 Ak3yW35.exe 2260 ZX6Pt86.exe 2260 ZX6Pt86.exe 2724 Df3MJ69.exe 2724 Df3MJ69.exe 1952 1Xb80qM6.exe 1068 WerFault.exe 1068 WerFault.exe 1068 WerFault.exe 1068 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ZX6Pt86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Df3MJ69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ak3yW35.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1952 set thread context of 2780 1952 1Xb80qM6.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 1068 1952 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2780 AppLaunch.exe 2780 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2192 wrote to memory of 2404 2192 file.exe 28 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2404 wrote to memory of 2260 2404 Ak3yW35.exe 29 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2260 wrote to memory of 2724 2260 ZX6Pt86.exe 30 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 2724 wrote to memory of 1952 2724 Df3MJ69.exe 31 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 2780 1952 1Xb80qM6.exe 32 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33 PID 1952 wrote to memory of 1068 1952 1Xb80qM6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:1068
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD596b59f6e7750196a1570bbab59ed630b
SHA1894c8505b81874667c95e3a6d2d0951a0fc67df6
SHA256b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254
SHA5123115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732
-
Filesize
1.3MB
MD596b59f6e7750196a1570bbab59ed630b
SHA1894c8505b81874667c95e3a6d2d0951a0fc67df6
SHA256b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254
SHA5123115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732
-
Filesize
931KB
MD521e5279078aa9cffed32b6ec11e26ad7
SHA152e7ffd4002437a8463e1f04df907278f89236a2
SHA2569b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe
SHA512a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01
-
Filesize
931KB
MD521e5279078aa9cffed32b6ec11e26ad7
SHA152e7ffd4002437a8463e1f04df907278f89236a2
SHA2569b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe
SHA512a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01
-
Filesize
548KB
MD58fd1ef2a08680c1c3d1cba5fb39fc584
SHA1b1f1876e7f9839d0c7fdc87406c18e68149d7dbc
SHA2560022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4
SHA5123e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0
-
Filesize
548KB
MD58fd1ef2a08680c1c3d1cba5fb39fc584
SHA1b1f1876e7f9839d0c7fdc87406c18e68149d7dbc
SHA2560022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4
SHA5123e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD596b59f6e7750196a1570bbab59ed630b
SHA1894c8505b81874667c95e3a6d2d0951a0fc67df6
SHA256b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254
SHA5123115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732
-
Filesize
1.3MB
MD596b59f6e7750196a1570bbab59ed630b
SHA1894c8505b81874667c95e3a6d2d0951a0fc67df6
SHA256b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254
SHA5123115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732
-
Filesize
931KB
MD521e5279078aa9cffed32b6ec11e26ad7
SHA152e7ffd4002437a8463e1f04df907278f89236a2
SHA2569b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe
SHA512a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01
-
Filesize
931KB
MD521e5279078aa9cffed32b6ec11e26ad7
SHA152e7ffd4002437a8463e1f04df907278f89236a2
SHA2569b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe
SHA512a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01
-
Filesize
548KB
MD58fd1ef2a08680c1c3d1cba5fb39fc584
SHA1b1f1876e7f9839d0c7fdc87406c18e68149d7dbc
SHA2560022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4
SHA5123e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0
-
Filesize
548KB
MD58fd1ef2a08680c1c3d1cba5fb39fc584
SHA1b1f1876e7f9839d0c7fdc87406c18e68149d7dbc
SHA2560022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4
SHA5123e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81