Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 16:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
428f35143424e2ee5c6f6c8935670a77
-
SHA1
49987f37e1a1481c619bb52caa87e763813cf7b7
-
SHA256
23234b9a70e8b2b07adac0ffbd422e4fa80bc5fa98a07d448566f83dc6fc7002
-
SHA512
261ba47750ee0681434dbdc61ab940bde706c3451949be6aeb9177567fcff8dfd7e7da5bb504bbde8e0fa737cdf9aa717a061dbf6ce8290209e078afcabf6bee
-
SSDEEP
24576:8yaatHT+/qY4zdOLpR/V2II7qfRiCFzdiH2f14o32bSaXgzBGxuLDv8SHo5RZqVs:raagiYTw1qZnzdiHYWoGbgFzr8SV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1944 Lw0ER79.exe 2332 mF5Kk81.exe 2720 mh2sA12.exe 2640 1jB69uQ4.exe -
Loads dropped DLL 12 IoCs
pid Process 1264 file.exe 1944 Lw0ER79.exe 1944 Lw0ER79.exe 2332 mF5Kk81.exe 2332 mF5Kk81.exe 2720 mh2sA12.exe 2720 mh2sA12.exe 2640 1jB69uQ4.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Lw0ER79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" mF5Kk81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mh2sA12.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2772 2640 1jB69uQ4.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2112 2640 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 AppLaunch.exe 2772 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1264 wrote to memory of 1944 1264 file.exe 28 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 1944 wrote to memory of 2332 1944 Lw0ER79.exe 29 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2332 wrote to memory of 2720 2332 mF5Kk81.exe 30 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2720 wrote to memory of 2640 2720 mh2sA12.exe 31 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2772 2640 1jB69uQ4.exe 32 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33 PID 2640 wrote to memory of 2112 2640 1jB69uQ4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2112
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD593b98bc4519a169bf93b3f2a4b7c820a
SHA179bd66a4873e57a9a83ce9ef82aae60c707be37c
SHA256ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445
SHA51221cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e
-
Filesize
1.3MB
MD593b98bc4519a169bf93b3f2a4b7c820a
SHA179bd66a4873e57a9a83ce9ef82aae60c707be37c
SHA256ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445
SHA51221cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e
-
Filesize
895KB
MD5ac9b9aafc5582ad1b5ef589e0d5379df
SHA1d777d83b130e962fafd2bfe22c72e31858181d53
SHA2566e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22
SHA512ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1
-
Filesize
895KB
MD5ac9b9aafc5582ad1b5ef589e0d5379df
SHA1d777d83b130e962fafd2bfe22c72e31858181d53
SHA2566e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22
SHA512ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1
-
Filesize
533KB
MD528b98a4bf4da3dcd6eb08b7f740f171e
SHA10476f9b0b1cf67920c51e3f0d29d80d170a127f0
SHA2566b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a
SHA5127fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe
-
Filesize
533KB
MD528b98a4bf4da3dcd6eb08b7f740f171e
SHA10476f9b0b1cf67920c51e3f0d29d80d170a127f0
SHA2566b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a
SHA5127fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD593b98bc4519a169bf93b3f2a4b7c820a
SHA179bd66a4873e57a9a83ce9ef82aae60c707be37c
SHA256ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445
SHA51221cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e
-
Filesize
1.3MB
MD593b98bc4519a169bf93b3f2a4b7c820a
SHA179bd66a4873e57a9a83ce9ef82aae60c707be37c
SHA256ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445
SHA51221cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e
-
Filesize
895KB
MD5ac9b9aafc5582ad1b5ef589e0d5379df
SHA1d777d83b130e962fafd2bfe22c72e31858181d53
SHA2566e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22
SHA512ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1
-
Filesize
895KB
MD5ac9b9aafc5582ad1b5ef589e0d5379df
SHA1d777d83b130e962fafd2bfe22c72e31858181d53
SHA2566e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22
SHA512ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1
-
Filesize
533KB
MD528b98a4bf4da3dcd6eb08b7f740f171e
SHA10476f9b0b1cf67920c51e3f0d29d80d170a127f0
SHA2566b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a
SHA5127fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe
-
Filesize
533KB
MD528b98a4bf4da3dcd6eb08b7f740f171e
SHA10476f9b0b1cf67920c51e3f0d29d80d170a127f0
SHA2566b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a
SHA5127fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81