Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
77ea53409cd3cbb2b02ab8f98ca0329b
-
SHA1
36a3125d8efe9d3f0f0f1329145e9ce894f019b7
-
SHA256
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b
-
SHA512
06f30ceaa0c504f4589b8b9a209a2cf35452af89733fc230e3b2d01a6c15d7a208e2e45a90cafb9bc288ec32cd29d9665196f919c5aab3f369cda97571d3637b
-
SSDEEP
24576:WyJSoyMQCEgp7EvcxDyV7gK7i+Ce3Dcc9pwodSu+rdjVxrvkx8kY7lIcjiK11tPI:lJJyMXHpgv8y9gw9CezF9qgSu+rRVx71
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1348 Jp7pq51.exe 2016 IN4Kh02.exe 2388 Wy3aP92.exe 2740 1by11sz4.exe -
Loads dropped DLL 12 IoCs
pid Process 2004 file.exe 1348 Jp7pq51.exe 1348 Jp7pq51.exe 2016 IN4Kh02.exe 2016 IN4Kh02.exe 2388 Wy3aP92.exe 2388 Wy3aP92.exe 2740 1by11sz4.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Wy3aP92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jp7pq51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" IN4Kh02.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 2748 2740 1by11sz4.exe 35 -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2740 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 AppLaunch.exe 2748 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 2004 wrote to memory of 1348 2004 file.exe 28 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 1348 wrote to memory of 2016 1348 Jp7pq51.exe 29 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2016 wrote to memory of 2388 2016 IN4Kh02.exe 30 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2388 wrote to memory of 2740 2388 Wy3aP92.exe 31 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2820 2740 1by11sz4.exe 32 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 2632 2740 1by11sz4.exe 33 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 3020 2740 1by11sz4.exe 34 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2748 2740 1by11sz4.exe 35 PID 2740 wrote to memory of 2688 2740 1by11sz4.exe 36 PID 2740 wrote to memory of 2688 2740 1by11sz4.exe 36 PID 2740 wrote to memory of 2688 2740 1by11sz4.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2966⤵
- Loads dropped DLL
- Program crash
PID:2688
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a1e2f2e5fa3baa6a0dca3bb77c227517
SHA11c1a75381d85cd9be3175cfe8e2299c113c8f38a
SHA256c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04
SHA512fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863
-
Filesize
1.1MB
MD5a1e2f2e5fa3baa6a0dca3bb77c227517
SHA11c1a75381d85cd9be3175cfe8e2299c113c8f38a
SHA256c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04
SHA512fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863
-
Filesize
691KB
MD50a9dbda1784ce40906cb6e268e4e12a9
SHA1b3968288f2e174f5a566e68ca8e86d5863331e79
SHA256d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f
SHA512075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e
-
Filesize
691KB
MD50a9dbda1784ce40906cb6e268e4e12a9
SHA1b3968288f2e174f5a566e68ca8e86d5863331e79
SHA256d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f
SHA512075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e
-
Filesize
330KB
MD59c76487d40bbb19823d3462a3d46fbe1
SHA12c1fb84e4d6a6c3612e9846ce307302ad7e53cd1
SHA256fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75
SHA5129891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1
-
Filesize
330KB
MD59c76487d40bbb19823d3462a3d46fbe1
SHA12c1fb84e4d6a6c3612e9846ce307302ad7e53cd1
SHA256fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75
SHA5129891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5a1e2f2e5fa3baa6a0dca3bb77c227517
SHA11c1a75381d85cd9be3175cfe8e2299c113c8f38a
SHA256c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04
SHA512fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863
-
Filesize
1.1MB
MD5a1e2f2e5fa3baa6a0dca3bb77c227517
SHA11c1a75381d85cd9be3175cfe8e2299c113c8f38a
SHA256c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04
SHA512fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863
-
Filesize
691KB
MD50a9dbda1784ce40906cb6e268e4e12a9
SHA1b3968288f2e174f5a566e68ca8e86d5863331e79
SHA256d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f
SHA512075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e
-
Filesize
691KB
MD50a9dbda1784ce40906cb6e268e4e12a9
SHA1b3968288f2e174f5a566e68ca8e86d5863331e79
SHA256d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f
SHA512075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e
-
Filesize
330KB
MD59c76487d40bbb19823d3462a3d46fbe1
SHA12c1fb84e4d6a6c3612e9846ce307302ad7e53cd1
SHA256fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75
SHA5129891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1
-
Filesize
330KB
MD59c76487d40bbb19823d3462a3d46fbe1
SHA12c1fb84e4d6a6c3612e9846ce307302ad7e53cd1
SHA256fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75
SHA5129891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81