Analysis

  • max time kernel
    117s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 04:01

General

  • Target

    Launc1her-S0FTS.exe

  • Size

    16.9MB

  • MD5

    af35c6339f378039975f993c0cd2c83a

  • SHA1

    1f582a898ec6671ab0af94b0f6d1981e13b50852

  • SHA256

    cec9a88adaa4e5711fafdacb3127e1dd29afdaaaa64f2f683add7b8a679a1bc1

  • SHA512

    5ae1cc3093e3c8c6a9914ff8fdcf864bdebcc677b1e2a269526c6c40c35fcd8de265fce974c22e6e836a4daf9b973a3b6a1b1fa56cd3ea5ead6acdf228b82745

  • SSDEEP

    196608:RrWXa49x9vASvd4DVUKZbEIm3oqwILxa+4ru2rIDh+JD9OqsT9GG3j:j49jISvd4DiKZoL3J/xB52+9qsTR3j

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launc1her-S0FTS.exe
    "C:\Users\Admin\AppData\Local\Temp\Launc1her-S0FTS.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2852-3-0x0000000000400000-0x00000000014E2000-memory.dmp

    Filesize

    16.9MB

  • memory/2852-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2852-6-0x00000000779F0000-0x00000000779F1000-memory.dmp

    Filesize

    4KB

  • memory/2852-7-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2852-5-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2852-9-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2852-12-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2852-11-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2852-14-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2852-16-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2852-19-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2852-21-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2852-24-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2852-26-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2852-29-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2852-31-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2852-34-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2852-36-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2852-37-0x0000000000400000-0x00000000014E2000-memory.dmp

    Filesize

    16.9MB

  • memory/2852-38-0x0000000000400000-0x00000000014E2000-memory.dmp

    Filesize

    16.9MB