Analysis
-
max time kernel
207s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
13/10/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe
Resource
win10-20230915-en
General
-
Target
9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe
-
Size
1.5MB
-
MD5
8320faca6e5156c434246da6a760dc4a
-
SHA1
c72c6f28382be1cfb21c8d1b39d925fab90084a6
-
SHA256
9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2
-
SHA512
658eb0afc5b41a52077a2cb8dae929b85c7552e6e0aafce987a07657f37ebe9ab4282e8577e3ca0357457bfd86fdec4db7b800c8e40ab27dbb361b05f4967f63
-
SSDEEP
24576:4ycbdhV4mL+MYsU2dZQXR7j/DiPFVzgVzYEV+gKP34AUP9OHmH8R9P4Ml1aN/DwD:/cbdhV4mLlYZjbg0zYEU1wAUP9OyuNWs
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1448 KC8oe15.exe 2956 fF2pv48.exe 4128 Ct2IZ43.exe 656 1vY13Yn0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" KC8oe15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fF2pv48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ct2IZ43.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 656 set thread context of 2452 656 1vY13Yn0.exe 73 -
Program crash 1 IoCs
pid pid_target Process procid_target 4240 656 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2452 AppLaunch.exe 2452 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2452 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1448 2140 9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe 69 PID 2140 wrote to memory of 1448 2140 9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe 69 PID 2140 wrote to memory of 1448 2140 9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe 69 PID 1448 wrote to memory of 2956 1448 KC8oe15.exe 70 PID 1448 wrote to memory of 2956 1448 KC8oe15.exe 70 PID 1448 wrote to memory of 2956 1448 KC8oe15.exe 70 PID 2956 wrote to memory of 4128 2956 fF2pv48.exe 71 PID 2956 wrote to memory of 4128 2956 fF2pv48.exe 71 PID 2956 wrote to memory of 4128 2956 fF2pv48.exe 71 PID 4128 wrote to memory of 656 4128 Ct2IZ43.exe 72 PID 4128 wrote to memory of 656 4128 Ct2IZ43.exe 72 PID 4128 wrote to memory of 656 4128 Ct2IZ43.exe 72 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73 PID 656 wrote to memory of 2452 656 1vY13Yn0.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe"C:\Users\Admin\AppData\Local\Temp\9d9bf4840c39cf2de3e4214910e07aa6031f2f7979ae4695dd419aad1a4977f2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KC8oe15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KC8oe15.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fF2pv48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fF2pv48.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ct2IZ43.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ct2IZ43.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vY13Yn0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vY13Yn0.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 5526⤵
- Program crash
PID:4240
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5780d09d5abeb824d910154cb533c13dc
SHA149ce41461162f3afabe7e524d2d4fbf371a06256
SHA256c2b46d9366ff71493feffcec1d547f3b37af2d71cb80be0f1fd648e489a41abb
SHA512a6b62546dfd8b112b005620bca4292749108fa84f388d295f144c90a391ec2f255ed83d8ab84cc9e9cb06752788eea639f5f91cf6f2eb7738e0d5a890be7a7b1
-
Filesize
1.3MB
MD5780d09d5abeb824d910154cb533c13dc
SHA149ce41461162f3afabe7e524d2d4fbf371a06256
SHA256c2b46d9366ff71493feffcec1d547f3b37af2d71cb80be0f1fd648e489a41abb
SHA512a6b62546dfd8b112b005620bca4292749108fa84f388d295f144c90a391ec2f255ed83d8ab84cc9e9cb06752788eea639f5f91cf6f2eb7738e0d5a890be7a7b1
-
Filesize
929KB
MD585403d4d7125194a5ae8bacfa04af827
SHA1025771001f78c1de321d76a294362cdbbf543583
SHA256164766c087c4ae2a5ea99d1d2c6d68ffd88040c76f9cd40b8c82b0f099a8c3ff
SHA5122943f2c8eba5ca5ee3c1f93d2fb637961f93555fb453ef9f4fde0e4951d3cb9c4f745c04e16ecb4a51b8d085d072f99b85431fb92d5d07d201e02761865e959f
-
Filesize
929KB
MD585403d4d7125194a5ae8bacfa04af827
SHA1025771001f78c1de321d76a294362cdbbf543583
SHA256164766c087c4ae2a5ea99d1d2c6d68ffd88040c76f9cd40b8c82b0f099a8c3ff
SHA5122943f2c8eba5ca5ee3c1f93d2fb637961f93555fb453ef9f4fde0e4951d3cb9c4f745c04e16ecb4a51b8d085d072f99b85431fb92d5d07d201e02761865e959f
-
Filesize
547KB
MD5eb1bd6ab23b12659c47aac892e257ef2
SHA13da6e56ff4e3d470f81cc30b1ed2862d2e9f559d
SHA256bcaffd7dc6bfd0c0524ba03bc2d44ca97cc6b7d4f62594fa6996a7029798c396
SHA51289599524f067e15a57e62314f7934b6c57a9882fb7a031d38b465030e3b52faa3788f4a648d1df395138505c5a1e7dbb50dde6c2ac1bedf7cbc5c91a7f292b00
-
Filesize
547KB
MD5eb1bd6ab23b12659c47aac892e257ef2
SHA13da6e56ff4e3d470f81cc30b1ed2862d2e9f559d
SHA256bcaffd7dc6bfd0c0524ba03bc2d44ca97cc6b7d4f62594fa6996a7029798c396
SHA51289599524f067e15a57e62314f7934b6c57a9882fb7a031d38b465030e3b52faa3788f4a648d1df395138505c5a1e7dbb50dde6c2ac1bedf7cbc5c91a7f292b00
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81