Analysis
-
max time kernel
122s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
73c9baf386940721f6797e628ba7f524
-
SHA1
b80e3939a841adfa573b4623216eb7134a591854
-
SHA256
82001b52ad621f5d2f5ea0ff1989044e39d3855cf3dbbadf2457f50f85925ad4
-
SHA512
52912ca37e531a170ac52a2b5ae45e94ba9a28a64d2f121abb4e151cff44de3317c5325fed775ce66f4eebb900531e3eebc43bdb7a734e9fc3a359fee9def8ec
-
SSDEEP
24576:GyfQLXPnCeOz+CdOKZ7Cjki+kMVDcm9Q7CXGWxmQoz14zJ5ReujkuJ896NH4o:VfQTPCNz+CdRCQ9kMlv9QGhklhUJPJjK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1212 MI8YY09.exe 2736 pf0Gv57.exe 2624 Nm5dF04.exe 2556 1au95XV5.exe -
Loads dropped DLL 12 IoCs
pid Process 2880 file.exe 1212 MI8YY09.exe 1212 MI8YY09.exe 2736 pf0Gv57.exe 2736 pf0Gv57.exe 2624 Nm5dF04.exe 2624 Nm5dF04.exe 2556 1au95XV5.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" MI8YY09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pf0Gv57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Nm5dF04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 2864 2556 1au95XV5.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2576 2556 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 AppLaunch.exe 2864 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 AppLaunch.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 2880 wrote to memory of 1212 2880 file.exe 28 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 1212 wrote to memory of 2736 1212 MI8YY09.exe 29 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2736 wrote to memory of 2624 2736 pf0Gv57.exe 30 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2624 wrote to memory of 2556 2624 Nm5dF04.exe 31 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2544 2556 1au95XV5.exe 32 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2864 2556 1au95XV5.exe 34 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33 PID 2556 wrote to memory of 2576 2556 1au95XV5.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MI8YY09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MI8YY09.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pf0Gv57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pf0Gv57.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nm5dF04.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nm5dF04.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1au95XV5.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1au95XV5.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD542dac84d0dd6a0fa77dfd1b7bfcfa5d2
SHA1809065cbffc65c63c8d124f97382b65b355e7a99
SHA2565dd922d64d740af5b5cdfc662261a860eed0e50bd4753e74ac2dfecdbe8e54be
SHA512e23ca984ab1a5e94d2019b52b638df0de2ee0758bd1c6824a78b03ed636de9be9c757029cbd8d84f28ad4e54e113be7acc4377f479b0fa1d9da8ff15b048a84d
-
Filesize
1.1MB
MD542dac84d0dd6a0fa77dfd1b7bfcfa5d2
SHA1809065cbffc65c63c8d124f97382b65b355e7a99
SHA2565dd922d64d740af5b5cdfc662261a860eed0e50bd4753e74ac2dfecdbe8e54be
SHA512e23ca984ab1a5e94d2019b52b638df0de2ee0758bd1c6824a78b03ed636de9be9c757029cbd8d84f28ad4e54e113be7acc4377f479b0fa1d9da8ff15b048a84d
-
Filesize
690KB
MD5ded34aadbb2d073dca9fe7ab881865c2
SHA11152a50b60333303cf6122a25141fdad64bf2467
SHA25650eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6
SHA512363e2a8155764e80ca17fed13951e343a18d7c6f9793f0d51b47c7b187e4da4e74386801032e9ad12542ae01dc24af686016f37aed1fab5ab75b3bb9dc554785
-
Filesize
690KB
MD5ded34aadbb2d073dca9fe7ab881865c2
SHA11152a50b60333303cf6122a25141fdad64bf2467
SHA25650eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6
SHA512363e2a8155764e80ca17fed13951e343a18d7c6f9793f0d51b47c7b187e4da4e74386801032e9ad12542ae01dc24af686016f37aed1fab5ab75b3bb9dc554785
-
Filesize
330KB
MD5877c0ff8a9890b87f9553a77abfb64cb
SHA1e7c3a145b2582a912548ff6f3b8d55c366f95115
SHA256ea378bc3b81b8afc92afd17b9edc20d2f606e945c4650ce3820a65e7c13ddff8
SHA5129c81bf30f7afd0426b63802750df2f18e9e6d4bee4288f83ca148c28ad3e2514190957e95d667ff1df586b8f5e1f347e18f747443194869777f4ee5cda46fa85
-
Filesize
330KB
MD5877c0ff8a9890b87f9553a77abfb64cb
SHA1e7c3a145b2582a912548ff6f3b8d55c366f95115
SHA256ea378bc3b81b8afc92afd17b9edc20d2f606e945c4650ce3820a65e7c13ddff8
SHA5129c81bf30f7afd0426b63802750df2f18e9e6d4bee4288f83ca148c28ad3e2514190957e95d667ff1df586b8f5e1f347e18f747443194869777f4ee5cda46fa85
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD542dac84d0dd6a0fa77dfd1b7bfcfa5d2
SHA1809065cbffc65c63c8d124f97382b65b355e7a99
SHA2565dd922d64d740af5b5cdfc662261a860eed0e50bd4753e74ac2dfecdbe8e54be
SHA512e23ca984ab1a5e94d2019b52b638df0de2ee0758bd1c6824a78b03ed636de9be9c757029cbd8d84f28ad4e54e113be7acc4377f479b0fa1d9da8ff15b048a84d
-
Filesize
1.1MB
MD542dac84d0dd6a0fa77dfd1b7bfcfa5d2
SHA1809065cbffc65c63c8d124f97382b65b355e7a99
SHA2565dd922d64d740af5b5cdfc662261a860eed0e50bd4753e74ac2dfecdbe8e54be
SHA512e23ca984ab1a5e94d2019b52b638df0de2ee0758bd1c6824a78b03ed636de9be9c757029cbd8d84f28ad4e54e113be7acc4377f479b0fa1d9da8ff15b048a84d
-
Filesize
690KB
MD5ded34aadbb2d073dca9fe7ab881865c2
SHA11152a50b60333303cf6122a25141fdad64bf2467
SHA25650eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6
SHA512363e2a8155764e80ca17fed13951e343a18d7c6f9793f0d51b47c7b187e4da4e74386801032e9ad12542ae01dc24af686016f37aed1fab5ab75b3bb9dc554785
-
Filesize
690KB
MD5ded34aadbb2d073dca9fe7ab881865c2
SHA11152a50b60333303cf6122a25141fdad64bf2467
SHA25650eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6
SHA512363e2a8155764e80ca17fed13951e343a18d7c6f9793f0d51b47c7b187e4da4e74386801032e9ad12542ae01dc24af686016f37aed1fab5ab75b3bb9dc554785
-
Filesize
330KB
MD5877c0ff8a9890b87f9553a77abfb64cb
SHA1e7c3a145b2582a912548ff6f3b8d55c366f95115
SHA256ea378bc3b81b8afc92afd17b9edc20d2f606e945c4650ce3820a65e7c13ddff8
SHA5129c81bf30f7afd0426b63802750df2f18e9e6d4bee4288f83ca148c28ad3e2514190957e95d667ff1df586b8f5e1f347e18f747443194869777f4ee5cda46fa85
-
Filesize
330KB
MD5877c0ff8a9890b87f9553a77abfb64cb
SHA1e7c3a145b2582a912548ff6f3b8d55c366f95115
SHA256ea378bc3b81b8afc92afd17b9edc20d2f606e945c4650ce3820a65e7c13ddff8
SHA5129c81bf30f7afd0426b63802750df2f18e9e6d4bee4288f83ca148c28ad3e2514190957e95d667ff1df586b8f5e1f347e18f747443194869777f4ee5cda46fa85
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81