Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
nE3yz96.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
nE3yz96.exe
Resource
win10-20230915-en
General
-
Target
nE3yz96.exe
-
Size
330KB
-
MD5
733b2fc44441a13a303391ed0836a334
-
SHA1
1fe2929baa829b3195366cd557683e46ba1ecc37
-
SHA256
0992614c9a4f4e7879166327b9cba26ee4b2f4b7028f9f9601a1897ef24d415b
-
SHA512
d56364a2dea12cbf999aa8ed8335e4f67c2344fd314bbbe28435c3052a9f8bd614a732954522a91eaa7e3f1c8691b381c86213319bc1dc86960c03268db825c8
-
SSDEEP
6144:Kmy+bnr+2p0yN90QECOw4f+8LkEo7jPlfFi+XwkElviB2DUjqE9O:mMr2y90gOenEo7jPBFi+gRAADUj99O
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 1Tx96sz4.exe -
Loads dropped DLL 6 IoCs
pid Process 2412 nE3yz96.exe 2580 1Tx96sz4.exe 2640 WerFault.exe 2640 WerFault.exe 2640 WerFault.exe 2640 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" nE3yz96.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2632 2580 1Tx96sz4.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2640 2580 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2632 AppLaunch.exe 2632 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2632 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2412 wrote to memory of 2580 2412 nE3yz96.exe 28 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2632 2580 1Tx96sz4.exe 29 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30 PID 2580 wrote to memory of 2640 2580 1Tx96sz4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\nE3yz96.exe"C:\Users\Admin\AppData\Local\Temp\nE3yz96.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Tx96sz4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Tx96sz4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2723⤵
- Loads dropped DLL
- Program crash
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81