Analysis
-
max time kernel
263s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
Ct2IZ43.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Ct2IZ43.exe
Resource
win10-20230915-en
General
-
Target
Ct2IZ43.exe
-
Size
547KB
-
MD5
eb1bd6ab23b12659c47aac892e257ef2
-
SHA1
3da6e56ff4e3d470f81cc30b1ed2862d2e9f559d
-
SHA256
bcaffd7dc6bfd0c0524ba03bc2d44ca97cc6b7d4f62594fa6996a7029798c396
-
SHA512
89599524f067e15a57e62314f7934b6c57a9882fb7a031d38b465030e3b52faa3788f4a648d1df395138505c5a1e7dbb50dde6c2ac1bedf7cbc5c91a7f292b00
-
SSDEEP
12288:PMrhy906OenEo7jPBFiVF01Cx2T2MMEnWJMYK819pAOgi/w:+y5OeB7jpFiVFx0JUHdnw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 1vY13Yn0.exe -
Loads dropped DLL 6 IoCs
pid Process 2688 Ct2IZ43.exe 2600 1vY13Yn0.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Ct2IZ43.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2600 set thread context of 2528 2600 1vY13Yn0.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2600 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 AppLaunch.exe 2528 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2688 wrote to memory of 2600 2688 Ct2IZ43.exe 27 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2528 2600 1vY13Yn0.exe 28 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29 PID 2600 wrote to memory of 2936 2600 1vY13Yn0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ct2IZ43.exe"C:\Users\Admin\AppData\Local\Temp\Ct2IZ43.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1vY13Yn0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1vY13Yn0.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2723⤵
- Loads dropped DLL
- Program crash
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81