Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
f9007d314f8c371167d961258311da9d
-
SHA1
f21b4a47dd8dafac0f4b882b91f4371b61995395
-
SHA256
1919d938556e92e5bc7550a58904295056000bbc1c7ff9c39d778d810036d7cf
-
SHA512
0cbc1ce9d3e5a0c3ecdeab1d7f6f0975b9b40771395806bc0a2ecf382a370905340848b0e8ede6bc7b4f8ec87b67c97d643362482fbaead474c5b07284274cef
-
SSDEEP
24576:AyOf/gcsxb/BhRfZW7HRni+gffXHr62Wr+3kDlO+jrtrX3Slt3/:HOwxblfZAHF9gffXr6Hi+3BrHm
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3056 ol4xz10.exe 2660 VW7Zz70.exe 2916 Vb3vF11.exe 2904 1IP69tT1.exe -
Loads dropped DLL 12 IoCs
pid Process 3020 file.exe 3056 ol4xz10.exe 3056 ol4xz10.exe 2660 VW7Zz70.exe 2660 VW7Zz70.exe 2916 Vb3vF11.exe 2916 Vb3vF11.exe 2904 1IP69tT1.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ol4xz10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" VW7Zz70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Vb3vF11.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 2680 2904 1IP69tT1.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2880 2904 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 AppLaunch.exe 2680 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3020 wrote to memory of 3056 3020 file.exe 28 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 3056 wrote to memory of 2660 3056 ol4xz10.exe 29 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2660 wrote to memory of 2916 2660 VW7Zz70.exe 30 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2916 wrote to memory of 2904 2916 Vb3vF11.exe 31 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2680 2904 1IP69tT1.exe 32 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33 PID 2904 wrote to memory of 2880 2904 1IP69tT1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ol4xz10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ol4xz10.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VW7Zz70.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VW7Zz70.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vb3vF11.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vb3vF11.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1IP69tT1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1IP69tT1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5e16c2f9ce0ab4515b109705bc83934ae
SHA1d2eab42972d85def245646d045acc2b0fece33b5
SHA2562adc31c53762ded623a7ec30bb98cdf4f3bb11dcac09d5713eb5e3387b6fdd8b
SHA5122f0ef9d0a540661c76167cadd65511e8b7f82e293ed813cdf0ad2dc19888841cca5991adfbd467f8ea769c825cd971d07d73ea051e8cd4a84be02269cbced0a1
-
Filesize
1.1MB
MD5e16c2f9ce0ab4515b109705bc83934ae
SHA1d2eab42972d85def245646d045acc2b0fece33b5
SHA2562adc31c53762ded623a7ec30bb98cdf4f3bb11dcac09d5713eb5e3387b6fdd8b
SHA5122f0ef9d0a540661c76167cadd65511e8b7f82e293ed813cdf0ad2dc19888841cca5991adfbd467f8ea769c825cd971d07d73ea051e8cd4a84be02269cbced0a1
-
Filesize
709KB
MD5b9c3d0eb49bb58299e4ae4842578f4e7
SHA17e576dcdc1afc4447c5ef129110e331b2988ac33
SHA256c1a1491c4faf31908185d50d9d65e5b1fb49f424c1cd10c02d3a8a32ade44e57
SHA512ff0d98dc3d256315f8a46c0136f5c6c2037d725b18d36aa3fb49ffcdd3212c457af2a46ca84ed169eabcc2abeaf30ee9730341d64b8e1845dfd48227fa576742
-
Filesize
709KB
MD5b9c3d0eb49bb58299e4ae4842578f4e7
SHA17e576dcdc1afc4447c5ef129110e331b2988ac33
SHA256c1a1491c4faf31908185d50d9d65e5b1fb49f424c1cd10c02d3a8a32ade44e57
SHA512ff0d98dc3d256315f8a46c0136f5c6c2037d725b18d36aa3fb49ffcdd3212c457af2a46ca84ed169eabcc2abeaf30ee9730341d64b8e1845dfd48227fa576742
-
Filesize
330KB
MD598bee9ed569ade9ff9a0ad68328569fb
SHA19f224c8f6169ee8ceb1545a5ceffb4223642bd93
SHA256b64976f7131639dffbc03b26aeaf31a6caf9c0bdaf87235a8e72c1df0463a2da
SHA5126c3209bc152ebe2446b8b72c05431b3b0bc0df24e4f34736da4c0962b56f52fdf76551de1c5db28117c6644aa70dcb3ebb78d2293b71bbbfbe2fb2f5afd6331b
-
Filesize
330KB
MD598bee9ed569ade9ff9a0ad68328569fb
SHA19f224c8f6169ee8ceb1545a5ceffb4223642bd93
SHA256b64976f7131639dffbc03b26aeaf31a6caf9c0bdaf87235a8e72c1df0463a2da
SHA5126c3209bc152ebe2446b8b72c05431b3b0bc0df24e4f34736da4c0962b56f52fdf76551de1c5db28117c6644aa70dcb3ebb78d2293b71bbbfbe2fb2f5afd6331b
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5e16c2f9ce0ab4515b109705bc83934ae
SHA1d2eab42972d85def245646d045acc2b0fece33b5
SHA2562adc31c53762ded623a7ec30bb98cdf4f3bb11dcac09d5713eb5e3387b6fdd8b
SHA5122f0ef9d0a540661c76167cadd65511e8b7f82e293ed813cdf0ad2dc19888841cca5991adfbd467f8ea769c825cd971d07d73ea051e8cd4a84be02269cbced0a1
-
Filesize
1.1MB
MD5e16c2f9ce0ab4515b109705bc83934ae
SHA1d2eab42972d85def245646d045acc2b0fece33b5
SHA2562adc31c53762ded623a7ec30bb98cdf4f3bb11dcac09d5713eb5e3387b6fdd8b
SHA5122f0ef9d0a540661c76167cadd65511e8b7f82e293ed813cdf0ad2dc19888841cca5991adfbd467f8ea769c825cd971d07d73ea051e8cd4a84be02269cbced0a1
-
Filesize
709KB
MD5b9c3d0eb49bb58299e4ae4842578f4e7
SHA17e576dcdc1afc4447c5ef129110e331b2988ac33
SHA256c1a1491c4faf31908185d50d9d65e5b1fb49f424c1cd10c02d3a8a32ade44e57
SHA512ff0d98dc3d256315f8a46c0136f5c6c2037d725b18d36aa3fb49ffcdd3212c457af2a46ca84ed169eabcc2abeaf30ee9730341d64b8e1845dfd48227fa576742
-
Filesize
709KB
MD5b9c3d0eb49bb58299e4ae4842578f4e7
SHA17e576dcdc1afc4447c5ef129110e331b2988ac33
SHA256c1a1491c4faf31908185d50d9d65e5b1fb49f424c1cd10c02d3a8a32ade44e57
SHA512ff0d98dc3d256315f8a46c0136f5c6c2037d725b18d36aa3fb49ffcdd3212c457af2a46ca84ed169eabcc2abeaf30ee9730341d64b8e1845dfd48227fa576742
-
Filesize
330KB
MD598bee9ed569ade9ff9a0ad68328569fb
SHA19f224c8f6169ee8ceb1545a5ceffb4223642bd93
SHA256b64976f7131639dffbc03b26aeaf31a6caf9c0bdaf87235a8e72c1df0463a2da
SHA5126c3209bc152ebe2446b8b72c05431b3b0bc0df24e4f34736da4c0962b56f52fdf76551de1c5db28117c6644aa70dcb3ebb78d2293b71bbbfbe2fb2f5afd6331b
-
Filesize
330KB
MD598bee9ed569ade9ff9a0ad68328569fb
SHA19f224c8f6169ee8ceb1545a5ceffb4223642bd93
SHA256b64976f7131639dffbc03b26aeaf31a6caf9c0bdaf87235a8e72c1df0463a2da
SHA5126c3209bc152ebe2446b8b72c05431b3b0bc0df24e4f34736da4c0962b56f52fdf76551de1c5db28117c6644aa70dcb3ebb78d2293b71bbbfbe2fb2f5afd6331b
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81