Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe
Resource
win10v2004-20230915-en
General
-
Target
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe
-
Size
1.3MB
-
MD5
569fd5339c6db72ca8fbee60173223f7
-
SHA1
4cc659429c5dc5b69693f7e9da24e553d61fafe3
-
SHA256
b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7
-
SHA512
5ba01cb36f3902eea832a7021b0857f2894851b1163717465baf8960a2b45404a4e097eae1d3723c0e1c708ba1674981d769d8874bc2a32310e11141bea19c18
-
SSDEEP
24576:cyGJ/IEZe2uHX0qnzDhxVpYv7oqYi++MwPHeBUmd879lYOE2DbEwUS69gvyBORS4:LGZfg2a0qNaoH9+MwfeauOEAEwUX6qk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2204 Qh5SS94.exe 2636 Yp9AJ22.exe 2588 aw5ha52.exe 2840 1ps75KF7.exe -
Loads dropped DLL 12 IoCs
pid Process 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 2204 Qh5SS94.exe 2204 Qh5SS94.exe 2636 Yp9AJ22.exe 2636 Yp9AJ22.exe 2588 aw5ha52.exe 2588 aw5ha52.exe 2840 1ps75KF7.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qh5SS94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Yp9AJ22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" aw5ha52.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 2832 2840 1ps75KF7.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2220 2840 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2832 AppLaunch.exe 2832 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2832 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2124 wrote to memory of 2204 2124 b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe 28 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2204 wrote to memory of 2636 2204 Qh5SS94.exe 29 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2636 wrote to memory of 2588 2636 Yp9AJ22.exe 30 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2588 wrote to memory of 2840 2588 aw5ha52.exe 31 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2832 2840 1ps75KF7.exe 32 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33 PID 2840 wrote to memory of 2220 2840 1ps75KF7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe"C:\Users\Admin\AppData\Local\Temp\b845d0fcdba96d43d571a8a8500c9f2db33cd9f8bf03dc75f7a36a97d35ccac7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qh5SS94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qh5SS94.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yp9AJ22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yp9AJ22.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5ha52.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5ha52.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ps75KF7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1ps75KF7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2220
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD597ab8b3b76d3aa5cdc61b3530e444907
SHA18e3f46f680e7b69e893dc07b12b2cab51153ad9a
SHA2563eceb0ccf0f2c7cc8ab9dbc123069e2b7b734fd53e0d46ebca511c874674f430
SHA51274714cb412981fbe5fbbe195de8cff9eff8563a21d780b2430a9421da74ff4fd8f7afd7bbb02d8b074a53af46da5f74b6b9092b56459e2a30cce2c00003a9b1f
-
Filesize
1.1MB
MD597ab8b3b76d3aa5cdc61b3530e444907
SHA18e3f46f680e7b69e893dc07b12b2cab51153ad9a
SHA2563eceb0ccf0f2c7cc8ab9dbc123069e2b7b734fd53e0d46ebca511c874674f430
SHA51274714cb412981fbe5fbbe195de8cff9eff8563a21d780b2430a9421da74ff4fd8f7afd7bbb02d8b074a53af46da5f74b6b9092b56459e2a30cce2c00003a9b1f
-
Filesize
707KB
MD5ead9bd1087e63b4176e864e8ba4ca6dc
SHA13c77f5adc1913e0b51fcdf79073b1caa845208bd
SHA256c89ad2635f29c9d9701c27a5203888e8fb88c082896a12d10196476b25b693ca
SHA5125461f5423dec1ef8da8bfe7b5254a6801c4ce8f6b8da0f931c33a4c7e73a2992d5ddc17165043241c5e904a880730e733c43c26886336fd929f88cd3d5b28664
-
Filesize
707KB
MD5ead9bd1087e63b4176e864e8ba4ca6dc
SHA13c77f5adc1913e0b51fcdf79073b1caa845208bd
SHA256c89ad2635f29c9d9701c27a5203888e8fb88c082896a12d10196476b25b693ca
SHA5125461f5423dec1ef8da8bfe7b5254a6801c4ce8f6b8da0f931c33a4c7e73a2992d5ddc17165043241c5e904a880730e733c43c26886336fd929f88cd3d5b28664
-
Filesize
330KB
MD522039dd42004777c7b7b34504a11ea21
SHA11fe3d708a2705ebadd258f3a856ba65fd3741b44
SHA25683bd6f89b44069d29e95555968c5a823b52f2187a87ce1622fd90404ccbe2a26
SHA51241998a03f480d9cb4d74817cd23322eb84b270ab5e174f594e4e534c1ecadf2f390ec63395ffeb0334c512e45167eea62355f75fc57e5b18bcbe1f1fb48e9fd8
-
Filesize
330KB
MD522039dd42004777c7b7b34504a11ea21
SHA11fe3d708a2705ebadd258f3a856ba65fd3741b44
SHA25683bd6f89b44069d29e95555968c5a823b52f2187a87ce1622fd90404ccbe2a26
SHA51241998a03f480d9cb4d74817cd23322eb84b270ab5e174f594e4e534c1ecadf2f390ec63395ffeb0334c512e45167eea62355f75fc57e5b18bcbe1f1fb48e9fd8
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD597ab8b3b76d3aa5cdc61b3530e444907
SHA18e3f46f680e7b69e893dc07b12b2cab51153ad9a
SHA2563eceb0ccf0f2c7cc8ab9dbc123069e2b7b734fd53e0d46ebca511c874674f430
SHA51274714cb412981fbe5fbbe195de8cff9eff8563a21d780b2430a9421da74ff4fd8f7afd7bbb02d8b074a53af46da5f74b6b9092b56459e2a30cce2c00003a9b1f
-
Filesize
1.1MB
MD597ab8b3b76d3aa5cdc61b3530e444907
SHA18e3f46f680e7b69e893dc07b12b2cab51153ad9a
SHA2563eceb0ccf0f2c7cc8ab9dbc123069e2b7b734fd53e0d46ebca511c874674f430
SHA51274714cb412981fbe5fbbe195de8cff9eff8563a21d780b2430a9421da74ff4fd8f7afd7bbb02d8b074a53af46da5f74b6b9092b56459e2a30cce2c00003a9b1f
-
Filesize
707KB
MD5ead9bd1087e63b4176e864e8ba4ca6dc
SHA13c77f5adc1913e0b51fcdf79073b1caa845208bd
SHA256c89ad2635f29c9d9701c27a5203888e8fb88c082896a12d10196476b25b693ca
SHA5125461f5423dec1ef8da8bfe7b5254a6801c4ce8f6b8da0f931c33a4c7e73a2992d5ddc17165043241c5e904a880730e733c43c26886336fd929f88cd3d5b28664
-
Filesize
707KB
MD5ead9bd1087e63b4176e864e8ba4ca6dc
SHA13c77f5adc1913e0b51fcdf79073b1caa845208bd
SHA256c89ad2635f29c9d9701c27a5203888e8fb88c082896a12d10196476b25b693ca
SHA5125461f5423dec1ef8da8bfe7b5254a6801c4ce8f6b8da0f931c33a4c7e73a2992d5ddc17165043241c5e904a880730e733c43c26886336fd929f88cd3d5b28664
-
Filesize
330KB
MD522039dd42004777c7b7b34504a11ea21
SHA11fe3d708a2705ebadd258f3a856ba65fd3741b44
SHA25683bd6f89b44069d29e95555968c5a823b52f2187a87ce1622fd90404ccbe2a26
SHA51241998a03f480d9cb4d74817cd23322eb84b270ab5e174f594e4e534c1ecadf2f390ec63395ffeb0334c512e45167eea62355f75fc57e5b18bcbe1f1fb48e9fd8
-
Filesize
330KB
MD522039dd42004777c7b7b34504a11ea21
SHA11fe3d708a2705ebadd258f3a856ba65fd3741b44
SHA25683bd6f89b44069d29e95555968c5a823b52f2187a87ce1622fd90404ccbe2a26
SHA51241998a03f480d9cb4d74817cd23322eb84b270ab5e174f594e4e534c1ecadf2f390ec63395ffeb0334c512e45167eea62355f75fc57e5b18bcbe1f1fb48e9fd8
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81