Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
877KB
-
MD5
eca05379305a79927fa28d92dfae17e4
-
SHA1
04dd6087a27ae3c952e37f7e3376d1684c4d89c2
-
SHA256
df577e470c318e1742981d5f4029734392e3ef74366b554a77e78023590fc57f
-
SHA512
399cc8ae6be5a08ada89a58409e5c5e97a6e936d140279066b90133ca0cdb3efbf36f90f2c480abcdc3849471ce56de4fa35c22f94bc7fc3923143dfd800b644
-
SSDEEP
12288:mMrRy90OZS8MmmyqQaai0wpNTcHMPAqUA/im7He4aHKOC1AzOIwV:vyb/myDaaRecsoqFimDe5Hsy8V
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2604 sn9jA91.exe 2736 gg0Mr52.exe 2904 SN8Us39.exe 1740 1dK35Zk7.exe -
Loads dropped DLL 13 IoCs
pid Process 2228 file.exe 2604 sn9jA91.exe 2604 sn9jA91.exe 2736 gg0Mr52.exe 2736 gg0Mr52.exe 2904 SN8Us39.exe 2904 SN8Us39.exe 2904 SN8Us39.exe 1740 1dK35Zk7.exe 804 WerFault.exe 804 WerFault.exe 804 WerFault.exe 804 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sn9jA91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gg0Mr52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" SN8Us39.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 2712 1740 1dK35Zk7.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 804 1740 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 AppLaunch.exe 2712 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2228 wrote to memory of 2604 2228 file.exe 28 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2604 wrote to memory of 2736 2604 sn9jA91.exe 29 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2736 wrote to memory of 2904 2736 gg0Mr52.exe 30 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 2904 wrote to memory of 1740 2904 SN8Us39.exe 31 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 2712 1740 1dK35Zk7.exe 32 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33 PID 1740 wrote to memory of 804 1740 1dK35Zk7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sn9jA91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sn9jA91.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gg0Mr52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gg0Mr52.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\SN8Us39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\SN8Us39.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dK35Zk7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dK35Zk7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:804
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738KB
MD5c64805e6684b4a1ed2df2aa7369d4570
SHA1be7ef85f78ebf9bc6e24a869f22b9c8d88a8fddf
SHA25607af005f82050105cbaa7685ded57dc50777c768bf1df74f614259573d724e38
SHA512d2cc179385015dadf0ffae450ea63bac8b81f51c2f31f35a7b4af00772ad50833efbc3c8e1f2788f7ac373d60bc6455adad5546cfc746bcdb5593be03e82883b
-
Filesize
738KB
MD5c64805e6684b4a1ed2df2aa7369d4570
SHA1be7ef85f78ebf9bc6e24a869f22b9c8d88a8fddf
SHA25607af005f82050105cbaa7685ded57dc50777c768bf1df74f614259573d724e38
SHA512d2cc179385015dadf0ffae450ea63bac8b81f51c2f31f35a7b4af00772ad50833efbc3c8e1f2788f7ac373d60bc6455adad5546cfc746bcdb5593be03e82883b
-
Filesize
503KB
MD58a41a1de42f0c015f8f51b69fcb28e17
SHA1e55f6a67e1d0a21fc7b529dbf1e114bdc0002721
SHA25629ac9b30938f4062db2b9930635d9a23cbf9579dc808ba044c797b4df720ad5e
SHA512cc98eb44055796705beb7faf895ee5a1e0a936da3c49f080c5a3a6afe1a00587954814b8628cb764105c1d52850b056925d34cf9f7ba37ecf15775b1f273e998
-
Filesize
503KB
MD58a41a1de42f0c015f8f51b69fcb28e17
SHA1e55f6a67e1d0a21fc7b529dbf1e114bdc0002721
SHA25629ac9b30938f4062db2b9930635d9a23cbf9579dc808ba044c797b4df720ad5e
SHA512cc98eb44055796705beb7faf895ee5a1e0a936da3c49f080c5a3a6afe1a00587954814b8628cb764105c1d52850b056925d34cf9f7ba37ecf15775b1f273e998
-
Filesize
317KB
MD58b8e285daa79c4b98940904118efd88b
SHA1c5c840c0fd05b59109788b7efda949644ca5c60d
SHA256becc1f830480e1c2719fdfef9e8b29299bcd4e380188a6c8434b4102f00dd98c
SHA5127a184475de1667e64265411897c1e8873071b4ca97ff3e0b0505e7c9bddb40b2427e5d251b3d3e9ffb0fed924b28ba5f9bb7c159b3644e99ef4caa51d4a3948e
-
Filesize
317KB
MD58b8e285daa79c4b98940904118efd88b
SHA1c5c840c0fd05b59109788b7efda949644ca5c60d
SHA256becc1f830480e1c2719fdfef9e8b29299bcd4e380188a6c8434b4102f00dd98c
SHA5127a184475de1667e64265411897c1e8873071b4ca97ff3e0b0505e7c9bddb40b2427e5d251b3d3e9ffb0fed924b28ba5f9bb7c159b3644e99ef4caa51d4a3948e
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
738KB
MD5c64805e6684b4a1ed2df2aa7369d4570
SHA1be7ef85f78ebf9bc6e24a869f22b9c8d88a8fddf
SHA25607af005f82050105cbaa7685ded57dc50777c768bf1df74f614259573d724e38
SHA512d2cc179385015dadf0ffae450ea63bac8b81f51c2f31f35a7b4af00772ad50833efbc3c8e1f2788f7ac373d60bc6455adad5546cfc746bcdb5593be03e82883b
-
Filesize
738KB
MD5c64805e6684b4a1ed2df2aa7369d4570
SHA1be7ef85f78ebf9bc6e24a869f22b9c8d88a8fddf
SHA25607af005f82050105cbaa7685ded57dc50777c768bf1df74f614259573d724e38
SHA512d2cc179385015dadf0ffae450ea63bac8b81f51c2f31f35a7b4af00772ad50833efbc3c8e1f2788f7ac373d60bc6455adad5546cfc746bcdb5593be03e82883b
-
Filesize
503KB
MD58a41a1de42f0c015f8f51b69fcb28e17
SHA1e55f6a67e1d0a21fc7b529dbf1e114bdc0002721
SHA25629ac9b30938f4062db2b9930635d9a23cbf9579dc808ba044c797b4df720ad5e
SHA512cc98eb44055796705beb7faf895ee5a1e0a936da3c49f080c5a3a6afe1a00587954814b8628cb764105c1d52850b056925d34cf9f7ba37ecf15775b1f273e998
-
Filesize
503KB
MD58a41a1de42f0c015f8f51b69fcb28e17
SHA1e55f6a67e1d0a21fc7b529dbf1e114bdc0002721
SHA25629ac9b30938f4062db2b9930635d9a23cbf9579dc808ba044c797b4df720ad5e
SHA512cc98eb44055796705beb7faf895ee5a1e0a936da3c49f080c5a3a6afe1a00587954814b8628cb764105c1d52850b056925d34cf9f7ba37ecf15775b1f273e998
-
Filesize
317KB
MD58b8e285daa79c4b98940904118efd88b
SHA1c5c840c0fd05b59109788b7efda949644ca5c60d
SHA256becc1f830480e1c2719fdfef9e8b29299bcd4e380188a6c8434b4102f00dd98c
SHA5127a184475de1667e64265411897c1e8873071b4ca97ff3e0b0505e7c9bddb40b2427e5d251b3d3e9ffb0fed924b28ba5f9bb7c159b3644e99ef4caa51d4a3948e
-
Filesize
317KB
MD58b8e285daa79c4b98940904118efd88b
SHA1c5c840c0fd05b59109788b7efda949644ca5c60d
SHA256becc1f830480e1c2719fdfef9e8b29299bcd4e380188a6c8434b4102f00dd98c
SHA5127a184475de1667e64265411897c1e8873071b4ca97ff3e0b0505e7c9bddb40b2427e5d251b3d3e9ffb0fed924b28ba5f9bb7c159b3644e99ef4caa51d4a3948e
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c