Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
879KB
-
MD5
3c6dfeb91fe9ba36037da83bff7bb12f
-
SHA1
6194931caded26128418a5cfeaafd61d00bf7384
-
SHA256
7941e3ad78b3fee9fcf4f17f43845c5ad33a1803b41576832c85327386416e05
-
SHA512
ab018f9fd368e3d2d20934c32eae3d03a6921fe00f16e21243e2d000677e726a07f3469a5113c1294e4ee32a92626c74147d07b09d61e45bc14abbae577f2c41
-
SSDEEP
12288:TMrTy90xFA1FFN6G06DnCYdYkNjwyFlcQRpyYu66mooPBlZHRZcboMJkX1MXKaNg:wy8ufWMYk5Fl3pyjGPBzRm8x1rzVJ6A
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2432 xX1IB79.exe 1872 jP2HP61.exe 2656 Lb6ct54.exe 2660 1rZ85Xs3.exe -
Loads dropped DLL 13 IoCs
pid Process 1148 file.exe 2432 xX1IB79.exe 2432 xX1IB79.exe 1872 jP2HP61.exe 1872 jP2HP61.exe 2656 Lb6ct54.exe 2656 Lb6ct54.exe 2656 Lb6ct54.exe 2660 1rZ85Xs3.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" xX1IB79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" jP2HP61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Lb6ct54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 2792 2660 1rZ85Xs3.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2808 2660 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 AppLaunch.exe 2792 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 1148 wrote to memory of 2432 1148 file.exe 28 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 2432 wrote to memory of 1872 2432 xX1IB79.exe 29 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 1872 wrote to memory of 2656 1872 jP2HP61.exe 30 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2656 wrote to memory of 2660 2656 Lb6ct54.exe 31 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2792 2660 1rZ85Xs3.exe 32 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33 PID 2660 wrote to memory of 2808 2660 1rZ85Xs3.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xX1IB79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xX1IB79.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jP2HP61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jP2HP61.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Lb6ct54.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Lb6ct54.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rZ85Xs3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rZ85Xs3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2808
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739KB
MD5a265ae557d4ee7b4ffd7651f408a2852
SHA1338768f3f34381c8a25c6a43473ac8a1739ed16c
SHA2567692b21a9e930fa53549f38f827454dce8821fd25169d7ee1f586fbf439454f1
SHA5123d5b9dc34b1bc5de327c2aa8a9072596098641dc722437eced6da6c5771ce6981677d592468ce9b65067737549cd08ff4a44c46698af1e2fa215b7335fac9026
-
Filesize
739KB
MD5a265ae557d4ee7b4ffd7651f408a2852
SHA1338768f3f34381c8a25c6a43473ac8a1739ed16c
SHA2567692b21a9e930fa53549f38f827454dce8821fd25169d7ee1f586fbf439454f1
SHA5123d5b9dc34b1bc5de327c2aa8a9072596098641dc722437eced6da6c5771ce6981677d592468ce9b65067737549cd08ff4a44c46698af1e2fa215b7335fac9026
-
Filesize
503KB
MD54286304738f1565316f5d37d4927c8c3
SHA1401b6b3a2c898ec8c590049dffc092817755d355
SHA25686ef52ea0d3b11eeb2181465e6214d406b918c03cc09a4577004cc4266396555
SHA512db12b762fe2163c6be65e42dc4262eb633232a395f9d7eda722981b4c4fb5036e47014c5e7b14d3684a6ad6fa62e0d1b1a4da2adce77aa3dfa4a93c56a8b7182
-
Filesize
503KB
MD54286304738f1565316f5d37d4927c8c3
SHA1401b6b3a2c898ec8c590049dffc092817755d355
SHA25686ef52ea0d3b11eeb2181465e6214d406b918c03cc09a4577004cc4266396555
SHA512db12b762fe2163c6be65e42dc4262eb633232a395f9d7eda722981b4c4fb5036e47014c5e7b14d3684a6ad6fa62e0d1b1a4da2adce77aa3dfa4a93c56a8b7182
-
Filesize
317KB
MD54ad8330308a8859abf2f3606c820e3e1
SHA1f17710ff9653c4fa8771ebd5d84b9598e9e510b6
SHA2562692df89d1fc0b7fb0e4de5d94ade847f986cb2f5935808e625867b42e7c62ea
SHA512602d6a24ecc487f0a9fca483cb1f225c903a729e0f0d6394783bcf8cdf45dda4fd77ba9e0bd94395a1b6cf25caecb073562b9524f123cb8063d649a83a0dc521
-
Filesize
317KB
MD54ad8330308a8859abf2f3606c820e3e1
SHA1f17710ff9653c4fa8771ebd5d84b9598e9e510b6
SHA2562692df89d1fc0b7fb0e4de5d94ade847f986cb2f5935808e625867b42e7c62ea
SHA512602d6a24ecc487f0a9fca483cb1f225c903a729e0f0d6394783bcf8cdf45dda4fd77ba9e0bd94395a1b6cf25caecb073562b9524f123cb8063d649a83a0dc521
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
739KB
MD5a265ae557d4ee7b4ffd7651f408a2852
SHA1338768f3f34381c8a25c6a43473ac8a1739ed16c
SHA2567692b21a9e930fa53549f38f827454dce8821fd25169d7ee1f586fbf439454f1
SHA5123d5b9dc34b1bc5de327c2aa8a9072596098641dc722437eced6da6c5771ce6981677d592468ce9b65067737549cd08ff4a44c46698af1e2fa215b7335fac9026
-
Filesize
739KB
MD5a265ae557d4ee7b4ffd7651f408a2852
SHA1338768f3f34381c8a25c6a43473ac8a1739ed16c
SHA2567692b21a9e930fa53549f38f827454dce8821fd25169d7ee1f586fbf439454f1
SHA5123d5b9dc34b1bc5de327c2aa8a9072596098641dc722437eced6da6c5771ce6981677d592468ce9b65067737549cd08ff4a44c46698af1e2fa215b7335fac9026
-
Filesize
503KB
MD54286304738f1565316f5d37d4927c8c3
SHA1401b6b3a2c898ec8c590049dffc092817755d355
SHA25686ef52ea0d3b11eeb2181465e6214d406b918c03cc09a4577004cc4266396555
SHA512db12b762fe2163c6be65e42dc4262eb633232a395f9d7eda722981b4c4fb5036e47014c5e7b14d3684a6ad6fa62e0d1b1a4da2adce77aa3dfa4a93c56a8b7182
-
Filesize
503KB
MD54286304738f1565316f5d37d4927c8c3
SHA1401b6b3a2c898ec8c590049dffc092817755d355
SHA25686ef52ea0d3b11eeb2181465e6214d406b918c03cc09a4577004cc4266396555
SHA512db12b762fe2163c6be65e42dc4262eb633232a395f9d7eda722981b4c4fb5036e47014c5e7b14d3684a6ad6fa62e0d1b1a4da2adce77aa3dfa4a93c56a8b7182
-
Filesize
317KB
MD54ad8330308a8859abf2f3606c820e3e1
SHA1f17710ff9653c4fa8771ebd5d84b9598e9e510b6
SHA2562692df89d1fc0b7fb0e4de5d94ade847f986cb2f5935808e625867b42e7c62ea
SHA512602d6a24ecc487f0a9fca483cb1f225c903a729e0f0d6394783bcf8cdf45dda4fd77ba9e0bd94395a1b6cf25caecb073562b9524f123cb8063d649a83a0dc521
-
Filesize
317KB
MD54ad8330308a8859abf2f3606c820e3e1
SHA1f17710ff9653c4fa8771ebd5d84b9598e9e510b6
SHA2562692df89d1fc0b7fb0e4de5d94ade847f986cb2f5935808e625867b42e7c62ea
SHA512602d6a24ecc487f0a9fca483cb1f225c903a729e0f0d6394783bcf8cdf45dda4fd77ba9e0bd94395a1b6cf25caecb073562b9524f123cb8063d649a83a0dc521
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c