Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
876KB
-
MD5
654fb3e0e40ba59b5efd8e2cf8cffbf1
-
SHA1
cae47170637cc2813608f5b80eae9e24f3e94e8f
-
SHA256
ed85383070a7d0811bea2aadc85bd086a55da944baccfe1a485e9704d3c3544d
-
SHA512
7526cb5ca6dcea61fe7e5d2a2ca75909eae1cd420bf16c4f239117a05d387af2213b0059fb711a46a6d1009c0ad6828996f721dbd76266e8aa249e1334d0c355
-
SSDEEP
12288:LMrLy90i0k5p/j9o0O8mBqK+Fq6A/FzAaOCSxM6X2Ja1fNaGDdJ20+ktoIlLqy3+:Qy3dTtWz8EFztmaqi0+ktoIlT3NwsPc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2664 Vh9Up59.exe 2532 sg4ww08.exe 2552 VH8CU74.exe 2796 1Kf98vk2.exe -
Loads dropped DLL 13 IoCs
pid Process 2800 file.exe 2664 Vh9Up59.exe 2664 Vh9Up59.exe 2532 sg4ww08.exe 2532 sg4ww08.exe 2552 VH8CU74.exe 2552 VH8CU74.exe 2552 VH8CU74.exe 2796 1Kf98vk2.exe 2196 WerFault.exe 2196 WerFault.exe 2196 WerFault.exe 2196 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" VH8CU74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Vh9Up59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sg4ww08.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 2596 2796 1Kf98vk2.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2196 2796 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 AppLaunch.exe 2596 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2800 wrote to memory of 2664 2800 file.exe 29 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2664 wrote to memory of 2532 2664 Vh9Up59.exe 30 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2532 wrote to memory of 2552 2532 sg4ww08.exe 31 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2552 wrote to memory of 2796 2552 VH8CU74.exe 32 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2596 2796 1Kf98vk2.exe 33 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34 PID 2796 wrote to memory of 2196 2796 1Kf98vk2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vh9Up59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vh9Up59.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sg4ww08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sg4ww08.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VH8CU74.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VH8CU74.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kf98vk2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kf98vk2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2196
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
737KB
MD579d12eed0589b8caa297934a78e5c738
SHA1378ebe78d883bff7c6b76a076cd873f3e707a892
SHA25600e4e28c06da577ce0c00e856cae3f8f1024f0960c8d88a4a875f96bf5096ee4
SHA512264164f79face64dff91d9ba0a5b24b03f9d212915f6311d3e29b8639a710c357c3b25b9969baf149d9209236fc8bd38ebb01814fdf2dfe096787cad69d86c75
-
Filesize
737KB
MD579d12eed0589b8caa297934a78e5c738
SHA1378ebe78d883bff7c6b76a076cd873f3e707a892
SHA25600e4e28c06da577ce0c00e856cae3f8f1024f0960c8d88a4a875f96bf5096ee4
SHA512264164f79face64dff91d9ba0a5b24b03f9d212915f6311d3e29b8639a710c357c3b25b9969baf149d9209236fc8bd38ebb01814fdf2dfe096787cad69d86c75
-
Filesize
502KB
MD582cb55ee7f0bd3136f67a2ba3d7f577a
SHA1961209043e778781d082a17ed885945a97e2a125
SHA256b3bd9e0af054a200e3534d3dfb19219a489e94e9c0d8cf38fda3c2453bd03b8e
SHA5121d162899a4bbf1046ae95947aa2f4eca76e0148e9172104472b8e12c0ab09f09ce2270ec54b51c95c6f3c3541416fcba909a954cf241f8e9aa6dfe9830791692
-
Filesize
502KB
MD582cb55ee7f0bd3136f67a2ba3d7f577a
SHA1961209043e778781d082a17ed885945a97e2a125
SHA256b3bd9e0af054a200e3534d3dfb19219a489e94e9c0d8cf38fda3c2453bd03b8e
SHA5121d162899a4bbf1046ae95947aa2f4eca76e0148e9172104472b8e12c0ab09f09ce2270ec54b51c95c6f3c3541416fcba909a954cf241f8e9aa6dfe9830791692
-
Filesize
317KB
MD58a1f96c4064a052a986f56262e7c5074
SHA14337fc1e314b2e424a87f35072c61d12098869db
SHA25625d62cfad20d48ab90926a61d505c490856695efeeb7945c9b7a2a31c9a01a04
SHA5121642b8e45fb9980597ddefa12725890db81d2bd498081eebf77c1b21fe539e57b03811f7f42b6aa877a040bcb92a340b298f66cca1a2866fd3fed76f7f35f694
-
Filesize
317KB
MD58a1f96c4064a052a986f56262e7c5074
SHA14337fc1e314b2e424a87f35072c61d12098869db
SHA25625d62cfad20d48ab90926a61d505c490856695efeeb7945c9b7a2a31c9a01a04
SHA5121642b8e45fb9980597ddefa12725890db81d2bd498081eebf77c1b21fe539e57b03811f7f42b6aa877a040bcb92a340b298f66cca1a2866fd3fed76f7f35f694
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
737KB
MD579d12eed0589b8caa297934a78e5c738
SHA1378ebe78d883bff7c6b76a076cd873f3e707a892
SHA25600e4e28c06da577ce0c00e856cae3f8f1024f0960c8d88a4a875f96bf5096ee4
SHA512264164f79face64dff91d9ba0a5b24b03f9d212915f6311d3e29b8639a710c357c3b25b9969baf149d9209236fc8bd38ebb01814fdf2dfe096787cad69d86c75
-
Filesize
737KB
MD579d12eed0589b8caa297934a78e5c738
SHA1378ebe78d883bff7c6b76a076cd873f3e707a892
SHA25600e4e28c06da577ce0c00e856cae3f8f1024f0960c8d88a4a875f96bf5096ee4
SHA512264164f79face64dff91d9ba0a5b24b03f9d212915f6311d3e29b8639a710c357c3b25b9969baf149d9209236fc8bd38ebb01814fdf2dfe096787cad69d86c75
-
Filesize
502KB
MD582cb55ee7f0bd3136f67a2ba3d7f577a
SHA1961209043e778781d082a17ed885945a97e2a125
SHA256b3bd9e0af054a200e3534d3dfb19219a489e94e9c0d8cf38fda3c2453bd03b8e
SHA5121d162899a4bbf1046ae95947aa2f4eca76e0148e9172104472b8e12c0ab09f09ce2270ec54b51c95c6f3c3541416fcba909a954cf241f8e9aa6dfe9830791692
-
Filesize
502KB
MD582cb55ee7f0bd3136f67a2ba3d7f577a
SHA1961209043e778781d082a17ed885945a97e2a125
SHA256b3bd9e0af054a200e3534d3dfb19219a489e94e9c0d8cf38fda3c2453bd03b8e
SHA5121d162899a4bbf1046ae95947aa2f4eca76e0148e9172104472b8e12c0ab09f09ce2270ec54b51c95c6f3c3541416fcba909a954cf241f8e9aa6dfe9830791692
-
Filesize
317KB
MD58a1f96c4064a052a986f56262e7c5074
SHA14337fc1e314b2e424a87f35072c61d12098869db
SHA25625d62cfad20d48ab90926a61d505c490856695efeeb7945c9b7a2a31c9a01a04
SHA5121642b8e45fb9980597ddefa12725890db81d2bd498081eebf77c1b21fe539e57b03811f7f42b6aa877a040bcb92a340b298f66cca1a2866fd3fed76f7f35f694
-
Filesize
317KB
MD58a1f96c4064a052a986f56262e7c5074
SHA14337fc1e314b2e424a87f35072c61d12098869db
SHA25625d62cfad20d48ab90926a61d505c490856695efeeb7945c9b7a2a31c9a01a04
SHA5121642b8e45fb9980597ddefa12725890db81d2bd498081eebf77c1b21fe539e57b03811f7f42b6aa877a040bcb92a340b298f66cca1a2866fd3fed76f7f35f694
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c