Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
878KB
-
MD5
d4d2e1ff2787b4f220f64fb4df76dd27
-
SHA1
9c57173f5b93630e95f27b1d9fa2946d2584b544
-
SHA256
9199be7aefdf13bec12f84faddd5a722429a511427ff866aa31ddc80095c5a1a
-
SHA512
4ddf905d3e8d7acdcc7ff90ccbc7fc7af9da4c99f20a8b17a50fef963d40265649ed2940b3b5ccdcef512829c517a4bad38d0cecf39fc41b24d764ee2edba8dd
-
SSDEEP
12288:oMrqy90xWPPmw0SMP2LASWOCeAXE9HpjFzFfUYJLxH5gUqtmAjVX1QD8sfQxn:Sy2WPwSAneWuhfUYdnOmqVX8DQN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1004 Pk2nY68.exe 1228 rT4sa27.exe 1256 Ze7wr84.exe 1648 1go45MS7.exe -
Loads dropped DLL 13 IoCs
pid Process 2244 file.exe 1004 Pk2nY68.exe 1004 Pk2nY68.exe 1228 rT4sa27.exe 1228 rT4sa27.exe 1256 Ze7wr84.exe 1256 Ze7wr84.exe 1256 Ze7wr84.exe 1648 1go45MS7.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Pk2nY68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" rT4sa27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ze7wr84.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 2672 1648 1go45MS7.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2616 1648 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 AppLaunch.exe 2672 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 2244 wrote to memory of 1004 2244 file.exe 30 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1004 wrote to memory of 1228 1004 Pk2nY68.exe 31 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1228 wrote to memory of 1256 1228 rT4sa27.exe 32 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1256 wrote to memory of 1648 1256 Ze7wr84.exe 33 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2672 1648 1go45MS7.exe 34 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35 PID 1648 wrote to memory of 2616 1648 1go45MS7.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pk2nY68.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pk2nY68.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rT4sa27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rT4sa27.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ze7wr84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ze7wr84.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1go45MS7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1go45MS7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739KB
MD588e01d987702b5510cddc19ba500e454
SHA1aba5441c356ddef40cd445a6b9f1832afe144add
SHA256b2e5a74790cadc6b43bc6c5bb04a418351f5d4aa098aa908c086a09e48c60d03
SHA51260118d2ecc113357c37902bc1cfbfb04fa90525e5a8fdab8dbfcf3f2f0d54657b70686fd8f5c02ddab6413e4cce957685dbf8118f9ad026ab29a2e9450528bd4
-
Filesize
739KB
MD588e01d987702b5510cddc19ba500e454
SHA1aba5441c356ddef40cd445a6b9f1832afe144add
SHA256b2e5a74790cadc6b43bc6c5bb04a418351f5d4aa098aa908c086a09e48c60d03
SHA51260118d2ecc113357c37902bc1cfbfb04fa90525e5a8fdab8dbfcf3f2f0d54657b70686fd8f5c02ddab6413e4cce957685dbf8118f9ad026ab29a2e9450528bd4
-
Filesize
503KB
MD5652c7ac5f455fe01f3f460f3d17b1886
SHA1b22394d53be5f6eb2c937376ffa7c6d0ea1785a4
SHA256d826a1dce04d812061fe81e1215870709672ec9be800b95810673d75125b6851
SHA5121f466eb7eac8c5004fd0eae22f3863149caa0cc9e647d35dd0beb08bf3aba2c3b7109ab5bb46e2500a03c302f556beeb8d2dea301cdad4877bf15c867ff90e04
-
Filesize
503KB
MD5652c7ac5f455fe01f3f460f3d17b1886
SHA1b22394d53be5f6eb2c937376ffa7c6d0ea1785a4
SHA256d826a1dce04d812061fe81e1215870709672ec9be800b95810673d75125b6851
SHA5121f466eb7eac8c5004fd0eae22f3863149caa0cc9e647d35dd0beb08bf3aba2c3b7109ab5bb46e2500a03c302f556beeb8d2dea301cdad4877bf15c867ff90e04
-
Filesize
318KB
MD52604c2ca2e127e9f0f61381f907383d5
SHA1407884cca63a1161647a7d8466ff7e789d554ed5
SHA256da6001d2d6d441effefbeb45cc5bbe161134ee8b2527ff2ce8ec219cf03189dc
SHA512c016b32de18fabb0066c3f760b6b87ae7bbed66abc9f13b11ff092a2ddb91d0449265225b91f1fcd0491f8c45afa9da463c3da02f3570816b26590b458cc6227
-
Filesize
318KB
MD52604c2ca2e127e9f0f61381f907383d5
SHA1407884cca63a1161647a7d8466ff7e789d554ed5
SHA256da6001d2d6d441effefbeb45cc5bbe161134ee8b2527ff2ce8ec219cf03189dc
SHA512c016b32de18fabb0066c3f760b6b87ae7bbed66abc9f13b11ff092a2ddb91d0449265225b91f1fcd0491f8c45afa9da463c3da02f3570816b26590b458cc6227
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
739KB
MD588e01d987702b5510cddc19ba500e454
SHA1aba5441c356ddef40cd445a6b9f1832afe144add
SHA256b2e5a74790cadc6b43bc6c5bb04a418351f5d4aa098aa908c086a09e48c60d03
SHA51260118d2ecc113357c37902bc1cfbfb04fa90525e5a8fdab8dbfcf3f2f0d54657b70686fd8f5c02ddab6413e4cce957685dbf8118f9ad026ab29a2e9450528bd4
-
Filesize
739KB
MD588e01d987702b5510cddc19ba500e454
SHA1aba5441c356ddef40cd445a6b9f1832afe144add
SHA256b2e5a74790cadc6b43bc6c5bb04a418351f5d4aa098aa908c086a09e48c60d03
SHA51260118d2ecc113357c37902bc1cfbfb04fa90525e5a8fdab8dbfcf3f2f0d54657b70686fd8f5c02ddab6413e4cce957685dbf8118f9ad026ab29a2e9450528bd4
-
Filesize
503KB
MD5652c7ac5f455fe01f3f460f3d17b1886
SHA1b22394d53be5f6eb2c937376ffa7c6d0ea1785a4
SHA256d826a1dce04d812061fe81e1215870709672ec9be800b95810673d75125b6851
SHA5121f466eb7eac8c5004fd0eae22f3863149caa0cc9e647d35dd0beb08bf3aba2c3b7109ab5bb46e2500a03c302f556beeb8d2dea301cdad4877bf15c867ff90e04
-
Filesize
503KB
MD5652c7ac5f455fe01f3f460f3d17b1886
SHA1b22394d53be5f6eb2c937376ffa7c6d0ea1785a4
SHA256d826a1dce04d812061fe81e1215870709672ec9be800b95810673d75125b6851
SHA5121f466eb7eac8c5004fd0eae22f3863149caa0cc9e647d35dd0beb08bf3aba2c3b7109ab5bb46e2500a03c302f556beeb8d2dea301cdad4877bf15c867ff90e04
-
Filesize
318KB
MD52604c2ca2e127e9f0f61381f907383d5
SHA1407884cca63a1161647a7d8466ff7e789d554ed5
SHA256da6001d2d6d441effefbeb45cc5bbe161134ee8b2527ff2ce8ec219cf03189dc
SHA512c016b32de18fabb0066c3f760b6b87ae7bbed66abc9f13b11ff092a2ddb91d0449265225b91f1fcd0491f8c45afa9da463c3da02f3570816b26590b458cc6227
-
Filesize
318KB
MD52604c2ca2e127e9f0f61381f907383d5
SHA1407884cca63a1161647a7d8466ff7e789d554ed5
SHA256da6001d2d6d441effefbeb45cc5bbe161134ee8b2527ff2ce8ec219cf03189dc
SHA512c016b32de18fabb0066c3f760b6b87ae7bbed66abc9f13b11ff092a2ddb91d0449265225b91f1fcd0491f8c45afa9da463c3da02f3570816b26590b458cc6227
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c