Analysis
-
max time kernel
1561s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
dbc20b3308015d9595988cd92e5ba068.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dbc20b3308015d9595988cd92e5ba068.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
dbc20b3308015d9595988cd92e5ba068.exe
Resource
win10v2004-20230915-en
General
-
Target
dbc20b3308015d9595988cd92e5ba068.exe
-
Size
882KB
-
MD5
dbc20b3308015d9595988cd92e5ba068
-
SHA1
0e0bba82dc667ea53ea4e9b7ccc52ad5fb334c8d
-
SHA256
f0bdf776607582da4976e6c3724646bfeb7743f308a054a3d4903f3c66665533
-
SHA512
68a86b6bb04befcec200df09d3ea28751c6fbe12b804d933e028056feb7a18c711a6af1092df7dfb941c5077c836d44fa0724794f74079222755e38d26cb7f11
-
SSDEEP
24576:myLLP6sV3ji94yCLBTy02UxembqUaaY/y:1LbVzo4yCVTyRUxembNS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2604 Fw9Jn79.exe 1392 Zg4hs14.exe 2800 nK2zJ64.exe 2176 1HI90kf2.exe -
Loads dropped DLL 13 IoCs
pid Process 320 dbc20b3308015d9595988cd92e5ba068.exe 2604 Fw9Jn79.exe 2604 Fw9Jn79.exe 1392 Zg4hs14.exe 1392 Zg4hs14.exe 2800 nK2zJ64.exe 2800 nK2zJ64.exe 2800 nK2zJ64.exe 2176 1HI90kf2.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dbc20b3308015d9595988cd92e5ba068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Fw9Jn79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Zg4hs14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nK2zJ64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2176 set thread context of 2784 2176 1HI90kf2.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2176 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 AppLaunch.exe 2784 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 320 wrote to memory of 2604 320 dbc20b3308015d9595988cd92e5ba068.exe 28 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 2604 wrote to memory of 1392 2604 Fw9Jn79.exe 29 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 1392 wrote to memory of 2800 1392 Zg4hs14.exe 30 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2800 wrote to memory of 2176 2800 nK2zJ64.exe 31 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2784 2176 1HI90kf2.exe 32 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33 PID 2176 wrote to memory of 2648 2176 1HI90kf2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc20b3308015d9595988cd92e5ba068.exe"C:\Users\Admin\AppData\Local\Temp\dbc20b3308015d9595988cd92e5ba068.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fw9Jn79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fw9Jn79.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zg4hs14.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zg4hs14.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nK2zJ64.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nK2zJ64.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1HI90kf2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1HI90kf2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2648
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743KB
MD5c8f1b6fa9c9b5a4fd46272c6a3db33db
SHA11969cbd8c723b4e523f588cd394ecb24add2184f
SHA256a274105f99df915deb50c4e50029f48a696b0f9deb757ae856b7114153058727
SHA512702ac08c6f5ccf3dd814d1bb08bbb61bda6999050d23e01319c4dce617ebc3a27459f9acb36df518688a30158525d6e2b6ee0f682180cba7ecf82bca9c057497
-
Filesize
743KB
MD5c8f1b6fa9c9b5a4fd46272c6a3db33db
SHA11969cbd8c723b4e523f588cd394ecb24add2184f
SHA256a274105f99df915deb50c4e50029f48a696b0f9deb757ae856b7114153058727
SHA512702ac08c6f5ccf3dd814d1bb08bbb61bda6999050d23e01319c4dce617ebc3a27459f9acb36df518688a30158525d6e2b6ee0f682180cba7ecf82bca9c057497
-
Filesize
509KB
MD5c4361a5e37412de8fb16e70484d032fb
SHA130b04ede8ff108fbb95fef25e4adb49497b46055
SHA256b15b6c6326b42bcb77405b78cb0f984fdb0078d8a86ed9bfe9dc9760907949b5
SHA51229f41b768178452c1a9075b789b0318c9fc2d8973f5934be9adef10bdcd9d00d0a363a9e524436ac9cdb911474113230659a7eadeb0eff227a60b6d7c681e838
-
Filesize
509KB
MD5c4361a5e37412de8fb16e70484d032fb
SHA130b04ede8ff108fbb95fef25e4adb49497b46055
SHA256b15b6c6326b42bcb77405b78cb0f984fdb0078d8a86ed9bfe9dc9760907949b5
SHA51229f41b768178452c1a9075b789b0318c9fc2d8973f5934be9adef10bdcd9d00d0a363a9e524436ac9cdb911474113230659a7eadeb0eff227a60b6d7c681e838
-
Filesize
325KB
MD56a1c6adb8d1a4716f32e9f069c4690ab
SHA112090cec8cb6711c2f89a6a11a6864c539ac37ac
SHA256c6a3006ed372b0b5f033643c8a4d09a05e81f35e8f34f20726930829c0a81774
SHA512517cb8531fe630c2f227be266f81744906f09a9fb1de70b1a6c6a6e8d971d6ce799fd029a6d4112f59ecb91b92fdd8883328983b57bff3f58dc479b793613bb3
-
Filesize
325KB
MD56a1c6adb8d1a4716f32e9f069c4690ab
SHA112090cec8cb6711c2f89a6a11a6864c539ac37ac
SHA256c6a3006ed372b0b5f033643c8a4d09a05e81f35e8f34f20726930829c0a81774
SHA512517cb8531fe630c2f227be266f81744906f09a9fb1de70b1a6c6a6e8d971d6ce799fd029a6d4112f59ecb91b92fdd8883328983b57bff3f58dc479b793613bb3
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
743KB
MD5c8f1b6fa9c9b5a4fd46272c6a3db33db
SHA11969cbd8c723b4e523f588cd394ecb24add2184f
SHA256a274105f99df915deb50c4e50029f48a696b0f9deb757ae856b7114153058727
SHA512702ac08c6f5ccf3dd814d1bb08bbb61bda6999050d23e01319c4dce617ebc3a27459f9acb36df518688a30158525d6e2b6ee0f682180cba7ecf82bca9c057497
-
Filesize
743KB
MD5c8f1b6fa9c9b5a4fd46272c6a3db33db
SHA11969cbd8c723b4e523f588cd394ecb24add2184f
SHA256a274105f99df915deb50c4e50029f48a696b0f9deb757ae856b7114153058727
SHA512702ac08c6f5ccf3dd814d1bb08bbb61bda6999050d23e01319c4dce617ebc3a27459f9acb36df518688a30158525d6e2b6ee0f682180cba7ecf82bca9c057497
-
Filesize
509KB
MD5c4361a5e37412de8fb16e70484d032fb
SHA130b04ede8ff108fbb95fef25e4adb49497b46055
SHA256b15b6c6326b42bcb77405b78cb0f984fdb0078d8a86ed9bfe9dc9760907949b5
SHA51229f41b768178452c1a9075b789b0318c9fc2d8973f5934be9adef10bdcd9d00d0a363a9e524436ac9cdb911474113230659a7eadeb0eff227a60b6d7c681e838
-
Filesize
509KB
MD5c4361a5e37412de8fb16e70484d032fb
SHA130b04ede8ff108fbb95fef25e4adb49497b46055
SHA256b15b6c6326b42bcb77405b78cb0f984fdb0078d8a86ed9bfe9dc9760907949b5
SHA51229f41b768178452c1a9075b789b0318c9fc2d8973f5934be9adef10bdcd9d00d0a363a9e524436ac9cdb911474113230659a7eadeb0eff227a60b6d7c681e838
-
Filesize
325KB
MD56a1c6adb8d1a4716f32e9f069c4690ab
SHA112090cec8cb6711c2f89a6a11a6864c539ac37ac
SHA256c6a3006ed372b0b5f033643c8a4d09a05e81f35e8f34f20726930829c0a81774
SHA512517cb8531fe630c2f227be266f81744906f09a9fb1de70b1a6c6a6e8d971d6ce799fd029a6d4112f59ecb91b92fdd8883328983b57bff3f58dc479b793613bb3
-
Filesize
325KB
MD56a1c6adb8d1a4716f32e9f069c4690ab
SHA112090cec8cb6711c2f89a6a11a6864c539ac37ac
SHA256c6a3006ed372b0b5f033643c8a4d09a05e81f35e8f34f20726930829c0a81774
SHA512517cb8531fe630c2f227be266f81744906f09a9fb1de70b1a6c6a6e8d971d6ce799fd029a6d4112f59ecb91b92fdd8883328983b57bff3f58dc479b793613bb3
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c