Analysis

  • max time kernel
    168s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    03/01/2024, 20:52

General

  • Target

    Stand.Launchpad.exe

  • Size

    72KB

  • MD5

    9b86bb89406cdc59a1eb586d51d659bd

  • SHA1

    3c4d6fdd1ec4e41ff303042cc0f00dbc8f7004e6

  • SHA256

    20807c02a31d8abd663beddcede18c65e89077a7661ad2e1552ff61aecc5efe2

  • SHA512

    892681337ad5d133470b23263aa557fe8f32d9c40f77a0bb574e5a47c935c806de0105b41ed2a8026392a4c70f44419b1ad3d3782803ccf8ee1169df8b81b5a5

  • SSDEEP

    768:DOPg2CdwbmyCLIizV9iKfyyu8fo0Zrgk64eeeDoc5tul5scYhb:C42FKfLfVo0Zrg8VwSl5scmb

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe
    "C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1152
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-0-0x0000026ED6170000-0x0000026ED6184000-memory.dmp

    Filesize

    80KB

  • memory/1152-1-0x00007FFEDFD20000-0x00007FFEE07E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1152-2-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/1152-3-0x00007FFEDFD20000-0x00007FFEE07E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1152-4-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/1152-7-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/1152-8-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/1152-11-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/1152-12-0x0000026ED6650000-0x0000026ED6660000-memory.dmp

    Filesize

    64KB

  • memory/3440-13-0x00000285A1B00000-0x00000285A1B01000-memory.dmp

    Filesize

    4KB

  • memory/3440-14-0x00000285A1B00000-0x00000285A1B01000-memory.dmp

    Filesize

    4KB

  • memory/3440-15-0x00000285A1B00000-0x00000285A1B01000-memory.dmp

    Filesize

    4KB