Analysis
-
max time kernel
168s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/01/2024, 20:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Stand.Launchpad.exe
Resource
win7-20231215-es
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Stand.Launchpad.exe
Resource
win10v2004-20231215-es
6 signatures
150 seconds
General
-
Target
Stand.Launchpad.exe
-
Size
72KB
-
MD5
9b86bb89406cdc59a1eb586d51d659bd
-
SHA1
3c4d6fdd1ec4e41ff303042cc0f00dbc8f7004e6
-
SHA256
20807c02a31d8abd663beddcede18c65e89077a7661ad2e1552ff61aecc5efe2
-
SHA512
892681337ad5d133470b23263aa557fe8f32d9c40f77a0bb574e5a47c935c806de0105b41ed2a8026392a4c70f44419b1ad3d3782803ccf8ee1169df8b81b5a5
-
SSDEEP
768:DOPg2CdwbmyCLIizV9iKfyyu8fo0Zrgk64eeeDoc5tul5scYhb:C42FKfLfVo0Zrg8VwSl5scmb
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 3440 taskmgr.exe 3440 taskmgr.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe 1152 Stand.Launchpad.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1152 Stand.Launchpad.exe Token: SeDebugPrivilege 3440 taskmgr.exe Token: SeSystemProfilePrivilege 3440 taskmgr.exe Token: SeCreateGlobalPrivilege 3440 taskmgr.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1152 Stand.Launchpad.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe 3440 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe"C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1152
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3440