Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 18:46

General

  • Target

    launcher-1.09_16.exe

  • Size

    711KB

  • MD5

    7604d8a9b4c4b9ca9e25216f9b4ab99f

  • SHA1

    309e1722bfb7812e4d19d4e06db97a6ecd8cb30c

  • SHA256

    d1843a3d0326fd5e516bab8171e756ef417e6f740faf3003db8178516bc60b89

  • SHA512

    7e9d7fdab97ffe0f7fde949ea5d8355d0efc89b8769102e55425958491978a438c82cf944255be6f70103c7a2b0d4c115bb9b9e5f0dec95c0b4c84dcf4fbdc93

  • SSDEEP

    12288:Eh1gvaO9uz48+RTw4uI8w90bYKaLRmRcW83YQFXrLia73lnxHAedbcZzC:Eh1gvaQuk8cU4unwQaXW0YQ9rn3lnVd1

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe
    "C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe"
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3600
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

          Filesize

          46B

          MD5

          c9fe002e66876f05f22d6a197ca5beca

          SHA1

          7123c12d548c286a90ba6c431cc0a3e206d4d5cb

          SHA256

          5a4bc7f28b7581559a6caf47988ddb47235671f52aa10ddbd11e5f72b8f5fb5c

          SHA512

          5c19f8702b6cdfa5c022666e190b1e01d380e4a0a5e7bc3df97f5850b6501e45c35c4e0e6bd49390b917c3f9678a8ddaf1afe7e5fb036deedb7350eefa922f1f

        • memory/884-46-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-55-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-56-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-54-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-53-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-51-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-52-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-50-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-44-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/884-45-0x000002CF0E980000-0x000002CF0E981000-memory.dmp

          Filesize

          4KB

        • memory/1224-24-0x000001F3E38C0000-0x000001F3E38C1000-memory.dmp

          Filesize

          4KB

        • memory/1224-43-0x000001F3E51C0000-0x000001F3E61C0000-memory.dmp

          Filesize

          16.0MB

        • memory/1224-42-0x000001F3E5440000-0x000001F3E5450000-memory.dmp

          Filesize

          64KB

        • memory/1224-40-0x000001F3E51C0000-0x000001F3E61C0000-memory.dmp

          Filesize

          16.0MB

        • memory/1224-38-0x000001F3E38C0000-0x000001F3E38C1000-memory.dmp

          Filesize

          4KB

        • memory/1224-13-0x000001F3E38C0000-0x000001F3E38C1000-memory.dmp

          Filesize

          4KB

        • memory/1224-5-0x000001F3E51C0000-0x000001F3E61C0000-memory.dmp

          Filesize

          16.0MB

        • memory/5064-0-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB