Analysis

  • max time kernel
    80s
  • max time network
    82s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/05/2024, 18:49

General

  • Target

    launcher.exe

  • Size

    4.9MB

  • MD5

    05bc8e2e0473d2bcb2d959d5ecde2d37

  • SHA1

    555f073467bbc064db4049d3ea6be5221d601d72

  • SHA256

    1e13949291b38b35ff7ae80f701ca50753e47472c3667470a82a5206ad6d9801

  • SHA512

    645297f215c4734acbb8d580f9be220cd42a8a7d9bcf3f08b149cbd1e4f867c06252f44915317052ee66599de7401def0f8477eae40973e680c247bc4293c88e

  • SSDEEP

    98304:YKRGpvYMi4MIMPgQesZCWV9yfmYGefQBZaLHNjj5YdRBuwo:YIiv9iqMPzyHGef0SB5Y1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\launcher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\onefile_4920_133598406072506834\launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\launcher.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1196
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1824
    • C:\Users\Admin\Desktop\launcher.exe
      "C:\Users\Admin\Desktop\launcher.exe"
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\onefile_1996_133598406408418652\launcher.exe
        "C:\Users\Admin\Desktop\launcher.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1940

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\psutil\_psutil_windows.pyd

            Filesize

            76KB

            MD5

            ebefbc98d468560b222f2d2d30ebb95c

            SHA1

            ee267e3a6e5bed1a15055451efcccac327d2bc43

            SHA256

            67c17558b635d6027ddbb781ea4e79fc0618bbec7485bd6d84b0ebcd9ef6a478

            SHA512

            ab9f949adfe9475b0ba8c37fa14b0705923f79c8a10b81446abc448ad38d5d55516f729b570d641926610c99df834223567c1efde166e6a0f805c9e2a35556e3

          • C:\Users\Admin\AppData\Local\Temp\onefile_4920_133598406072506834\launcher.exe

            Filesize

            8.5MB

            MD5

            ab80bb454abe2469ff40112393b05f4b

            SHA1

            82e2915d31265cca1505d15d3da6207ac4d5fb11

            SHA256

            ff6a6da4f79404766a32a5fb6a305b802ff32a5ad43ebb02b29632c52b23e360

            SHA512

            3fb888386e0903beb413fb453bc0345936bad52d6bdd00edb2fd8553623c37a685fe7e6992eb65edafe8b8d171855e7a6fbd00bd98583495d6b5e75bb325d893

          • C:\Users\Admin\AppData\Local\Temp\onefile_4920_133598406072506834\python3.dll

            Filesize

            64KB

            MD5

            34e49bb1dfddf6037f0001d9aefe7d61

            SHA1

            a25a39dca11cdc195c9ecd49e95657a3e4fe3215

            SHA256

            4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

            SHA512

            edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

          • C:\Users\Admin\AppData\Local\Temp\onefile_4920_133598406072506834\python311.dll

            Filesize

            5.5MB

            MD5

            9a24c8c35e4ac4b1597124c1dcbebe0f

            SHA1

            f59782a4923a30118b97e01a7f8db69b92d8382a

            SHA256

            a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

            SHA512

            9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

          • \Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

            Filesize

            120KB

            MD5

            6a9ca97c039d9bbb7abf40b53c851198

            SHA1

            01bcbd134a76ccd4f3badb5f4056abedcff60734

            SHA256

            e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535

            SHA512

            dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d

          • \Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

            Filesize

            76KB

            MD5

            8140bdc5803a4893509f0e39b67158ce

            SHA1

            653cc1c82ba6240b0186623724aec3287e9bc232

            SHA256

            39715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769

            SHA512

            d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826

          • \Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

            Filesize

            34KB

            MD5

            32d36d2b0719db2b739af803c5e1c2f5

            SHA1

            023c4f1159a2a05420f68daf939b9ac2b04ab082

            SHA256

            128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c

            SHA512

            a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1

          • \Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

            Filesize

            28KB

            MD5

            97ee623f1217a7b4b7de5769b7b665d6

            SHA1

            95b918f3f4c057fb9c878c8cc5e502c0bd9e54c0

            SHA256

            0046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790

            SHA512

            20edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f

          • \Users\Admin\AppData\Local\Temp\onefile_4920_133598406072506834\vcruntime140.dll

            Filesize

            96KB

            MD5

            f12681a472b9dd04a812e16096514974

            SHA1

            6fd102eb3e0b0e6eef08118d71f28702d1a9067c

            SHA256

            d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

            SHA512

            7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2