Analysis
-
max time kernel
24s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 11:39
Behavioral task
behavioral1
Sample
MetaLauncher.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
MetaLauncher.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
MetaLauncher.exe
-
Size
423KB
-
MD5
e3ed7aedfe71b854293b83ab6c4b68d5
-
SHA1
54fcb616e0bc16487f6246cdd56b027ee02ad08a
-
SHA256
4bf3c7c185fc786e9a12774d172390f134cc820889d28bca5dd0184f88e87bc1
-
SHA512
2567645bf14c7347adb348543901a1294db074e9dcb646012997c82a02721e3546683d457f361137b3f39225da9c4a1cbb4a816b33faa56dd8763bab829cdfe5
-
SSDEEP
6144:XFWbAsho7gO/OOVceuDvUVGUT7OLb1mrQ3GAE1XvqkA4foihXh:oc/EQOOVcfv+GUTS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1368-1-0x0000000001090000-0x000000000110A000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\JavaWInfo.xml MetaLauncher.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 1368 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 MetaLauncher.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30 PID 1368 wrote to memory of 2804 1368 MetaLauncher.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\MetaLauncher.exe"C:\Users\Admin\AppData\Local\Temp\MetaLauncher.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 17722⤵
- Program crash
PID:2804
-