Analysis
-
max time kernel
48s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
Stand.Launchpad (2).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Stand.Launchpad (2).exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
Stand.Launchpad (2).exe
-
Size
74KB
-
MD5
807c001be05d0e835337cc366aaba56d
-
SHA1
fcc4fae0461da8f17f8ee274e338bcee97762c4c
-
SHA256
265d3e48e4a72afdaca712aa3bdee4a6a8676e4080fba1a0920546a14a6100be
-
SHA512
d867e1624962e6598c2f63f5968713e9dc0a9092867d38e8dc20f469fd6f5bc44196eb287fe0af672ca4c45d217b6b250abf63c493bd690067bb5ca76fc74aab
-
SSDEEP
768:7/IPeZXaHQBFiFKMXjMlvhmndydfvdZIgiRVe7eFcc5tul5scYhb:MPtYahMBhmnYdZIgCQyOl5scmb
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe 2164 Stand.Launchpad (2).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2164 Stand.Launchpad (2).exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 Stand.Launchpad (2).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (2).exe"C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (2).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2164
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2560
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:752
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Calamity,_Inc\Stand.Launchpad_(2).exe_Url_h03hxqox2ajtcloehp1mzbinp1w4vir3\1.9.1.0\user.config
Filesize946B
MD5b4ae24f20e59e454d57443d663a7581e
SHA168ab33e7fcea8bf79d76728fc49338d0d10a12f6
SHA2568409dd0aa292b3bf50903a7ca1a1a0d6697d5c7b0ed3d1c5e43ebdf6f82db074
SHA51225a7cbc382609d298ecaedea567231ac6ba0856bc523550912fd7b8393a29664ad68e9490dff0ff25b18b7a018476798c4df1000ebc99174bb6f2d5604e383f5
-
C:\Users\Admin\AppData\Local\Calamity,_Inc\Stand.Launchpad_(2).exe_Url_h03hxqox2ajtcloehp1mzbinp1w4vir3\1.9.1.0\user.config
Filesize1KB
MD54914bef93f236a5cb24b4c07e9d4a98a
SHA1b53f8fb945a449dd8a76d4412c5439b29b929b9e
SHA2560abb6c072277956c8e3d6810dc9d9795544098f46a1fc79ab2e39c3f70d84a5a
SHA5123242dbf1f58263ab1409d558b5ba1846e235da17246f1abbab768ec1ed449367e30c6d17d4986aa117c42ea225e87ff2c438d46765f1b5841e3a5b9b571ccb10