Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
Stand.Launchpad (2).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Stand.Launchpad (2).exe
Resource
win10v2004-20240802-en
General
-
Target
Stand.Launchpad (2).exe
-
Size
74KB
-
MD5
807c001be05d0e835337cc366aaba56d
-
SHA1
fcc4fae0461da8f17f8ee274e338bcee97762c4c
-
SHA256
265d3e48e4a72afdaca712aa3bdee4a6a8676e4080fba1a0920546a14a6100be
-
SHA512
d867e1624962e6598c2f63f5968713e9dc0a9092867d38e8dc20f469fd6f5bc44196eb287fe0af672ca4c45d217b6b250abf63c493bd690067bb5ca76fc74aab
-
SSDEEP
768:7/IPeZXaHQBFiFKMXjMlvhmndydfvdZIgiRVe7eFcc5tul5scYhb:MPtYahMBhmnYdZIgCQyOl5scmb
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings Stand.Launchpad (2).exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe 5060 Stand.Launchpad (2).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5060 Stand.Launchpad (2).exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe 4388 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4388 wrote to memory of 5076 4388 OpenWith.exe 100 PID 4388 wrote to memory of 5076 4388 OpenWith.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (2).exe"C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (2).exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1984
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Stand\Bin\Stand 24.8.12.dll2⤵PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD56a1aff622cb52c24786873b8ad341e43
SHA1c1060e56aa295e75946e86c9d57e9a1cf9a256e3
SHA2565234243cc652c56761db1064692ba97a93024860e46423edbb7baf8ca699368d
SHA51276fdf5b9283bc20dcf9c0de4c3b9bc2ebd443e2cbac6b41780418420d3f81ee58f115f12d86de5b694bf702c1abb5fe5e6c4d32bbbeed893800eb5c1f533eb64