Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 06:20
Behavioral task
behavioral1
Sample
Microsoft_Hardware_Launch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Microsoft_Hardware_Launch.exe
Resource
win10v2004-20241007-en
General
-
Target
Microsoft_Hardware_Launch.exe
-
Size
93KB
-
MD5
7e9aea4310d362cc62c7eef48b9bea7d
-
SHA1
0d0f4ba4460f30731da5f5b7a2df5538fc39509c
-
SHA256
7ebeecbc8be6ef0639cdfc58a6e7adb22786de3268efbc71a84e2407abf30c0e
-
SHA512
7e4a2f2076adebf213e2d86f5e8924924db0f609cabd4e55a4707a293410cad83dd93c3c82a4e93fa9d580454e9e20549c621dbc3b7733081874b99ff747b415
-
SSDEEP
1536:15ngg1XvKE3IrXX3BujEwzGi1dDXDGgS:15hXvKE3Irn3BXi1dHr
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2920 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft_Hardware_Launch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 Microsoft_Hardware_Launch.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe Token: 33 2664 Microsoft_Hardware_Launch.exe Token: SeIncBasePriorityPrivilege 2664 Microsoft_Hardware_Launch.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31 PID 2664 wrote to memory of 2920 2664 Microsoft_Hardware_Launch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Hardware_Launch.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_Hardware_Launch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Microsoft_Hardware_Launch.exe" "Microsoft_Hardware_Launch.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2920
-