Overview
overview
10Static
static
3Launcher.dll
windows7-x64
1Launcher.dll
windows10-2004-x64
1Launcher.exe
windows7-x64
10Launcher.exe
windows10-2004-x64
10Launcher.exe.manifest
windows7-x64
3Launcher.exe.manifest
windows10-2004-x64
3data/appIn...er.dll
windows7-x64
1data/appIn...er.dll
windows10-2004-x64
1data/appIn...er.exe
windows7-x64
8data/appIn...er.exe
windows10-2004-x64
8data/appIn...AR.exe
windows7-x64
4data/appIn...AR.exe
windows10-2004-x64
4data/appIn...er.dll
windows7-x64
1data/appIn...er.dll
windows10-2004-x64
1data/appIn...er.exe
windows7-x64
8data/appIn...er.exe
windows10-2004-x64
8Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Launcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Launcher.exe.manifest
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Launcher.exe.manifest
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
data/appInfo/services/Launhcer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
data/appInfo/services/Launhcer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
data/appInfo/services/Launhcer.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
data/appInfo/services/Launhcer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
data/appInfo/services/WinRAR.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
data/appInfo/services/WinRAR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
data/appInfo/services/data/Launcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
data/appInfo/services/data/Launcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
data/appInfo/services/data/Launcher.exe
Resource
win7-20241010-en
General
-
Target
Launcher.exe.manifest
-
Size
1KB
-
MD5
1b6de83d3f1ccabf195a98a2972c366a
-
SHA1
09f03658306c4078b75fa648d763df9cddd62f23
-
SHA256
e20486518d09caf6778ed0d60aab51bb3c8b1a498fd4ede3c238ee1823676724
-
SHA512
e171a7f2431cfe0d3dfbd73e6ea0fc9bd3e5efefc1fbdeff517f74b9d78679913c4a60c57dde75e4a605c288bc2b87b9bb54b0532e67758dfb4a2ac8aea440ce
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2700 2492 cmd.exe 31 PID 2492 wrote to memory of 2700 2492 cmd.exe 31 PID 2492 wrote to memory of 2700 2492 cmd.exe 31 PID 2700 wrote to memory of 2824 2700 rundll32.exe 32 PID 2700 wrote to memory of 2824 2700 rundll32.exe 32 PID 2700 wrote to memory of 2824 2700 rundll32.exe 32 PID 2700 wrote to memory of 2824 2700 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Launcher.exe.manifest1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Launcher.exe.manifest2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Launcher.exe.manifest"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD595eb039720d9137c48c9fce01ce3e486
SHA11738c986e9a51369f65688d6611c339c37b8e8f5
SHA256b5b53ddbcaac366e7e271f9a60b52395030f1f7f2b98b8e70f0d47334385c5b9
SHA51206e3a2731e82a2e15c569c5e4422d38c3f9c63b627df1418fdcf2461848946d31fa8c9377306ba7e8c31de089b0cf9fa850be7c948a59fcf6910fb3a4308f70e