MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c2d872fbf03c564452ffd898153a5a869a1210ab27212b8d4952ec11e158356. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 13 File information Comments

SHA256 hash: 9c2d872fbf03c564452ffd898153a5a869a1210ab27212b8d4952ec11e158356
SHA3-384 hash: 0b35da2113fdc178fb0478d2c9dff5b05207412f26edd11d73372ccdbf94254c1e6fc8f714b6ead827ec489922bddf58
SHA1 hash: 7b5b879be43bf7edc10d0c456f709cfc71963a7b
MD5 hash: 7a3334d31b484efd274f83591308ba00
humanhash: alpha-september-michigan-kentucky
File name:Launcher.exe
Download: download sample
File size:10'793'112 bytes
First seen:2023-11-29 11:01:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 196608:jrd7kWcZDTrPDRRgZkVzSCaUEHcXaYHYPtei4frKIBPMN:jrGnQkZaUEHcK2srgrKoMN
TLSH T11EB62301678AD6EEF34C1371D05418E43BB9CD2AD156E3AF494AA6B0EDD33681B091BF
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter vmovupd
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Launcher.exe
Verdict:
Malicious activity
Analysis date:
2023-11-29 11:03:19 UTC
Tags:
raccoonclipper

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching a process
Restart of the analyzed sample
Creating a file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Deleting a system file
Creating a window
Creating a service
Creating a file in the %AppData% subdirectories
Searching for synchronization primitives
Setting browser functions hooks
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Changing the hosts file
Unauthorized injection to a system process
Unauthorized injection to a browser process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Result
Threat name:
Clipboard Hijacker
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential dropper URLs found in powershell memory
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Clipboard Hijacker
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1349835 Sample: Launcher.exe Startdate: 29/11/2023 Architecture: WINDOWS Score: 100 86 Found malware configuration 2->86 88 Malicious sample detected (through community Yara rule) 2->88 90 Antivirus detection for URL or domain 2->90 92 7 other signatures 2->92 11 Launcher.exe 5 2->11         started        15 svchost.exe 2->15         started        process3 dnsIp4 80 C:\Users\user\AppData\Local\Temp\Hziik.exe, PE32 11->80 dropped 128 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->128 130 Modifies the context of a thread in another process (thread injection) 11->130 132 Adds extensions / path to Windows Defender exclusion list 11->132 134 2 other signatures 11->134 18 Hziik.exe 3 11->18         started        21 Launcher.exe 1 2 11->21         started        24 cmd.exe 1 11->24         started        84 127.0.0.1 unknown unknown 15->84 file5 signatures6 process7 file8 94 Multi AV Scanner detection for dropped file 18->94 96 Encrypted powershell cmdline option found 18->96 98 Injects a PE file into a foreign processes 18->98 26 Hziik.exe 3 18->26         started        72 C:\ProgramData\...\mvtwzbysisnm.exe, PE32+ 21->72 dropped 74 C:\Windows\System32\drivers\etc\hosts, ASCII 21->74 dropped 100 Modifies the context of a thread in another process (thread injection) 21->100 102 Modifies the hosts file 21->102 104 Adds a directory exclusion to Windows Defender 21->104 30 dialer.exe 21->30         started        32 cmd.exe 21->32         started        34 sc.exe 21->34         started        40 7 other processes 21->40 106 Adds extensions / path to Windows Defender exclusion list 24->106 36 powershell.exe 23 24->36         started        38 conhost.exe 24->38         started        signatures9 process10 file11 76 C:\Users\user\AppData\Local\Temp\L0gin.exe, PE32 26->76 dropped 78 C:\Users\user\AppData\Local\Temp\Kxfrx.exe, PE32 26->78 dropped 118 Encrypted powershell cmdline option found 26->118 42 Kxfrx.exe 26->42         started        45 L0gin.exe 2 26->45         started        47 powershell.exe 23 26->47         started        120 Injects code into the Windows Explorer (explorer.exe) 30->120 122 Writes to foreign memory regions 30->122 124 Allocates memory in foreign processes 30->124 126 2 other signatures 30->126 57 15 other processes 30->57 49 conhost.exe 32->49         started        51 wusa.exe 32->51         started        53 conhost.exe 34->53         started        55 conhost.exe 40->55         started        59 6 other processes 40->59 signatures12 process13 signatures14 108 Antivirus detection for dropped file 42->108 110 Multi AV Scanner detection for dropped file 42->110 112 Machine Learning detection for dropped file 42->112 116 4 other signatures 42->116 61 Kxfrx.exe 42->61         started        114 Potential dropper URLs found in powershell memory 47->114 64 conhost.exe 47->64         started        66 conhost.exe 53->66         started        process15 file16 82 C:\Users\user\AppData\...\fodhelper.exe, PE32 61->82 dropped 68 schtasks.exe 61->68         started        process17 process18 70 conhost.exe 68->70         started       
Threat name:
ByteCode-MSIL.Trojan.ZgRAT
Status:
Malicious
First seen:
2023-11-29 11:02:06 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
1
AV detection:
16 of 23 (69.57%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion persistence
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Creates new service(s)
Drops file in Drivers directory
Stops running service(s)
Unpacked files
SH256 hash:
9c2d872fbf03c564452ffd898153a5a869a1210ab27212b8d4952ec11e158356
MD5 hash:
7a3334d31b484efd274f83591308ba00
SHA1 hash:
7b5b879be43bf7edc10d0c456f709cfc71963a7b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:virustotal
Author:Tracel
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 9c2d872fbf03c564452ffd898153a5a869a1210ab27212b8d4952ec11e158356

(this sample)

  
Delivery method
Distributed via web download

Comments