Analysis
-
max time kernel
164s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe
Resource
win10v2004-20220812-en
General
-
Target
812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe
-
Size
154KB
-
MD5
4f9c292680910b6771a89cb1cb77e680
-
SHA1
97df76ecc8593f7c62b92cb781f9236a45eb7d00
-
SHA256
812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f
-
SHA512
05475ab90aca31917963d748510ee09e499ac1f28af69265c10c298d5e36e7459bbe1717fffcde0678e5c35d36886e586a9e46b3208d0f78897efe2607259adf
-
SSDEEP
3072:mtWZqwoa9Xa1Idart19Z1pPxctR1jfvk/Y271ahwVlxXYEtzcS:mtxIqqde1pPxctR1jfvk/Y271ahwVlx/
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\22518 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccigkthma.exe" msiexec.exe -
Blocklisted process makes network request 33 IoCs
flow pid Process 6 736 msiexec.exe 7 736 msiexec.exe 8 736 msiexec.exe 9 736 msiexec.exe 10 736 msiexec.exe 12 736 msiexec.exe 13 736 msiexec.exe 15 736 msiexec.exe 17 736 msiexec.exe 20 736 msiexec.exe 21 736 msiexec.exe 24 736 msiexec.exe 25 736 msiexec.exe 45 736 msiexec.exe 46 736 msiexec.exe 47 736 msiexec.exe 48 736 msiexec.exe 55 736 msiexec.exe 56 736 msiexec.exe 59 736 msiexec.exe 60 736 msiexec.exe 61 736 msiexec.exe 62 736 msiexec.exe 63 736 msiexec.exe 64 736 msiexec.exe 65 736 msiexec.exe 66 736 msiexec.exe 67 736 msiexec.exe 68 736 msiexec.exe 69 736 msiexec.exe 70 736 msiexec.exe 71 736 msiexec.exe 72 736 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 968 set thread context of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccigkthma.exe msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5100 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 5100 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 968 wrote to memory of 5100 968 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 82 PID 5100 wrote to memory of 736 5100 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 83 PID 5100 wrote to memory of 736 5100 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 83 PID 5100 wrote to memory of 736 5100 812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:736
-
-