Analysis
-
max time kernel
152s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe
Resource
win10v2004-20220812-en
General
-
Target
b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe
-
Size
120KB
-
MD5
90fe3e38c50e3912c3126cb0c8aeebd0
-
SHA1
e6ee392d509cba21f1c84b4003ad4801a472cf68
-
SHA256
b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c
-
SHA512
ef663a7a4aeac490679f4c61ac37698ce477b94f9637d0c0fa246f9c92aebebe23d77d0e80f4b8340a2c3049c2689ae3a4f98d140ae8478c7ce5eb72dabd7cee
-
SSDEEP
1536:mvy50tV44aqwoa9ujdbNyVXa1lgNdaOCt1kTW/m:mtWZqwoa9Xa1Idart19O
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9468 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccsatmq.bat" msiexec.exe -
Blocklisted process makes network request 33 IoCs
flow pid Process 15 4708 msiexec.exe 16 4708 msiexec.exe 17 4708 msiexec.exe 18 4708 msiexec.exe 19 4708 msiexec.exe 20 4708 msiexec.exe 21 4708 msiexec.exe 22 4708 msiexec.exe 23 4708 msiexec.exe 25 4708 msiexec.exe 26 4708 msiexec.exe 33 4708 msiexec.exe 34 4708 msiexec.exe 54 4708 msiexec.exe 55 4708 msiexec.exe 58 4708 msiexec.exe 59 4708 msiexec.exe 62 4708 msiexec.exe 63 4708 msiexec.exe 64 4708 msiexec.exe 65 4708 msiexec.exe 66 4708 msiexec.exe 67 4708 msiexec.exe 72 4708 msiexec.exe 73 4708 msiexec.exe 74 4708 msiexec.exe 75 4708 msiexec.exe 76 4708 msiexec.exe 77 4708 msiexec.exe 78 4708 msiexec.exe 79 4708 msiexec.exe 80 4708 msiexec.exe 81 4708 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4508 set thread context of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccsatmq.bat msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4248 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 4248 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4508 wrote to memory of 4248 4508 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 81 PID 4248 wrote to memory of 4708 4248 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 82 PID 4248 wrote to memory of 4708 4248 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 82 PID 4248 wrote to memory of 4708 4248 b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe"C:\Users\Admin\AppData\Local\Temp\b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe"C:\Users\Admin\AppData\Local\Temp\b6e5edb2596e4868290bd5f92bc31a61865a9041ae639b6589e6050d7fee167c.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:4708
-
-