Analysis
-
max time kernel
118s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe
Resource
win10v2004-20220812-en
General
-
Target
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe
-
Size
80KB
-
MD5
559f24e1fa902e1f9ba079283d6f9570
-
SHA1
2bf197bb3fe0c1ae7aec5d607841df581a921ea4
-
SHA256
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f
-
SHA512
1a55a7350eea43506c6660b982397071021fb962262ecc37fe6d8e63303fa7e6b99420ea642a53b1401abd24edf1184208b8630c0d72c3e4ace9f8d734ee62de
-
SSDEEP
1536:BxR5bM9oLiCMsJozgKWNJ4NJxPMg2o1Ej7D:BP5bphozgKWNJ4NJxPR1A7D
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\42588 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccojkhe.com" msiexec.exe -
Blocklisted process makes network request 25 IoCs
flow pid Process 27 4964 msiexec.exe 28 4964 msiexec.exe 29 4964 msiexec.exe 38 4964 msiexec.exe 39 4964 msiexec.exe 40 4964 msiexec.exe 41 4964 msiexec.exe 49 4964 msiexec.exe 50 4964 msiexec.exe 59 4964 msiexec.exe 60 4964 msiexec.exe 61 4964 msiexec.exe 62 4964 msiexec.exe 63 4964 msiexec.exe 64 4964 msiexec.exe 65 4964 msiexec.exe 66 4964 msiexec.exe 67 4964 msiexec.exe 68 4964 msiexec.exe 69 4964 msiexec.exe 70 4964 msiexec.exe 71 4964 msiexec.exe 72 4964 msiexec.exe 73 4964 msiexec.exe 74 4964 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3212 set thread context of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccojkhe.com msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 3212 wrote to memory of 2212 3212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 82 PID 2212 wrote to memory of 4964 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 83 PID 2212 wrote to memory of 4964 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 83 PID 2212 wrote to memory of 4964 2212 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe"C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe"C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f.exe
Filesize80KB
MD5559f24e1fa902e1f9ba079283d6f9570
SHA12bf197bb3fe0c1ae7aec5d607841df581a921ea4
SHA256dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f
SHA5121a55a7350eea43506c6660b982397071021fb962262ecc37fe6d8e63303fa7e6b99420ea642a53b1401abd24edf1184208b8630c0d72c3e4ace9f8d734ee62de