Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe
Resource
win10v2004-20220901-en
General
-
Target
e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe
-
Size
171KB
-
MD5
0ba28b1b953b10f94286b7d768db5860
-
SHA1
1e0b7059707ad59a89909fd04da616a5190275d1
-
SHA256
e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933
-
SHA512
4d738c11305bca75f37e31b1db51847eaa6d4633ab9012db9196644be8109f068d7c7ceffc0b813168268c78f8ca2b1c13e560bb108f2da8a1a3e9ed9bb531b3
-
SSDEEP
3072:FW+1oS4l5OeuQdrmwvL8EqegUUR3YqQB2zzzzzzzzwF3zdUW3lrSzzH:Ffwl5IQdyfEmRgG
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\45318 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccapxab.bat" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe -
Blocklisted process makes network request 37 IoCs
flow pid Process 12 4528 msiexec.exe 13 4528 msiexec.exe 14 4528 msiexec.exe 15 4528 msiexec.exe 16 4528 msiexec.exe 17 4528 msiexec.exe 24 4528 msiexec.exe 25 4528 msiexec.exe 26 4528 msiexec.exe 27 4528 msiexec.exe 28 4528 msiexec.exe 29 4528 msiexec.exe 30 4528 msiexec.exe 43 4528 msiexec.exe 44 4528 msiexec.exe 45 4528 msiexec.exe 46 4528 msiexec.exe 47 4528 msiexec.exe 48 4528 msiexec.exe 49 4528 msiexec.exe 50 4528 msiexec.exe 51 4528 msiexec.exe 52 4528 msiexec.exe 53 4528 msiexec.exe 54 4528 msiexec.exe 56 4528 msiexec.exe 57 4528 msiexec.exe 58 4528 msiexec.exe 59 4528 msiexec.exe 60 4528 msiexec.exe 61 4528 msiexec.exe 62 4528 msiexec.exe 63 4528 msiexec.exe 64 4528 msiexec.exe 65 4528 msiexec.exe 66 4528 msiexec.exe 67 4528 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccapxab.bat msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2288 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 2288 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 4376 wrote to memory of 2288 4376 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 83 PID 2288 wrote to memory of 4528 2288 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 84 PID 2288 wrote to memory of 4528 2288 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 84 PID 2288 wrote to memory of 4528 2288 e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe"C:\Users\Admin\AppData\Local\Temp\e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe"C:\Users\Admin\AppData\Local\Temp\e7fd2e67413ea03e1a6bff920f5366f71e804cf8d28f1f1b287c665d3abb6933.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:4528
-
-