Analysis
-
max time kernel
37s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe
Resource
win7-20220812-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe
Resource
win10v2004-20220812-en
0 signatures
150 seconds
General
-
Target
f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe
-
Size
13KB
-
MD5
839d32c31039160a912fcfbb3def6850
-
SHA1
3f7a0f47f79056946e9931f3966d0f436fcfc6cf
-
SHA256
f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea
-
SHA512
40c3be7ab2c216343db60df40275780a39c1ef51cc109ac0949e422324ec7db9729003cd27766a4f695380e857952d2541e537259532760c4512ec33c6a3bec2
-
SSDEEP
384:8lw3tHjlsEgYwZqUrRE0e22AE6GmbMqiGAg:u6R9LwZle0n2ADbA
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\2577512575 = "C:\\PROGRA~3\\msfvsfzf.exe" msiexec.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 3 868 msiexec.exe 4 868 msiexec.exe 5 868 msiexec.exe 6 868 msiexec.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 868 msiexec.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~3\msfvsfzf.exe msiexec.exe File created C:\PROGRA~3\msfvsfzf.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 868 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe Token: SeBackupPrivilege 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe Token: SeRestorePrivilege 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe Token: SeDebugPrivilege 868 msiexec.exe Token: SeBackupPrivilege 868 msiexec.exe Token: SeRestorePrivilege 868 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28 PID 968 wrote to memory of 868 968 f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe"C:\Users\Admin\AppData\Local\Temp\f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe2⤵
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Deletes itself
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-