Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe
Resource
win10v2004-20220901-en
General
-
Target
082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe
-
Size
164KB
-
MD5
a30ad77348a53d2126bedb47df7a2de6
-
SHA1
e432d3460dde11734739cfcb9bc01f51990438b8
-
SHA256
082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04
-
SHA512
baabdb39b024bdb5a71ef943b1f361907cb236e94eb84a2249b145fb2733616cb34e4ffd722f61cb3153ae3ac3517644bbe999702fadbca2ff5a78a81da170e6
-
SSDEEP
1536:gkWbhgW5o1oS4l1TfG8Umu3/IdsGmPIxl8F4L0a8fcqyLz21Qak6afX3kco7b:FW+1oS4l5OeuQdrmwvL8EqF
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\1041 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\cctoveaii.pif" msiexec.exe -
Blocklisted process makes network request 37 IoCs
flow pid Process 2 1820 msiexec.exe 3 1820 msiexec.exe 4 1820 msiexec.exe 5 1820 msiexec.exe 6 1820 msiexec.exe 7 1820 msiexec.exe 8 1820 msiexec.exe 9 1820 msiexec.exe 10 1820 msiexec.exe 11 1820 msiexec.exe 12 1820 msiexec.exe 13 1820 msiexec.exe 14 1820 msiexec.exe 16 1820 msiexec.exe 17 1820 msiexec.exe 18 1820 msiexec.exe 19 1820 msiexec.exe 20 1820 msiexec.exe 21 1820 msiexec.exe 22 1820 msiexec.exe 23 1820 msiexec.exe 24 1820 msiexec.exe 25 1820 msiexec.exe 26 1820 msiexec.exe 27 1820 msiexec.exe 28 1820 msiexec.exe 29 1820 msiexec.exe 30 1820 msiexec.exe 31 1820 msiexec.exe 32 1820 msiexec.exe 33 1820 msiexec.exe 34 1820 msiexec.exe 35 1820 msiexec.exe 36 1820 msiexec.exe 37 1820 msiexec.exe 38 1820 msiexec.exe 39 1820 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1652 set thread context of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\cctoveaii.pif msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 1652 wrote to memory of 780 1652 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 28 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29 PID 780 wrote to memory of 1820 780 082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe"C:\Users\Admin\AppData\Local\Temp\082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe"C:\Users\Admin\AppData\Local\Temp\082edd051c8bd06c89ee92ff6447ea0723a31391b1eb1b2c8dcf95f0b33f8e04.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\syswow64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:1820
-
-