Analysis
-
max time kernel
129s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe
Resource
win10v2004-20220901-en
General
-
Target
2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe
-
Size
307KB
-
MD5
1f1f1e5e3fe56fdcb44b1a0ae1b804c0
-
SHA1
f0f87438450c5160eb1f76f966314f551bf2b1d1
-
SHA256
2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799
-
SHA512
a1a2b4d022699d0a37e1f6260eab37634fef93b51fd0cce890f4c6a25b4ea96543d93c8dfed544974e1f5064164873f81ca44f2b5334cb871732a77bcdc971b3
-
SSDEEP
6144:DsV2ZRWvvfJ9Po5Lj28rnYytg5zhv/zuP4GDylJh:DsV2PWvvf7PiLj28oVDuPHqv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\132562678 = "C:\\ProgramData\\msumjorg.exe" msiexec.exe -
Blocklisted process makes network request 28 IoCs
flow pid Process 2 828 msiexec.exe 3 828 msiexec.exe 5 828 msiexec.exe 6 828 msiexec.exe 8 828 msiexec.exe 10 828 msiexec.exe 11 828 msiexec.exe 12 828 msiexec.exe 14 828 msiexec.exe 15 828 msiexec.exe 17 828 msiexec.exe 19 828 msiexec.exe 20 828 msiexec.exe 21 828 msiexec.exe 22 828 msiexec.exe 23 828 msiexec.exe 24 828 msiexec.exe 25 828 msiexec.exe 26 828 msiexec.exe 27 828 msiexec.exe 28 828 msiexec.exe 29 828 msiexec.exe 30 828 msiexec.exe 31 828 msiexec.exe 32 828 msiexec.exe 33 828 msiexec.exe 34 828 msiexec.exe 35 828 msiexec.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 828 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\software\microsoft\windows\currentversion\Run msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 828 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27 PID 1324 wrote to memory of 828 1324 2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe"C:\Users\Admin\AppData\Local\Temp\2277d45fc669a04e63eeb39df1bba467c9a7cea83af9c76436902ae487a8e799.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-