Analysis
-
max time kernel
96s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:07
Static task
static1
Behavioral task
behavioral1
Sample
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe
Resource
win10v2004-20221111-en
General
-
Target
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe
-
Size
169KB
-
MD5
c9078f2549892fde6d8fca8c314f9684
-
SHA1
d2f210d3b19860b02acd6e478229627f5f30bb74
-
SHA256
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7
-
SHA512
616eb9d50870ffc9f936b787f4c07c96c07771bc3fb4d70046e5fde0cb1a09c52ea46e50360292a919553e921f45667f13130c6bc8a15632eea238822ee142eb
-
SSDEEP
3072:2XCiLk7ndEFIp8d94jVS1CzyymLS1uhDeQ73njJx96sKBoy+6FvktHHxyyVg3:24YI09oS1C+yykQriuxyV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe -
Processes:
msiexec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\4132698125 = "C:\\PROGRA~3\\mssdfn.exe" msiexec.exe -
Blocklisted process makes network request 18 IoCs
Processes:
msiexec.exeflow pid process 2 1812 msiexec.exe 3 1812 msiexec.exe 4 1812 msiexec.exe 6 1812 msiexec.exe 7 1812 msiexec.exe 8 1812 msiexec.exe 9 1812 msiexec.exe 11 1812 msiexec.exe 13 1812 msiexec.exe 15 1812 msiexec.exe 16 1812 msiexec.exe 17 1812 msiexec.exe 18 1812 msiexec.exe 19 1812 msiexec.exe 20 1812 msiexec.exe 21 1812 msiexec.exe 22 1812 msiexec.exe 23 1812 msiexec.exe -
Disables taskbar notifications via registry modification
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exedescription pid process target process PID 2036 set thread context of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\PROGRA~3\mssdfn.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exemsiexec.exepid process 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1812 msiexec.exe 1812 msiexec.exe -
Suspicious behavior: MapViewOfSection 25 IoCs
Processes:
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exemsiexec.exepid process 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe 1812 msiexec.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
msiexec.exepid process 1812 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe Token: SeBackupPrivilege 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe Token: SeRestorePrivilege 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe Token: SeDebugPrivilege 1812 msiexec.exe Token: SeBackupPrivilege 1812 msiexec.exe Token: SeRestorePrivilege 1812 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exedescription pid process target process PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2036 wrote to memory of 2032 2036 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe PID 2032 wrote to memory of 1812 2032 1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe"C:\Users\Admin\AppData\Local\Temp\1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe"C:\Users\Admin\AppData\Local\Temp\1d867553f99629158cb05454817c86435230eeec433dc98ad74db8ab850b8cd7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1812