Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 23:50
Static task
static1
Behavioral task
behavioral1
Sample
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe
Resource
win10v2004-20221111-en
General
-
Target
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe
-
Size
71KB
-
MD5
d6f1148158f46d5d845d0fd4b77ab44b
-
SHA1
51eb682f1b0b186ac86329cf65e3c70cee195178
-
SHA256
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8
-
SHA512
38f02436a46fbaa0970871c169051ea50dc9d3349cf025ecb6d2938ce83b61610d3d1aaf58c45d08468f9400c4dddb3587c8f103b08693596ff7b4acfccc9914
-
SSDEEP
768:eme0+LDFxI0xlMBBXwZmdWlBUUoArbMwCdJooWYAT1rak8aIHUm+MlXKCbF9+ljK:+0sIyOkllfoAPN+eoouq8HwjK
Malware Config
Signatures
-
Processes:
msiexec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\54001 = "c:\\progra~3\\msiawtua.exe" msiexec.exe -
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid process 68 5052 msiexec.exe -
Disables taskbar notifications via registry modification
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exedescription pid process target process PID 1136 set thread context of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File created \??\c:\progra~3\msiawtua.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exemsiexec.exepid process 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exemsiexec.exepid process 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe 5052 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
msiexec.exedescription pid process Token: SeDebugPrivilege 5052 msiexec.exe Token: SeBackupPrivilege 5052 msiexec.exe Token: SeRestorePrivilege 5052 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exepid process 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exemsiexec.exedescription pid process target process PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1136 wrote to memory of 1788 1136 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe PID 1788 wrote to memory of 5052 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe msiexec.exe PID 1788 wrote to memory of 5052 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe msiexec.exe PID 1788 wrote to memory of 5052 1788 72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe msiexec.exe PID 5052 wrote to memory of 3856 5052 msiexec.exe msiexec.exe PID 5052 wrote to memory of 3856 5052 msiexec.exe msiexec.exe PID 5052 wrote to memory of 3856 5052 msiexec.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe"C:\Users\Admin\AppData\Local\Temp\72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe"C:\Users\Admin\AppData\Local\Temp\72af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"4⤵PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5d6f1148158f46d5d845d0fd4b77ab44b
SHA151eb682f1b0b186ac86329cf65e3c70cee195178
SHA25672af8c1ffb7498fbea76c5f9704b798043a88875c460bfb43cc9085f841e7fd8
SHA51238f02436a46fbaa0970871c169051ea50dc9d3349cf025ecb6d2938ce83b61610d3d1aaf58c45d08468f9400c4dddb3587c8f103b08693596ff7b4acfccc9914