Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 01:04
Static task
static1
Behavioral task
behavioral1
Sample
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe
Resource
win10v2004-20220901-en
General
-
Target
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe
-
Size
176KB
-
MD5
018c93e6b6d1c1d96800a543e269af01
-
SHA1
c9ef453f9af3e2fc8c5bb1f81d524ea5eae337c6
-
SHA256
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b
-
SHA512
34423fa4d97cda30b3a80e02085ef9036baf7b679e6e94e54d6dcff9b140be36f15bc433285a5c73e8538a76174aac8b2342ae0b4eb14d7d0f915f7c9101ae22
-
SSDEEP
1536:8haN2fh0+TTQInoWGJcJJleqt1+Wgx3lFnHmleHSWgLAyXnnLm+AnqqLDTa26:2++TFnoWTTYBB1hHgN1Anq86
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\16409 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccofomsx.exe" msiexec.exe -
Blocklisted process makes network request 37 IoCs
Processes:
msiexec.exeflow pid process 2 940 msiexec.exe 3 940 msiexec.exe 4 940 msiexec.exe 5 940 msiexec.exe 6 940 msiexec.exe 7 940 msiexec.exe 8 940 msiexec.exe 9 940 msiexec.exe 10 940 msiexec.exe 11 940 msiexec.exe 12 940 msiexec.exe 13 940 msiexec.exe 14 940 msiexec.exe 16 940 msiexec.exe 17 940 msiexec.exe 18 940 msiexec.exe 19 940 msiexec.exe 20 940 msiexec.exe 21 940 msiexec.exe 22 940 msiexec.exe 23 940 msiexec.exe 24 940 msiexec.exe 25 940 msiexec.exe 26 940 msiexec.exe 27 940 msiexec.exe 28 940 msiexec.exe 29 940 msiexec.exe 30 940 msiexec.exe 31 940 msiexec.exe 32 940 msiexec.exe 33 940 msiexec.exe 34 940 msiexec.exe 35 940 msiexec.exe 36 940 msiexec.exe 37 940 msiexec.exe 38 940 msiexec.exe 39 940 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exedescription pid process target process PID 944 set thread context of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File created C:\PROGRA~3\LOCALS~1\Temp\ccofomsx.exe msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exepid process 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exeed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exedescription pid process target process PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 944 wrote to memory of 1876 944 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe PID 1876 wrote to memory of 940 1876 ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe"C:\Users\Admin\AppData\Local\Temp\ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe"C:\Users\Admin\AppData\Local\Temp\ed8699ecdab7a4a0b2d862400433f431dc5085065971fd60297ce7b509af932b.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\syswow64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:940