Analysis
-
max time kernel
56s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe
Resource
win10v2004-20220812-en
General
-
Target
c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe
-
Size
108KB
-
MD5
c278be9b8b7f3f0548076071673e5a60
-
SHA1
e3ad15ca43a4500469d4bc995ef858e3582e0ade
-
SHA256
c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d
-
SHA512
b119c911388907d682ac746572fade14412728cdb9422c3024f071057aea038f1cec3c50fccd9fc6aaf4cba2e8049e9adc8194bed7b8677ab8d646e991c01783
-
SSDEEP
1536:9Q/9Y0AgK+lptFpui7jcnMGbe7AG+Xh2FeE710:6/9Y9YptKi7jATK7AG+xee
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\92518788 = "C:\\PROGRA~3\\msqis.exe" msiexec.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1368 msiexec.exe 3 1368 msiexec.exe 4 1368 msiexec.exe 5 1368 msiexec.exe 6 1368 msiexec.exe -
Disables taskbar notifications via registry modification
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~3\msqis.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 1368 msiexec.exe 1368 msiexec.exe -
Suspicious behavior: MapViewOfSection 26 IoCs
pid Process 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe 1368 msiexec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1368 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe Token: SeBackupPrivilege 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe Token: SeRestorePrivilege 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe Token: SeDebugPrivilege 1368 msiexec.exe Token: SeBackupPrivilege 1368 msiexec.exe Token: SeRestorePrivilege 1368 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 2020 wrote to memory of 1712 2020 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 28 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29 PID 1712 wrote to memory of 1368 1712 c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe"C:\Users\Admin\AppData\Local\Temp\c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe"C:\Users\Admin\AppData\Local\Temp\c71ee156114ec98a6366c0941072e6d39e3e9a2d0950f342a6c8a98f5bf8ed1d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-