Analysis
-
max time kernel
238s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe
Resource
win10v2004-20221111-en
General
-
Target
9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe
-
Size
134KB
-
MD5
3396c7fa8cc3ba42928d19158813c920
-
SHA1
266823dc6c4f6bb42abf5b8a62f74fd894eff6ee
-
SHA256
9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9
-
SHA512
491d1f1a04e0b30b959059d8218d90de71f7b561238675d22a8581c0c95840a04cb3f393bbb140fbe9ca77641fc47d62d60052501efe5506a53c5b9bd57370a7
-
SSDEEP
1536:8haN2fh0+TTQInoWGJcJJleqt1+Wgx3lFnHmleHSWgLAyXnnLm+Anqa42aFeaAA:2++TFnoWTTYBB1hHgN1AnqmaFerA
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\32390 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccihue.exe" msiexec.exe -
Blocklisted process makes network request 37 IoCs
flow pid Process 3 752 msiexec.exe 4 752 msiexec.exe 5 752 msiexec.exe 6 752 msiexec.exe 7 752 msiexec.exe 8 752 msiexec.exe 9 752 msiexec.exe 10 752 msiexec.exe 11 752 msiexec.exe 12 752 msiexec.exe 13 752 msiexec.exe 14 752 msiexec.exe 15 752 msiexec.exe 16 752 msiexec.exe 17 752 msiexec.exe 18 752 msiexec.exe 19 752 msiexec.exe 20 752 msiexec.exe 21 752 msiexec.exe 22 752 msiexec.exe 23 752 msiexec.exe 24 752 msiexec.exe 25 752 msiexec.exe 26 752 msiexec.exe 27 752 msiexec.exe 28 752 msiexec.exe 29 752 msiexec.exe 30 752 msiexec.exe 31 752 msiexec.exe 32 752 msiexec.exe 33 752 msiexec.exe 34 752 msiexec.exe 35 752 msiexec.exe 36 752 msiexec.exe 37 752 msiexec.exe 38 752 msiexec.exe 39 752 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 836 set thread context of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccihue.exe msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 836 wrote to memory of 1632 836 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 28 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29 PID 1632 wrote to memory of 752 1632 9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe"C:\Users\Admin\AppData\Local\Temp\9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe"C:\Users\Admin\AppData\Local\Temp\9381fce6c0fa0513ce1a583d92e786a1e281152de95b9ec124db3f2216e798b9.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\syswow64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:752
-
-