Analysis
-
max time kernel
441s -
max time network
447s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2023 15:37
Static task
static1
Behavioral task
behavioral1
Sample
AlteryxPatchInstall_2023.1.1.1.200.exe
Resource
win10v2004-20230703-en
General
-
Target
AlteryxPatchInstall_2023.1.1.1.200.exe
-
Size
52.1MB
-
MD5
6150916d6bb4f8394f24fab305c65223
-
SHA1
bd7482cf1c0f3030583de3f429e287a8673bb4a7
-
SHA256
e0af09fd610b941a27fdaf3d08eb6ba185e7ee211cf4d2b435f96671bd2799d1
-
SHA512
41cef2ccc1cd238f2eb40fa71f845ab04acbe282cb03240745dac011fa7859acda43efe0dee93afbd6dbc2684da3cd2c8dee02261ecb188acc98a190ebd2144d
-
SSDEEP
786432:G2pyY34Mr8qJFLVLKGDg9j99HbHfUGIJ8HMwtM7syKsisogAQdgonkL7e+ioIIiu:G/MwqtLjoDZCWs7o3QdgonkL7O7u
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4684 AlteryxPatchInstall_2023.1.1.1.200.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 AlteryxPatchInstall_2023.1.1.1.200.exe 4684 AlteryxPatchInstall_2023.1.1.1.200.exe 4684 AlteryxPatchInstall_2023.1.1.1.200.exe 4684 AlteryxPatchInstall_2023.1.1.1.200.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4684 wrote to memory of 5032 4684 AlteryxPatchInstall_2023.1.1.1.200.exe 81 PID 4684 wrote to memory of 5032 4684 AlteryxPatchInstall_2023.1.1.1.200.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\AlteryxPatchInstall_2023.1.1.1.200.exe"C:\Users\Admin\AppData\Local\Temp\AlteryxPatchInstall_2023.1.1.1.200.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /p C:\Users\Admin\AppData\Local\Temp\AlteryxInstallation_722\AlteryxPatch.msp /norestart INSTALLED_PATCH="0" SEVENZIP_PATH="C:\Users\Admin\AppData\Local\Temp\AlteryxInstallation_722\7za.exe" UNINSTALL_EXE_PATH="C:\Users\Admin\AppData\Local\Temp\AlteryxInstallation_722\UninstallAYX.exe"2⤵PID:5032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
866KB
MD5ad2b9dfd8742ea03dfb3b6bb8650a593
SHA1a5bc50581f57e1681e8943b923d1e00834a06aed
SHA256268e0411dc3adb8bf78c148c4923e29ecb5d165024de62eb75faa285a3759833
SHA512cb390aa71b44caa6cdb7aa23d9bc5753168c6c6c0c227eed73c8778c72ea68e5cec0bc62e7d5fecbc42e15c565a08885a9776c37451224536d310630b0361dca
-
Filesize
49.4MB
MD5c2dec528c6dc6e66598d94f20dbf8b36
SHA131998f3531de83ea5ead79f49c7f250366abf1fb
SHA2567e078092cba43cebad89ab4adcc0c45e926f39c55f5b10a021ef92d080f1f63d
SHA512cc4ec36e3813d60f289330958fda5c9e2dcffdfc689092660317ac68e6eb6fddf6df11e451e26d673a85c3c193f87036c007e14436ecb719de6cbceb843d6be8