Overview
overview
7Static
static
3ChangeIt21...iA.exe
windows7-x64
7ChangeIt21...iA.exe
windows10-2004-x64
7ChangeIt21...iW.exe
windows7-x64
7ChangeIt21...iW.exe
windows10-2004-x64
7ChangeIt211/Setup.exe
windows7-x64
6ChangeIt211/Setup.exe
windows10-2004-x64
6ChangeIt211/Setup.msi
windows7-x64
6ChangeIt211/Setup.msi
windows10-2004-x64
6Analysis
-
max time kernel
126s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 14:20
Static task
static1
Behavioral task
behavioral1
Sample
ChangeIt211/InstMsiA.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ChangeIt211/InstMsiA.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
ChangeIt211/InstMsiW.exe
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
ChangeIt211/InstMsiW.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
ChangeIt211/Setup.exe
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
ChangeIt211/Setup.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral7
Sample
ChangeIt211/Setup.msi
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
ChangeIt211/Setup.msi
Resource
win10v2004-20231023-en
General
-
Target
ChangeIt211/InstMsiA.exe
-
Size
1.6MB
-
MD5
cd91a545478263b4e6902e7d5932077d
-
SHA1
7fbedfe34eec29469ef14d7cc2ef3554f69798e5
-
SHA256
5ab8b82f578f09dbccf797754155e531b5996b532c1f19c531596ec07cc4b46d
-
SHA512
2ad130fcb66d23c0059f4eee33de43b2b2cb2677b8ea3c62690b44398a66405518a21fb37f05c85a4f8de5c79ca0c70e48747b289e17b88ebc77f853a5d47e6a
-
SSDEEP
49152:WH/TMKsbxmkfhZ8t5/s2vNObkdmuqKx3+:K/TMKsbxm+Ut5/3v+z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3408 msiinst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" InstMsiA.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3408 1520 InstMsiA.exe 87 PID 1520 wrote to memory of 3408 1520 InstMsiA.exe 87 PID 1520 wrote to memory of 3408 1520 InstMsiA.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChangeIt211\InstMsiA.exe"C:\Users\Admin\AppData\Local\Temp\ChangeIt211\InstMsiA.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exe /i instmsi.msi MSIEXECREG=1 /m /qb+!2⤵
- Executes dropped EXE
PID:3408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD547eb6c6eaaae1544a50339a51a8ae481
SHA17df0beb8f719174419d9421497f203d63290f8d6
SHA2563c97927b8bf0bb1a54271d6f117e0e12b673122284b2e382d55237a3487960b2
SHA512a675f471a8404830b114cec2f0605ef18dca203b74e2d5a26f3f3a9b0055ff3daad45e04ac11fc794e6df90b9ce700cf39f85e2f2193af1d13bde776d3157fcc
-
Filesize
36KB
MD547eb6c6eaaae1544a50339a51a8ae481
SHA17df0beb8f719174419d9421497f203d63290f8d6
SHA2563c97927b8bf0bb1a54271d6f117e0e12b673122284b2e382d55237a3487960b2
SHA512a675f471a8404830b114cec2f0605ef18dca203b74e2d5a26f3f3a9b0055ff3daad45e04ac11fc794e6df90b9ce700cf39f85e2f2193af1d13bde776d3157fcc