Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe
Resource
win10v2004-20240709-en
General
-
Target
120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe
-
Size
152KB
-
MD5
1009eec443d9e621a5b3dc3b5680a1d8
-
SHA1
51d0505457ad9a2d4acbc7c4385d72babd3b4806
-
SHA256
120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41
-
SHA512
f201dbdf9e6525d9ee0ecc2ee3416963518c0a853c7873052dd4d3e30baa895290ee0ce52e01cc91efaa1f5cd71e58cce5a287b490476ea0aa84efb45682e9dd
-
SSDEEP
3072:mtWZqwoa9Xa1Idart19RdWQnyuuHn6LH1al3:mtxIqqdtQnyucn6LMd
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\1165 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccxueuo.com" msiexec.exe -
Blocklisted process makes network request 36 IoCs
flow pid Process 25 4424 msiexec.exe 26 4424 msiexec.exe 27 4424 msiexec.exe 28 4424 msiexec.exe 29 4424 msiexec.exe 32 4424 msiexec.exe 33 4424 msiexec.exe 34 4424 msiexec.exe 35 4424 msiexec.exe 37 4424 msiexec.exe 38 4424 msiexec.exe 39 4424 msiexec.exe 47 4424 msiexec.exe 76 4424 msiexec.exe 77 4424 msiexec.exe 78 4424 msiexec.exe 79 4424 msiexec.exe 80 4424 msiexec.exe 81 4424 msiexec.exe 82 4424 msiexec.exe 83 4424 msiexec.exe 84 4424 msiexec.exe 85 4424 msiexec.exe 86 4424 msiexec.exe 106 4424 msiexec.exe 107 4424 msiexec.exe 108 4424 msiexec.exe 109 4424 msiexec.exe 110 4424 msiexec.exe 111 4424 msiexec.exe 112 4424 msiexec.exe 113 4424 msiexec.exe 114 4424 msiexec.exe 115 4424 msiexec.exe 116 4424 msiexec.exe 117 4424 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccxueuo.com msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3416 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 3416 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 2536 wrote to memory of 3416 2536 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 87 PID 3416 wrote to memory of 4424 3416 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 88 PID 3416 wrote to memory of 4424 3416 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 88 PID 3416 wrote to memory of 4424 3416 120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe"C:\Users\Admin\AppData\Local\Temp\120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe"C:\Users\Admin\AppData\Local\Temp\120c9389731ad3819715a1a268c3cb14db938483d99ee92e6dd16074b30a4d41.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4424
-
-