Analysis
-
max time kernel
148s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:57
Behavioral task
behavioral1
Sample
msiexec_dump.exe
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
msiexec_dump.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
msiexec_dump.exe
-
Size
244KB
-
MD5
4daf1064001aa9bd948a4af5bb56beef
-
SHA1
77f70b592eeb9ddbf06613f2d5f1dc8eeaac4294
-
SHA256
fcd65bba6fcd68549c329ed6a4d07490d6ea7c928332e6066593c7fc274ea6ec
-
SHA512
f153027a1ec7ea0d1db97cc6fa6a94ecdb6bf6549cfa9138d5a4201190ad4895a718418c73a5e6ea799a23113e385a3a75149e85b930f4296ef309de3dcaca02
-
SSDEEP
6144:fvpRxSKdvhXDB9Cp1RAco1TpSMsOiWfKlKgRYN0e:pRxvd90Z6TpSMsWbNP
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 108 set thread context of 1364 108 msiexec_dump.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec_dump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe 108 msiexec_dump.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 108 msiexec_dump.exe 108 msiexec_dump.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 108 msiexec_dump.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 2028 108 msiexec_dump.exe 29 PID 108 wrote to memory of 2028 108 msiexec_dump.exe 29 PID 108 wrote to memory of 2028 108 msiexec_dump.exe 29 PID 108 wrote to memory of 2028 108 msiexec_dump.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\msiexec_dump.exe"C:\Users\Admin\AppData\Local\Temp\msiexec_dump.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Totoise\Downloads\H2_decrypt_patched.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-