Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe
Resource
win10v2004-20241007-en
General
-
Target
e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe
-
Size
167KB
-
MD5
a36fe6b27a1b79508d7ca9944b9b96d8
-
SHA1
baa42fc263c4e11508ade8f486ac1281ae09053f
-
SHA256
e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6
-
SHA512
e6aaceb39b50c2e93924ed5a14aeea25ff47902dbed0e1b3cea5fba2baad1d87d355b2ee57c08ceb4ccf7468e79f8af1bdb5967bdfdc3dceb2e108700f728f59
-
SSDEEP
3072:FW+1oS4l5OeuQdrmwvL8EqlP0VCy1qLyGTC25prTPQX0Uv:Ffwl5IQdyfEOP0VCy1qLyGTC25prTPQf
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 5 IoCs
resource yara_rule behavioral2/memory/2188-0-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/2188-2-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/4768-10-0x0000000000FF0000-0x0000000000FF5000-memory.dmp family_andromeda behavioral2/memory/4768-12-0x0000000000FF0000-0x0000000000FF5000-memory.dmp family_andromeda behavioral2/memory/4768-16-0x0000000000FF0000-0x0000000000FF5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\19874 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccodneluo.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe -
Blocklisted process makes network request 37 IoCs
flow pid Process 15 4768 msiexec.exe 16 4768 msiexec.exe 17 4768 msiexec.exe 18 4768 msiexec.exe 19 4768 msiexec.exe 20 4768 msiexec.exe 21 4768 msiexec.exe 25 4768 msiexec.exe 26 4768 msiexec.exe 27 4768 msiexec.exe 28 4768 msiexec.exe 29 4768 msiexec.exe 30 4768 msiexec.exe 52 4768 msiexec.exe 53 4768 msiexec.exe 54 4768 msiexec.exe 55 4768 msiexec.exe 56 4768 msiexec.exe 57 4768 msiexec.exe 58 4768 msiexec.exe 59 4768 msiexec.exe 60 4768 msiexec.exe 61 4768 msiexec.exe 62 4768 msiexec.exe 63 4768 msiexec.exe 70 4768 msiexec.exe 71 4768 msiexec.exe 72 4768 msiexec.exe 73 4768 msiexec.exe 74 4768 msiexec.exe 75 4768 msiexec.exe 76 4768 msiexec.exe 77 4768 msiexec.exe 78 4768 msiexec.exe 79 4768 msiexec.exe 80 4768 msiexec.exe 81 4768 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3576 set thread context of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccodneluo.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2188 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 2188 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 3576 wrote to memory of 2188 3576 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 83 PID 2188 wrote to memory of 4768 2188 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 84 PID 2188 wrote to memory of 4768 2188 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 84 PID 2188 wrote to memory of 4768 2188 e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe"C:\Users\Admin\AppData\Local\Temp\e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe"C:\Users\Admin\AppData\Local\Temp\e4fc4bbdf9ae6adbc464f403e00aa22ec77704490bca0cf05bd2d27c270b30f6.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4768
-
-