Analysis
-
max time kernel
112s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe
Resource
win10v2004-20241007-en
General
-
Target
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe
-
Size
80KB
-
MD5
559f24e1fa902e1f9ba079283d6f9570
-
SHA1
2bf197bb3fe0c1ae7aec5d607841df581a921ea4
-
SHA256
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f
-
SHA512
1a55a7350eea43506c6660b982397071021fb962262ecc37fe6d8e63303fa7e6b99420ea642a53b1401abd24edf1184208b8630c0d72c3e4ace9f8d734ee62de
-
SSDEEP
1536:BxR5bM9oLiCMsJozgKWNJ4NJxPMg2o1Ej7D:BP5bphozgKWNJ4NJxPR1A7D
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4824-0-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/4824-3-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/1176-11-0x00000000006E0000-0x00000000006E5000-memory.dmp family_andromeda behavioral2/memory/1176-13-0x00000000006E0000-0x00000000006E5000-memory.dmp family_andromeda behavioral2/memory/1176-17-0x00000000006E0000-0x00000000006E5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\22501 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccaegcaa.scr" msiexec.exe -
Executes dropped EXE 1 IoCs
Processes:
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exepid Process 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe -
Blocklisted process makes network request 25 IoCs
Processes:
msiexec.exeflow pid Process 15 1176 msiexec.exe 16 1176 msiexec.exe 17 1176 msiexec.exe 18 1176 msiexec.exe 19 1176 msiexec.exe 22 1176 msiexec.exe 23 1176 msiexec.exe 25 1176 msiexec.exe 26 1176 msiexec.exe 27 1176 msiexec.exe 28 1176 msiexec.exe 29 1176 msiexec.exe 30 1176 msiexec.exe 52 1176 msiexec.exe 53 1176 msiexec.exe 54 1176 msiexec.exe 55 1176 msiexec.exe 56 1176 msiexec.exe 57 1176 msiexec.exe 58 1176 msiexec.exe 59 1176 msiexec.exe 60 1176 msiexec.exe 61 1176 msiexec.exe 62 1176 msiexec.exe 63 1176 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exedescription pid Process procid_target PID 3076 set thread context of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccaegcaa.scr msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exedae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exepid Process 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exedae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exedescription pid Process procid_target PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 3076 wrote to memory of 4824 3076 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 83 PID 4824 wrote to memory of 1176 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 84 PID 4824 wrote to memory of 1176 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 84 PID 4824 wrote to memory of 1176 4824 dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe"C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe"C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242fN.exe
Filesize80KB
MD5559f24e1fa902e1f9ba079283d6f9570
SHA12bf197bb3fe0c1ae7aec5d607841df581a921ea4
SHA256dae854600603046efce5bc8e4d536a64cc80a8ee9ffa029d6d1b8a505e0c242f
SHA5121a55a7350eea43506c6660b982397071021fb962262ecc37fe6d8e63303fa7e6b99420ea642a53b1401abd24edf1184208b8630c0d72c3e4ace9f8d734ee62de