Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe
Resource
win10v2004-20241007-en
General
-
Target
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe
-
Size
168KB
-
MD5
25aec122773f3a73c32ed71402fef96f
-
SHA1
c3773e2413975f4c4c98d91df9a690ef7390a1b2
-
SHA256
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f
-
SHA512
aaa06b4cad26ef1dd7e496559a61ec6420eaefa2afacd8e59bc65468f1eee1229e38f967d07800bcd589b23423539fb29758e84c938daaa0bd2e2e0cadf5a0e4
-
SSDEEP
1536:8haN2fh0+TTQInoWGJcJJleqt1+Wgx3lFnHmleHSWgLAyXnnLm+AnqO5EU:2++TFnoWTTYBB1hHgN1Anq6
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2780-0-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/2780-3-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral2/memory/4960-11-0x0000000001150000-0x0000000001155000-memory.dmp family_andromeda behavioral2/memory/4960-13-0x0000000001150000-0x0000000001155000-memory.dmp family_andromeda behavioral2/memory/4960-17-0x0000000001150000-0x0000000001155000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\52036 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccriuqobk.exe" msiexec.exe -
Blocklisted process makes network request 25 IoCs
Processes:
msiexec.exeflow pid Process 14 4960 msiexec.exe 15 4960 msiexec.exe 16 4960 msiexec.exe 19 4960 msiexec.exe 20 4960 msiexec.exe 21 4960 msiexec.exe 26 4960 msiexec.exe 27 4960 msiexec.exe 28 4960 msiexec.exe 29 4960 msiexec.exe 30 4960 msiexec.exe 31 4960 msiexec.exe 32 4960 msiexec.exe 54 4960 msiexec.exe 55 4960 msiexec.exe 56 4960 msiexec.exe 57 4960 msiexec.exe 58 4960 msiexec.exe 59 4960 msiexec.exe 60 4960 msiexec.exe 61 4960 msiexec.exe 62 4960 msiexec.exe 63 4960 msiexec.exe 64 4960 msiexec.exe 66 4960 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exedescription pid Process procid_target PID 5032 set thread context of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccriuqobk.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msiexec.exe5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exepid Process 2780 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 2780 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exedescription pid Process procid_target PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 5032 wrote to memory of 2780 5032 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 83 PID 2780 wrote to memory of 4960 2780 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 84 PID 2780 wrote to memory of 4960 2780 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 84 PID 2780 wrote to memory of 4960 2780 5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe"C:\Users\Admin\AppData\Local\Temp\5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe"C:\Users\Admin\AppData\Local\Temp\5d8d767674e0c750a7079db17d3fb54859b6c8095935d7176af8a7c11a77b84f.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4960
-
-