Edit tour
Windows
Analysis Report
cLm7ThwEvh.msi
Overview
General Information
Sample name: | cLm7ThwEvh.msirenamed because original name is a hash value |
Original sample name: | e04464a9c2236bdc798c112b4bfbe0d4265fe486154e3601d03e0e60cc1487ab.msi |
Analysis ID: | 1586709 |
MD5: | 838a6db8b723abe92342cb4d59bd47df |
SHA1: | 3db057a1d57ff0c543da7cfd6a88e298797f6f9a |
SHA256: | e04464a9c2236bdc798c112b4bfbe0d4265fe486154e3601d03e0e60cc1487ab |
Tags: | msiuser-crep1x |
Infos: | |
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Checks for available system drives (often done to infect USB drives)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- msiexec.exe (PID: 7556 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ cLm7ThwEvh .msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 7588 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - hv.exe (PID: 7688 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Caret\ hv.exe" MD5: 480F8CF600F5509595B8418C6534CAF2) - hv.exe (PID: 7716 cmdline:
C:\Users\u ser\AppDat a\Roaming\ HW_Wordpad _debug\hv. exe MD5: 480F8CF600F5509595B8418C6534CAF2) - cmd.exe (PID: 7752 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - BrowserSync.exe (PID: 4324 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Browser Sync.exe MD5: 967F4470627F823F4D7981E511C9824F) - msedge.exe (PID: 5164 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --profi le-directo ry="Defaul t" MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5744 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 76 --field -trial-han dle=2060,i ,406089008 1316358745 ,176595553 23180037,2 62144 /pre fetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- hv.exe (PID: 7304 cmdline:
"C:\Users\ user\AppDa ta\Roaming \HW_Wordpa d_debug\hv .exe" MD5: 480F8CF600F5509595B8418C6534CAF2) - cmd.exe (PID: 7324 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - BrowserSync.exe (PID: 6108 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Browser Sync.exe MD5: 967F4470627F823F4D7981E511C9824F)
- msedge.exe (PID: 7500 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --profi le-directo ry=Default --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8176 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=24 52 --field -trial-han dle=2072,i ,137757096 4253699964 1,80969993 3465034920 3,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 2936 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6492 --fie ld-trial-h andle=2072 ,i,1377570 9642536999 641,809699 9334650349 203,262144 /prefetch :8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7884 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6516 --field-t rial-handl e=2072,i,1 3775709642 536999641, 8096999334 650349203, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - identity_helper.exe (PID: 4916 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=6 952 --fiel d-trial-ha ndle=2072, i,13775709 6425369996 41,8096999 3346503492 03,262144 /prefetch: 8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416) - identity_helper.exe (PID: 6972 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=6 952 --fiel d-trial-ha ndle=2072, i,13775709 6425369996 41,8096999 3346503492 03,262144 /prefetch: 8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416) - msedge.exe (PID: 7972 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=679 2 --field- trial-hand le=2072,i, 1377570964 2536999641 ,809699933 4650349203 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 7144 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --no-st artup-wind ow --win-s ession-sta rt /prefet ch:5 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8024 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 36 --field -trial-han dle=2088,i ,119943685 5938965670 4,12979874 9050017272 18,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 7100 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --no-st artup-wind ow --win-s ession-sta rt /prefet ch:5 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5700 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 64 --field -trial-han dle=2072,i ,878834630 5401672890 ,749672152 6284428012 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-09T14:40:51.587697+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:40:52.781373+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:40:53.657224+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:11.972479+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49875 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:14.073334+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49887 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:30.446430+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49994 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:31.848159+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50002 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:32.715398+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50008 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:33.518705+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50012 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:34.735492+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50022 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:37.126827+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50031 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:38.392877+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50042 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:43.748534+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50078 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:45.891045+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50086 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:46.727342+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50093 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:47.697622+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50100 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:48.722574+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50107 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:50.292999+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50118 | 172.67.174.91 | 443 | TCP |
2025-01-09T14:41:51.469578+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50122 | 172.67.174.91 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Integrated Neural Analysis Model: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: |