Analysis

  • max time kernel
    130s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 20:04

General

  • Target

    SecuriteInfo.com.Java.Ratty.2.7240.27857.msi

  • Size

    967KB

  • MD5

    baf22cec89fe346b6811157fa3c7ea94

  • SHA1

    8de2ff5457647978af1f67c8410c09a7b2877501

  • SHA256

    1e6a10285e26e0e09b0c7871069514e51b3ff5b70a3e1462dd4c4465ea92d05c

  • SHA512

    33c4131c52c0cce738de925cd551c5ce306d50ed2c3e169f54a7778461e749bd7134bbd3b9c1e88fc34f13ce06da45b0ff3f3dda826e45705b0706a10c9f09b2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Java.Ratty.2.7240.27857.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:364
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2E54CE6EB24DDEDF5F8C99C1F8D0A096
      2⤵
      • Loads dropped DLL
      PID:1992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/364-0-0x0000000005030000-0x0000000005034000-memory.dmp

    Filesize

    16KB

  • memory/364-1-0x0000000003F30000-0x0000000003F34000-memory.dmp

    Filesize

    16KB

  • memory/1500-7-0x0000000001240000-0x0000000001244000-memory.dmp

    Filesize

    16KB

  • memory/1500-8-0x0000000000260000-0x0000000000264000-memory.dmp

    Filesize

    16KB