Analysis

  • max time kernel
    12s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    24-12-2020 13:59

General

  • Target

    SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi

  • Size

    1.4MB

  • MD5

    51eeaf033e56b912d13f740622ac569e

  • SHA1

    ed8e79309b8f6f23a4be78887dc9d152a920db3f

  • SHA256

    bd5f45a2f5041f25bbbe91246c7c17acbd0cdd07dfed47df892240c59a04dd28

  • SHA512

    19b37cb4f59d6b4d5d26ea5a44b4e9344acb1f5275d7cc953a64605f29414e429fcc77cd9088e132c3c61a68e3082567d2321db873e664434cb9571ba8c52b57

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 90 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:644
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9FBADE7102F12E7F7839C03DE0A0483F C
      2⤵
      • Loads dropped DLL
      PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads