Analysis

  • max time kernel
    110s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 16:03

General

  • Target

    SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi

  • Size

    1.4MB

  • MD5

    e699ed1bdb5dd7ceef3937390ef6fb43

  • SHA1

    382f985fbb6ae0e393ca3621049ea503d8032c24

  • SHA256

    925974d5a370ad4840b444a7709c2640f8ff3113c6cafbc113e8559fdfcf26e7

  • SHA512

    833c671908bb45a7d86a1434c88ee8e36068c7eef63cfac3f4114bae8f9422da5db86a28ffe7a9eeb5a5e3843cf6472c87793b115bcf083d4684c16b7648c58b

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 92 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:644
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56864333BB5138F8B2D9ADC0520EC8A4 C
      2⤵
      • Loads dropped DLL
      PID:1892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI1B9C.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • C:\Users\Admin\AppData\Local\Temp\MSI1D32.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • \Users\Admin\AppData\Local\Temp\MSI1B9C.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • \Users\Admin\AppData\Local\Temp\MSI1D32.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • memory/644-2-0x000007FEFBCD1000-0x000007FEFBCD3000-memory.dmp

    Filesize

    8KB

  • memory/644-3-0x0000000004150000-0x0000000004154000-memory.dmp

    Filesize

    16KB

  • memory/1892-5-0x0000000000000000-mapping.dmp

  • memory/1892-6-0x00000000765E1000-0x00000000765E3000-memory.dmp

    Filesize

    8KB