Analysis

  • max time kernel
    13s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 16:03

General

  • Target

    SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi

  • Size

    1.4MB

  • MD5

    e699ed1bdb5dd7ceef3937390ef6fb43

  • SHA1

    382f985fbb6ae0e393ca3621049ea503d8032c24

  • SHA256

    925974d5a370ad4840b444a7709c2640f8ff3113c6cafbc113e8559fdfcf26e7

  • SHA512

    833c671908bb45a7d86a1434c88ee8e36068c7eef63cfac3f4114bae8f9422da5db86a28ffe7a9eeb5a5e3843cf6472c87793b115bcf083d4684c16b7648c58b

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 90 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D7501CC586CD0F348BB86F3B66D923B8 C
      2⤵
      • Loads dropped DLL
      PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI2030.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • C:\Users\Admin\AppData\Local\Temp\MSI2522.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • \Users\Admin\AppData\Local\Temp\MSI2030.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • \Users\Admin\AppData\Local\Temp\MSI2522.tmp

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • memory/3192-6-0x0000000000000000-mapping.dmp