Analysis

  • max time kernel
    13s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 16:03

General

  • Target

    SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi

  • Size

    1.4MB

  • MD5

    e699ed1bdb5dd7ceef3937390ef6fb43

  • SHA1

    382f985fbb6ae0e393ca3621049ea503d8032c24

  • SHA256

    925974d5a370ad4840b444a7709c2640f8ff3113c6cafbc113e8559fdfcf26e7

  • SHA512

    833c671908bb45a7d86a1434c88ee8e36068c7eef63cfac3f4114bae8f9422da5db86a28ffe7a9eeb5a5e3843cf6472c87793b115bcf083d4684c16b7648c58b

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 90 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D7501CC586CD0F348BB86F3B66D923B8 C
      2⤵
      • Loads dropped DLL
      PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads