Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    16-09-2021 08:39

General

  • Target

    Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\Temp\{9330B33E-C4F4-4EB7-BE46-A38BBABB97B4}\.cr\MSIB4D.tmp
        "C:\Windows\Temp\{9330B33E-C4F4-4EB7-BE46-A38BBABB97B4}\.cr\MSIB4D.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp" -burn.filehandle.attached=180 -burn.filehandle.self=188
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:740
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 248C6E470E52325EC753F515D0A4DF24 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:280
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssD9B.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiD88.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrD89.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrD8A.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        PID:1536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86221C29895F63FC0F56F1DD5CEDA8C1 C
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/740-86-0x0000000002F43000-0x0000000002F44000-memory.dmp

    Filesize

    4KB

  • memory/740-96-0x0000000002F44000-0x0000000002F45000-memory.dmp

    Filesize

    4KB

  • memory/740-85-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

    Filesize

    4KB

  • memory/740-77-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/740-91-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

    Filesize

    4KB

  • memory/740-74-0x0000000002F41000-0x0000000002F42000-memory.dmp

    Filesize

    4KB

  • memory/740-81-0x0000000005520000-0x0000000005521000-memory.dmp

    Filesize

    4KB

  • memory/740-72-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/740-97-0x0000000002F49000-0x0000000002F5A000-memory.dmp

    Filesize

    68KB

  • memory/1168-57-0x0000000075231000-0x0000000075233000-memory.dmp

    Filesize

    8KB

  • memory/1536-73-0x0000000002242000-0x0000000002244000-memory.dmp

    Filesize

    8KB

  • memory/1536-71-0x0000000002241000-0x0000000002242000-memory.dmp

    Filesize

    4KB

  • memory/1536-70-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB

  • memory/1664-52-0x000007FEFB591000-0x000007FEFB593000-memory.dmp

    Filesize

    8KB