Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16/09/2021, 08:39

General

  • Target

    Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi

Malware Config

Extracted

Family

jupyter

Version

SP-11

C2

http://37.120.237.251

Signatures

  • Jupyter Backdoor/Client Payload 1 IoCs
  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\MSI7DB2.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSI7DB2.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Windows\Temp\{6727432A-0540-4874-A12F-7D896F79E505}\.cr\MSI7DB2.tmp
        "C:\Windows\Temp\{6727432A-0540-4874-A12F-7D896F79E505}\.cr\MSI7DB2.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSI7DB2.tmp" -burn.filehandle.attached=524 -burn.filehandle.self=532
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:372
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6D51198FFA889AEE833D8ABABA39C830 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7E12.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi7DE0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr7DE1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr7DE2.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:64

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/64-160-0x0000000008530000-0x0000000008531000-memory.dmp

    Filesize

    4KB

  • memory/64-201-0x0000000004D23000-0x0000000004D24000-memory.dmp

    Filesize

    4KB

  • memory/64-138-0x0000000004D22000-0x0000000004D23000-memory.dmp

    Filesize

    4KB

  • memory/64-147-0x0000000007A90000-0x0000000007A91000-memory.dmp

    Filesize

    4KB

  • memory/64-3214-0x0000000009790000-0x000000000979A000-memory.dmp

    Filesize

    40KB

  • memory/64-135-0x0000000007380000-0x0000000007381000-memory.dmp

    Filesize

    4KB

  • memory/64-134-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

    Filesize

    4KB

  • memory/64-151-0x0000000007D10000-0x0000000007D11000-memory.dmp

    Filesize

    4KB

  • memory/64-152-0x0000000007B30000-0x0000000007B31000-memory.dmp

    Filesize

    4KB

  • memory/64-182-0x000000000A620000-0x000000000A621000-memory.dmp

    Filesize

    4KB

  • memory/64-156-0x0000000007E30000-0x0000000007E31000-memory.dmp

    Filesize

    4KB

  • memory/64-176-0x0000000009AA0000-0x0000000009AA1000-memory.dmp

    Filesize

    4KB

  • memory/64-157-0x0000000007CC0000-0x0000000007CC1000-memory.dmp

    Filesize

    4KB

  • memory/64-158-0x0000000008460000-0x0000000008461000-memory.dmp

    Filesize

    4KB

  • memory/64-137-0x0000000004D20000-0x0000000004D21000-memory.dmp

    Filesize

    4KB

  • memory/64-175-0x0000000009250000-0x0000000009251000-memory.dmp

    Filesize

    4KB

  • memory/64-174-0x00000000087C0000-0x00000000087C1000-memory.dmp

    Filesize

    4KB

  • memory/64-173-0x0000000009500000-0x0000000009501000-memory.dmp

    Filesize

    4KB

  • memory/372-153-0x0000000006960000-0x0000000006961000-memory.dmp

    Filesize

    4KB

  • memory/372-145-0x0000000006CE0000-0x0000000006CE1000-memory.dmp

    Filesize

    4KB

  • memory/372-166-0x0000000006967000-0x0000000006968000-memory.dmp

    Filesize

    4KB

  • memory/372-165-0x0000000006964000-0x0000000006965000-memory.dmp

    Filesize

    4KB

  • memory/372-170-0x00000000074A0000-0x00000000074A1000-memory.dmp

    Filesize

    4KB

  • memory/372-154-0x0000000006961000-0x0000000006962000-memory.dmp

    Filesize

    4KB

  • memory/372-163-0x0000000007300000-0x0000000007301000-memory.dmp

    Filesize

    4KB

  • memory/372-155-0x0000000006963000-0x0000000006964000-memory.dmp

    Filesize

    4KB

  • memory/372-177-0x0000000009F10000-0x0000000009F11000-memory.dmp

    Filesize

    4KB

  • memory/372-150-0x0000000006940000-0x0000000006941000-memory.dmp

    Filesize

    4KB

  • memory/372-141-0x0000000004600000-0x0000000004601000-memory.dmp

    Filesize

    4KB

  • memory/372-200-0x0000000006968000-0x0000000006969000-memory.dmp

    Filesize

    4KB