Analysis

  • max time kernel
    304s
  • max time network
    357s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22-10-2021 06:51

General

  • Target

    RandsomWare.msi

  • Size

    698KB

  • MD5

    eadca8bf5237297a07385d3a7ab386b2

  • SHA1

    688ab0e86912fa8c59755d8205e7a4decc2706d3

  • SHA256

    ae205185b912d2c4be5df9c4786b47e164db6e23fd9f51893e7e7c77f5ca4915

  • SHA512

    39d9c32edce729bb97bcef81a3510ab96f6003e13cc5e3a819208b431375dcdf610e49b929f045a6a26ae28a2ff5762ff67c19de5ab0ba8dbe00074c456d6021

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RandsomWare.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1912
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 59A4FD404EF06CF633AAA3510CA5F53D C
      2⤵
      • Loads dropped DLL
      PID:3360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSID41A.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • C:\Users\Admin\AppData\Local\Temp\MSIDC48.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • \Users\Admin\AppData\Local\Temp\MSID41A.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • \Users\Admin\AppData\Local\Temp\MSIDC48.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • memory/1912-115-0x0000020C14410000-0x0000020C14412000-memory.dmp

    Filesize

    8KB

  • memory/1912-116-0x0000020C14410000-0x0000020C14412000-memory.dmp

    Filesize

    8KB

  • memory/3360-119-0x0000000000000000-mapping.dmp

  • memory/3360-120-0x0000000002E70000-0x0000000002E71000-memory.dmp

    Filesize

    4KB

  • memory/3360-121-0x0000000002E70000-0x0000000002E71000-memory.dmp

    Filesize

    4KB

  • memory/3664-118-0x0000020360E10000-0x0000020360E12000-memory.dmp

    Filesize

    8KB

  • memory/3664-117-0x0000020360E10000-0x0000020360E12000-memory.dmp

    Filesize

    8KB