Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22/11/2021, 07:55

General

  • Target

    ee408fa74fbfe568a05b0bbeff2e4339.msi

  • Size

    4.0MB

  • MD5

    ee408fa74fbfe568a05b0bbeff2e4339

  • SHA1

    0e8e7da9769102123a1bd8ad0d22e48338d20495

  • SHA256

    abe6b696965b8e856ccb20587f8a2fc8327169557e0083cebeab58e14a9d0560

  • SHA512

    290d475b870da3d3e436d67b6aed192e1f68be592ee2b9eb70b2731596c8ce13be7c0bfd0192d63b57d4d103cca4f5a6d781ccf8dba17234f73c247de21162ac

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Ousaban Banker Checkin M1

    suricata: ET MALWARE Ousaban Banker Checkin M1

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ee408fa74fbfe568a05b0bbeff2e4339.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2700
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F980178973369033E3CED268C2F33AAE
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3152
  • C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1360-121-0x0000000000050000-0x0000000000051000-memory.dmp

    Filesize

    4KB

  • memory/1360-120-0x0000000000050000-0x0000000000051000-memory.dmp

    Filesize

    4KB

  • memory/2700-115-0x0000027AF60A0000-0x0000027AF60A2000-memory.dmp

    Filesize

    8KB

  • memory/2700-116-0x0000027AF60A0000-0x0000027AF60A2000-memory.dmp

    Filesize

    8KB

  • memory/3384-165-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-183-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-152-0x0000000002870000-0x0000000002871000-memory.dmp

    Filesize

    4KB

  • memory/3384-153-0x0000000000AC0000-0x0000000000AC4000-memory.dmp

    Filesize

    16KB

  • memory/3384-154-0x00000000028A0000-0x00000000028A1000-memory.dmp

    Filesize

    4KB

  • memory/3384-156-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-157-0x00000000028B0000-0x00000000028B1000-memory.dmp

    Filesize

    4KB

  • memory/3384-158-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-161-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-160-0x00000000028C0000-0x00000000028C1000-memory.dmp

    Filesize

    4KB

  • memory/3384-162-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-159-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-155-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-163-0x00000000028D0000-0x00000000028D1000-memory.dmp

    Filesize

    4KB

  • memory/3384-164-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-150-0x0000000071A10000-0x0000000071A1C000-memory.dmp

    Filesize

    48KB

  • memory/3384-167-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-166-0x00000000028E0000-0x00000000028E1000-memory.dmp

    Filesize

    4KB

  • memory/3384-168-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-169-0x0000000003090000-0x0000000003091000-memory.dmp

    Filesize

    4KB

  • memory/3384-170-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-171-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-172-0x00000000030A0000-0x00000000030A1000-memory.dmp

    Filesize

    4KB

  • memory/3384-173-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-174-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-175-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB

  • memory/3384-176-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-177-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-178-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/3384-179-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-180-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-181-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/3384-182-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-151-0x0000000000A80000-0x0000000000AA4000-memory.dmp

    Filesize

    144KB

  • memory/3384-184-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/3384-185-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-186-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-188-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-189-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-187-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/3384-190-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/3384-192-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-191-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-193-0x0000000003110000-0x0000000003111000-memory.dmp

    Filesize

    4KB

  • memory/3384-194-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-195-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-196-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/3384-197-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-198-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-200-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-199-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/3384-201-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-203-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-204-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-202-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/3384-205-0x0000000003150000-0x0000000003151000-memory.dmp

    Filesize

    4KB

  • memory/3384-206-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-207-0x0000000002A40000-0x0000000002B80000-memory.dmp

    Filesize

    1.2MB

  • memory/3384-208-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/3384-214-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/3384-149-0x0000000071AA0000-0x0000000071AF0000-memory.dmp

    Filesize

    320KB

  • memory/3384-217-0x00000000053F1000-0x000000000582F000-memory.dmp

    Filesize

    4.2MB

  • memory/3384-218-0x0000000004C30000-0x0000000004C31000-memory.dmp

    Filesize

    4KB

  • memory/3384-148-0x0000000000ED0000-0x0000000001017000-memory.dmp

    Filesize

    1.3MB

  • memory/4056-117-0x00000289141D0000-0x00000289141D2000-memory.dmp

    Filesize

    8KB

  • memory/4056-118-0x00000289141D0000-0x00000289141D2000-memory.dmp

    Filesize

    8KB