Analysis

  • max time kernel
    123s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    23-11-2021 13:27

General

  • Target

    Proc.Eeletronico80rdgkj4 qoz4br.msi

  • Size

    4.0MB

  • MD5

    1321ee6809d5368dc9ec125e04bc4cf8

  • SHA1

    f1c0503e18eba4af77c5e637b38f2cf323e6c2bc

  • SHA256

    c8c447eabc388282ef6ee8678cce4aa65557bf557a936109485648fd217baae8

  • SHA512

    c348633687ec45a8c6a82fb7339ceb54bcc7c7448108841d4c4aa54ab15de582dd4b2b981ce76c743dd6d3f5ceaf96491cf2a9065df3439aafd33d1398900597

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Proc.Eeletronico80rdgkj4 qoz4br.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2752
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 4BB21E6BE5A818F7EADB6FB1D559CAEE
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\uKDHzDNmHwvj\GRddlOiVKuZF.exe'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1448
  • C:\Users\Admin\uKDHzDNmHwvj\GRddlOiVKuZF.exe
    C:\Users\Admin\uKDHzDNmHwvj\GRddlOiVKuZF.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\uKDHzDNmHwvj\GRddlOiVKuZF.exe
      "C:\Users\Admin\uKDHzDNmHwvj\GRddlOiVKuZF.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/808-301-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

    Filesize

    4KB

  • memory/808-296-0x0000000002A80000-0x0000000002A81000-memory.dmp

    Filesize

    4KB

  • memory/808-302-0x0000000002820000-0x0000000002821000-memory.dmp

    Filesize

    4KB

  • memory/808-299-0x0000000003020000-0x0000000003021000-memory.dmp

    Filesize

    4KB

  • memory/808-236-0x0000000000A10000-0x0000000000B5A000-memory.dmp

    Filesize

    1.3MB

  • memory/808-234-0x00000000027F0000-0x00000000027F1000-memory.dmp

    Filesize

    4KB

  • memory/808-233-0x0000000000A10000-0x0000000000B5A000-memory.dmp

    Filesize

    1.3MB

  • memory/808-300-0x0000000003030000-0x0000000003031000-memory.dmp

    Filesize

    4KB

  • memory/808-306-0x00000000049F0000-0x00000000049F1000-memory.dmp

    Filesize

    4KB

  • memory/808-298-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/808-297-0x0000000002A90000-0x0000000002A91000-memory.dmp

    Filesize

    4KB

  • memory/808-305-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

    Filesize

    4KB

  • memory/808-304-0x0000000005291000-0x00000000056CF000-memory.dmp

    Filesize

    4.2MB

  • memory/1336-121-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

    Filesize

    4KB

  • memory/1336-120-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

    Filesize

    4KB

  • memory/1512-175-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB

  • memory/1512-202-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/1512-171-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-173-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-174-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-172-0x00000000030A0000-0x00000000030A1000-memory.dmp

    Filesize

    4KB

  • memory/1512-148-0x0000000000ED1000-0x0000000000FEC000-memory.dmp

    Filesize

    1.1MB

  • memory/1512-177-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-176-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-178-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/1512-179-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-180-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-181-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/1512-183-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-182-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-184-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/1512-185-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-186-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-187-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1512-188-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-189-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-190-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1512-191-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-192-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-193-0x0000000003110000-0x0000000003111000-memory.dmp

    Filesize

    4KB

  • memory/1512-194-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-195-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-196-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/1512-197-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-198-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-199-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/1512-201-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-200-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-170-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-203-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-204-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-205-0x0000000003150000-0x0000000003151000-memory.dmp

    Filesize

    4KB

  • memory/1512-207-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-206-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-208-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/1512-214-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/1512-169-0x0000000003090000-0x0000000003091000-memory.dmp

    Filesize

    4KB

  • memory/1512-217-0x00000000053D1000-0x000000000580F000-memory.dmp

    Filesize

    4.2MB

  • memory/1512-218-0x0000000004C30000-0x0000000004C31000-memory.dmp

    Filesize

    4KB

  • memory/1512-168-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-166-0x0000000003080000-0x0000000003081000-memory.dmp

    Filesize

    4KB

  • memory/1512-167-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-163-0x0000000003070000-0x0000000003071000-memory.dmp

    Filesize

    4KB

  • memory/1512-165-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-164-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-160-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/1512-162-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-161-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-159-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-158-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-157-0x0000000003050000-0x0000000003051000-memory.dmp

    Filesize

    4KB

  • memory/1512-155-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-156-0x0000000002A90000-0x0000000002BD0000-memory.dmp

    Filesize

    1.2MB

  • memory/1512-154-0x0000000000950000-0x00000000009FE000-memory.dmp

    Filesize

    696KB

  • memory/1512-153-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

    Filesize

    4KB

  • memory/1512-152-0x0000000002A70000-0x0000000002A71000-memory.dmp

    Filesize

    4KB

  • memory/1512-151-0x0000000000950000-0x00000000009FE000-memory.dmp

    Filesize

    696KB

  • memory/1512-150-0x00000000718E0000-0x00000000718EC000-memory.dmp

    Filesize

    48KB

  • memory/1512-149-0x0000000071980000-0x00000000719D0000-memory.dmp

    Filesize

    320KB

  • memory/2752-115-0x000001FBE5480000-0x000001FBE5482000-memory.dmp

    Filesize

    8KB

  • memory/2752-116-0x000001FBE5480000-0x000001FBE5482000-memory.dmp

    Filesize

    8KB

  • memory/4028-117-0x000001DFC6D30000-0x000001DFC6D32000-memory.dmp

    Filesize

    8KB

  • memory/4028-118-0x000001DFC6D30000-0x000001DFC6D32000-memory.dmp

    Filesize

    8KB