Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-12-2021 19:11
Static task
static1
Behavioral task
behavioral1
Sample
Factura4240.GvxnX8qNAA.663.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Factura4240.GvxnX8qNAA.663.msi
Resource
win10-en-20211208
General
-
Target
Factura4240.GvxnX8qNAA.663.msi
-
Size
952KB
-
MD5
ba7c5960ab872f68adeae83b71439f05
-
SHA1
0e6a95bf7b43202ce3bd66b456006c17ce48dea2
-
SHA256
2080af3b41c2c57263933820398f0d3f838408366990e9f0c6cdafce0b73a0e9
-
SHA512
c5016633ff8496bf33c35b21618621b9060a68c0476fb1748742d20225427bb5803054f9ea67e5063086293fb31d96b18533cac7e3c28918cd425b4d700450f4
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
MsiExec.exeflow pid process 13 2148 MsiExec.exe -
Executes dropped EXE 1 IoCs
Processes:
iaE1.exepid process 4388 iaE1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
iaE1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iaE1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iaE1.exe -
Loads dropped DLL 8 IoCs
Processes:
MsiExec.exeiaE1.exepid process 2148 MsiExec.exe 2148 MsiExec.exe 2148 MsiExec.exe 2148 MsiExec.exe 2148 MsiExec.exe 2148 MsiExec.exe 4388 iaE1.exe 4388 iaE1.exe -
Processes:
resource yara_rule C:\Users\Public\vu27dp\YbCPXGxmpx.dll themida \Users\Public\vu27dp\YbCPXGxmpx.dll themida \Users\Public\vu27dp\YbCPXGxmpx.dll themida behavioral2/memory/4388-140-0x00000000049A0000-0x00000000058B8000-memory.dmp themida behavioral2/memory/4388-141-0x00000000049A0000-0x00000000058B8000-memory.dmp themida behavioral2/memory/4388-142-0x00000000049A0000-0x00000000058B8000-memory.dmp themida behavioral2/memory/4388-143-0x00000000049A0000-0x00000000058B8000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
MsiExec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\v24h = "C:\\Users\\Public\\vu27dp\\iaE1.exe" MsiExec.exe -
Processes:
iaE1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iaE1.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ipinfo.io -
Drops file in Windows directory 13 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\f75a113.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA4DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{D2D478BF-DD72-420E-A9E7-5E54AF1B2839} msiexec.exe File created C:\Windows\Installer\f75a113.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA171.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA460.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA57B.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIA983.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA9E2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAD30.tmp msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
iaE1.exepid process 4388 iaE1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exeiaE1.exepid process 4104 msiexec.exe 4104 msiexec.exe 4388 iaE1.exe 4388 iaE1.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3592 msiexec.exe Token: SeIncreaseQuotaPrivilege 3592 msiexec.exe Token: SeSecurityPrivilege 4104 msiexec.exe Token: SeCreateTokenPrivilege 3592 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3592 msiexec.exe Token: SeLockMemoryPrivilege 3592 msiexec.exe Token: SeIncreaseQuotaPrivilege 3592 msiexec.exe Token: SeMachineAccountPrivilege 3592 msiexec.exe Token: SeTcbPrivilege 3592 msiexec.exe Token: SeSecurityPrivilege 3592 msiexec.exe Token: SeTakeOwnershipPrivilege 3592 msiexec.exe Token: SeLoadDriverPrivilege 3592 msiexec.exe Token: SeSystemProfilePrivilege 3592 msiexec.exe Token: SeSystemtimePrivilege 3592 msiexec.exe Token: SeProfSingleProcessPrivilege 3592 msiexec.exe Token: SeIncBasePriorityPrivilege 3592 msiexec.exe Token: SeCreatePagefilePrivilege 3592 msiexec.exe Token: SeCreatePermanentPrivilege 3592 msiexec.exe Token: SeBackupPrivilege 3592 msiexec.exe Token: SeRestorePrivilege 3592 msiexec.exe Token: SeShutdownPrivilege 3592 msiexec.exe Token: SeDebugPrivilege 3592 msiexec.exe Token: SeAuditPrivilege 3592 msiexec.exe Token: SeSystemEnvironmentPrivilege 3592 msiexec.exe Token: SeChangeNotifyPrivilege 3592 msiexec.exe Token: SeRemoteShutdownPrivilege 3592 msiexec.exe Token: SeUndockPrivilege 3592 msiexec.exe Token: SeSyncAgentPrivilege 3592 msiexec.exe Token: SeEnableDelegationPrivilege 3592 msiexec.exe Token: SeManageVolumePrivilege 3592 msiexec.exe Token: SeImpersonatePrivilege 3592 msiexec.exe Token: SeCreateGlobalPrivilege 3592 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe Token: SeRestorePrivilege 4104 msiexec.exe Token: SeTakeOwnershipPrivilege 4104 msiexec.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
msiexec.exeiaE1.exepid process 3592 msiexec.exe 3592 msiexec.exe 4388 iaE1.exe 4388 iaE1.exe 4388 iaE1.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
iaE1.exepid process 4388 iaE1.exe 4388 iaE1.exe 4388 iaE1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
msiexec.exeMsiExec.exedescription pid process target process PID 4104 wrote to memory of 2148 4104 msiexec.exe MsiExec.exe PID 4104 wrote to memory of 2148 4104 msiexec.exe MsiExec.exe PID 4104 wrote to memory of 2148 4104 msiexec.exe MsiExec.exe PID 2148 wrote to memory of 4388 2148 MsiExec.exe iaE1.exe PID 2148 wrote to memory of 4388 2148 MsiExec.exe iaE1.exe PID 2148 wrote to memory of 4388 2148 MsiExec.exe iaE1.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Factura4240.GvxnX8qNAA.663.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3592
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1FE1380AAE77F0A03D77EDE8C5A150CC2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Public\vu27dp\iaE1.exe"C:\Users\Public\vu27dp\iaE1.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4388
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fc28931fac6e98a99e628fc3b2507c94
SHA1dfc173d935409f890afc150fd08ac1326d0c901d
SHA2564ef647c476ae369564eafc292e68d68eb9cbd0fe59fa7c1bbe51c2bad35454b1
SHA512c12b7ca8ae01318252b3faa2cf626790c80f5660bca9efe892d1a8aa4f863a14ebb6b577298097e07183e0687efc7837712ce9a39810fe9de6583d68fb107745
-
MD5
27fe3892e41e095380ad0d1c0edfa43c
SHA1ebdde859a53e1bbc278d4d56815b1940d91556bc
SHA25695be72f0c4c79f34415758e9e247bc29ebac057a9b909d5b195aa0c437ea4d35
SHA51223a51e0f580aab02f42b034577df9daa4e920116db752e238aeb05dfe6c1a2ad924a181d12dc495ffb9b84708bc01caa43240d252999c054f41bd543be6c32eb
-
MD5
01f601da6304451e0bc17cf004c97c43
SHA11aa363861d1cfc45056068de0710289ebbfcb886
SHA256945adada6cf6698b949359d9b395a5f905989d0d1eb84f537de492ecc1263148
SHA512cc74c0b016ab1f53069f6ffbe1e35373090a64ad5630cefbb70e72febdd00fb2d885838e5b9836382bf4b160998a08d7ce149071c73b10aa4320bca00805cb6b
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
06bf05c1b207c1340db60571ee6ef552
SHA164b9ad03c6827a320633336c5e53c974d950ef67
SHA2562ffdeb634dcd556e84b56d8546f5f4840b9b2c14706290230f37bb43b15da901
SHA512a66bda9de66a30495bf592f80b8bdae1b1b6340c37a2f6eb3fabf881a1cf107b626968df42ae319cb0cd5e27b88f0c6fe753f2cc57637430b217855108bc9b81
-
MD5
06bf05c1b207c1340db60571ee6ef552
SHA164b9ad03c6827a320633336c5e53c974d950ef67
SHA2562ffdeb634dcd556e84b56d8546f5f4840b9b2c14706290230f37bb43b15da901
SHA512a66bda9de66a30495bf592f80b8bdae1b1b6340c37a2f6eb3fabf881a1cf107b626968df42ae319cb0cd5e27b88f0c6fe753f2cc57637430b217855108bc9b81
-
MD5
fc28931fac6e98a99e628fc3b2507c94
SHA1dfc173d935409f890afc150fd08ac1326d0c901d
SHA2564ef647c476ae369564eafc292e68d68eb9cbd0fe59fa7c1bbe51c2bad35454b1
SHA512c12b7ca8ae01318252b3faa2cf626790c80f5660bca9efe892d1a8aa4f863a14ebb6b577298097e07183e0687efc7837712ce9a39810fe9de6583d68fb107745
-
MD5
fc28931fac6e98a99e628fc3b2507c94
SHA1dfc173d935409f890afc150fd08ac1326d0c901d
SHA2564ef647c476ae369564eafc292e68d68eb9cbd0fe59fa7c1bbe51c2bad35454b1
SHA512c12b7ca8ae01318252b3faa2cf626790c80f5660bca9efe892d1a8aa4f863a14ebb6b577298097e07183e0687efc7837712ce9a39810fe9de6583d68fb107745
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
d90ab57e6c584f90fbbea74b566216e3
SHA14616e59aed33848f5870e5e1fe865f932721a162
SHA25644ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9
SHA5125b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695
-
MD5
06bf05c1b207c1340db60571ee6ef552
SHA164b9ad03c6827a320633336c5e53c974d950ef67
SHA2562ffdeb634dcd556e84b56d8546f5f4840b9b2c14706290230f37bb43b15da901
SHA512a66bda9de66a30495bf592f80b8bdae1b1b6340c37a2f6eb3fabf881a1cf107b626968df42ae319cb0cd5e27b88f0c6fe753f2cc57637430b217855108bc9b81
-
MD5
06bf05c1b207c1340db60571ee6ef552
SHA164b9ad03c6827a320633336c5e53c974d950ef67
SHA2562ffdeb634dcd556e84b56d8546f5f4840b9b2c14706290230f37bb43b15da901
SHA512a66bda9de66a30495bf592f80b8bdae1b1b6340c37a2f6eb3fabf881a1cf107b626968df42ae319cb0cd5e27b88f0c6fe753f2cc57637430b217855108bc9b81