Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-12-2021 23:51
Static task
static1
Behavioral task
behavioral1
Sample
RT.msi
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
RT.msi
-
Size
2.2MB
-
MD5
55b75999aeba3ccfd5309b39d7880baa
-
SHA1
293a2c7cd6ab5851563d868d549e9a2dfd00842c
-
SHA256
e07e5f0295deb4c8a77519cf41d915046d6962db92b7e667f68267d30e0b8399
-
SHA512
59a8bad2040260f13ec4171e5ce6f28b04b1d6705aed4d7c9a9270c472062095bd4ec8cdc38fe962a55b8f8bc0b8f5afc4565d99f3dffee87dc12b107f9fd76f
Malware Config
Signatures
-
Detect Numando Payload 4 IoCs
resource yara_rule behavioral2/files/0x000500000001ab48-144.dat family_numando behavioral2/files/0x000500000001ab48-146.dat family_numando behavioral2/files/0x000500000001ab48-145.dat family_numando behavioral2/memory/2528-147-0x0000000000C00000-0x000000000150F000-memory.dmp family_numando -
Blocklisted process makes network request 5 IoCs
flow pid Process 19 8 MsiExec.exe 21 8 MsiExec.exe 23 8 MsiExec.exe 25 8 MsiExec.exe 27 8 MsiExec.exe -
Executes dropped EXE 2 IoCs
pid Process 412 MSI62E8.tmp 2528 Object.exe -
Loads dropped DLL 13 IoCs
pid Process 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 8 MsiExec.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Object.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WEFHWE0-FWEUY-F9WUEFWWEF\\BND0WEPWEJFC-9UEWFF\\Object.exe" Object.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI4B81.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4BE0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4DA8.tmp msiexec.exe File created C:\Windows\Installer\f763535.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI4788.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI366D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4265.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI42F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI43BF.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{C5886386-F26F-4C16-A501-438E40C8CBDA} msiexec.exe File opened for modification C:\Windows\Installer\MSI62E8.tmp msiexec.exe File opened for modification C:\Windows\Installer\f763535.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI616F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4C6D.tmp msiexec.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12E6464A-59B1-11EC-876A-46AC2453C65E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "48" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "76" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "76" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "76" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "29" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "48" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "48" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1324 msiexec.exe 1324 msiexec.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe 2528 Object.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 4016 msiexec.exe Token: SeIncreaseQuotaPrivilege 4016 msiexec.exe Token: SeSecurityPrivilege 1324 msiexec.exe Token: SeCreateTokenPrivilege 4016 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4016 msiexec.exe Token: SeLockMemoryPrivilege 4016 msiexec.exe Token: SeIncreaseQuotaPrivilege 4016 msiexec.exe Token: SeMachineAccountPrivilege 4016 msiexec.exe Token: SeTcbPrivilege 4016 msiexec.exe Token: SeSecurityPrivilege 4016 msiexec.exe Token: SeTakeOwnershipPrivilege 4016 msiexec.exe Token: SeLoadDriverPrivilege 4016 msiexec.exe Token: SeSystemProfilePrivilege 4016 msiexec.exe Token: SeSystemtimePrivilege 4016 msiexec.exe Token: SeProfSingleProcessPrivilege 4016 msiexec.exe Token: SeIncBasePriorityPrivilege 4016 msiexec.exe Token: SeCreatePagefilePrivilege 4016 msiexec.exe Token: SeCreatePermanentPrivilege 4016 msiexec.exe Token: SeBackupPrivilege 4016 msiexec.exe Token: SeRestorePrivilege 4016 msiexec.exe Token: SeShutdownPrivilege 4016 msiexec.exe Token: SeDebugPrivilege 4016 msiexec.exe Token: SeAuditPrivilege 4016 msiexec.exe Token: SeSystemEnvironmentPrivilege 4016 msiexec.exe Token: SeChangeNotifyPrivilege 4016 msiexec.exe Token: SeRemoteShutdownPrivilege 4016 msiexec.exe Token: SeUndockPrivilege 4016 msiexec.exe Token: SeSyncAgentPrivilege 4016 msiexec.exe Token: SeEnableDelegationPrivilege 4016 msiexec.exe Token: SeManageVolumePrivilege 4016 msiexec.exe Token: SeImpersonatePrivilege 4016 msiexec.exe Token: SeCreateGlobalPrivilege 4016 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4016 msiexec.exe 4016 msiexec.exe 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1324 wrote to memory of 8 1324 msiexec.exe 71 PID 1324 wrote to memory of 8 1324 msiexec.exe 71 PID 1324 wrote to memory of 8 1324 msiexec.exe 71 PID 1324 wrote to memory of 412 1324 msiexec.exe 73 PID 1324 wrote to memory of 412 1324 msiexec.exe 73 PID 1324 wrote to memory of 412 1324 msiexec.exe 73 PID 2528 wrote to memory of 1284 2528 Object.exe 75 PID 2528 wrote to memory of 1284 2528 Object.exe 75 PID 1284 wrote to memory of 1280 1284 iexplore.exe 76 PID 1284 wrote to memory of 1280 1284 iexplore.exe 76 PID 1284 wrote to memory of 1280 1284 iexplore.exe 76
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RT.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4016
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 54F4F85A6BED155DBB7B7DDAB947AE322⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:8
-
-
C:\Windows\Installer\MSI62E8.tmp"C:\Windows\Installer\MSI62E8.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\WEFHWE0-FWEUY-F9WUEFWWEF\BND0WEPWEJFC-9UEWFF\Object.exe"2⤵
- Executes dropped EXE
PID:412
-
-
C:\Users\Admin\AppData\Roaming\WEFHWE0-FWEUY-F9WUEFWWEF\BND0WEPWEJFC-9UEWFF\Object.exe"C:\Users\Admin\AppData\Roaming\WEFHWE0-FWEUY-F9WUEFWWEF\BND0WEPWEJFC-9UEWFF\Object.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %1 "https://bit.ly/3DvoVCc"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
-