Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    18-12-2021 16:26

General

  • Target

    77178a444840db24cd1398ba699419627ae1ab61bdecda746abd3dd415bccd44.msi

  • Size

    578KB

  • MD5

    d1c43bb1c9758eee8d2643731af9be7f

  • SHA1

    0614681917d21a1d06492583561643599d12d5ac

  • SHA256

    77178a444840db24cd1398ba699419627ae1ab61bdecda746abd3dd415bccd44

  • SHA512

    880ca382078957b3b27c289a9696ceac0add7140b11bfa1bd5335d92361682d43ed3d6c6166433dc90e6e7ecb20dffbb6e4bccd887c6cd15fd2478875ba12039

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\77178a444840db24cd1398ba699419627ae1ab61bdecda746abd3dd415bccd44.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1376
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C7E9FC57A4C471C1C1032474180E8C15
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cd\;cd 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup';Start-Sleep -s 6;Invoke-Item 'QSLGMZESLH.lnk'
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\AxKoSdLJ8b3Pkz\RszzzYXCq.exe
          "C:\AxKoSdLJ8b3Pkz\RszzzYXCq.exe"
          4⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1904
          • C:\Windows\system32\cmd.exe
            cmd.exe /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "nimdA" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Local\Bezerk_Sorry!®\qubEcAo.exe\"" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1280
            • C:\Windows\system32\reg.exe
              REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "nimdA" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Local\Bezerk_Sorry!®\qubEcAo.exe\""
              6⤵
              • Adds Run key to start application
              PID:972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AxKoSdLJ8b3Pkz\RszzzYXCq.exe

    MD5

    53b00fffa618fe5ce3a1c84cc81f5c3e

    SHA1

    8dfd75408c7683082af6030b3318cd8401264b7d

    SHA256

    353133e9989fd0610b1696f24648c1eadb66b08f8b31bdf573ec2af84457598d

    SHA512

    f1cd162e0c0354af9f54b8836b35b286d63a40cbdc255e7f6beda2e94be8de3c68c15acad18aaadfceadaf0a8a8f41c28f4dacc0c27d1c7ac6e5b4bbf4cca968

  • C:\AxKoSdLJ8b3Pkz\RszzzYXCq.exe

    MD5

    53b00fffa618fe5ce3a1c84cc81f5c3e

    SHA1

    8dfd75408c7683082af6030b3318cd8401264b7d

    SHA256

    353133e9989fd0610b1696f24648c1eadb66b08f8b31bdf573ec2af84457598d

    SHA512

    f1cd162e0c0354af9f54b8836b35b286d63a40cbdc255e7f6beda2e94be8de3c68c15acad18aaadfceadaf0a8a8f41c28f4dacc0c27d1c7ac6e5b4bbf4cca968

  • C:\AxKoSdLJ8b3Pkz\imgengine.dll

    MD5

    ef7de8e17a46bbb875ff5b48a5111f75

    SHA1

    1758ad8c4574dc8aba71ef4e541dd78579853826

    SHA256

    4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82

    SHA512

    0a7a0316856c766fb0ec8dae0519acb480d3e1c738c4a2ba442cb8cc5e67b920839ade09bc69e54eb406bb4575cae9fd1958512c25a826e134d4d036b744fd80

  • C:\AxKoSdLJ8b3Pkz\sptdintf.dll

    MD5

    5b91b8ef0dd74486bcaa38004417e565

    SHA1

    01c5cfc191ca8006b43f355ee41a35ad49c34fd4

    SHA256

    7353ea393051b369f92e230459d6904f88938e1ef94562aaa86342b9aaea7762

    SHA512

    aedbfb925e23e216dd0b03e6e26c1852ecfdee6a79662ce327e4213cda8d97eac2d9dc4d86f65a287c1346ec1d57573135711f941fd98acecdfa6215ec4b3ab1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    f21068572217524e157da39370ffe71e

    SHA1

    32a4fd9901f970913f17d74a4003198c0aeb07f1

    SHA256

    72dd30f7f897002a6ead8ea7b7b02e33414aca26bacde9aedf0e664fa12ab0c6

    SHA512

    634967f70658ffc6c2bb1072d5595eb12606104a6602979eb2b68a970d1f4b3228bfc86e298062096560a3f5c4c3dad953c3f55bdd54178ec7bb04cf3617ac75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QSLGMZESLH.lnk

    MD5

    84849502e68528aa63acd62ff61aa032

    SHA1

    c708eebb376800739ca65bf0f0707d2084b1f9e4

    SHA256

    bb32719b8bf4ba82c2c4f3f4ecdf0732175ce20c9c8b9340118e431d3d5a2645

    SHA512

    fb9df064eaa859dff855236441db8dd100a46bf1c2f9581e9efe22a13e4e75f679dacd42a8d7653de6bdaa258b4660f42e766e3774bc271980dba9af67e4e07c

  • C:\Windows\Installer\MSICF31.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • C:\Windows\Installer\MSID2CA.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • C:\Windows\Installer\MSID377.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • \AxKoSdLJ8b3Pkz\RszzzYXCq.exe

    MD5

    53b00fffa618fe5ce3a1c84cc81f5c3e

    SHA1

    8dfd75408c7683082af6030b3318cd8401264b7d

    SHA256

    353133e9989fd0610b1696f24648c1eadb66b08f8b31bdf573ec2af84457598d

    SHA512

    f1cd162e0c0354af9f54b8836b35b286d63a40cbdc255e7f6beda2e94be8de3c68c15acad18aaadfceadaf0a8a8f41c28f4dacc0c27d1c7ac6e5b4bbf4cca968

  • \AxKoSdLJ8b3Pkz\imgengine.dll

    MD5

    ef7de8e17a46bbb875ff5b48a5111f75

    SHA1

    1758ad8c4574dc8aba71ef4e541dd78579853826

    SHA256

    4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82

    SHA512

    0a7a0316856c766fb0ec8dae0519acb480d3e1c738c4a2ba442cb8cc5e67b920839ade09bc69e54eb406bb4575cae9fd1958512c25a826e134d4d036b744fd80

  • \AxKoSdLJ8b3Pkz\sptdintf.dll

    MD5

    5b91b8ef0dd74486bcaa38004417e565

    SHA1

    01c5cfc191ca8006b43f355ee41a35ad49c34fd4

    SHA256

    7353ea393051b369f92e230459d6904f88938e1ef94562aaa86342b9aaea7762

    SHA512

    aedbfb925e23e216dd0b03e6e26c1852ecfdee6a79662ce327e4213cda8d97eac2d9dc4d86f65a287c1346ec1d57573135711f941fd98acecdfa6215ec4b3ab1

  • \Windows\Installer\MSICF31.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • \Windows\Installer\MSID2CA.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • \Windows\Installer\MSID377.tmp

    MD5

    c18bc0b736979d22eeb22085d2023d28

    SHA1

    dc6bf871db4ec59b16fdaf505f49cb6ede36cea6

    SHA256

    2646d5432ff0b4ec3e39e21f4cf250bc80e6af01f2466ec97a21c4026d1958d9

    SHA512

    0b06fff2c4d2a465e339d1acc839d3fcfaddfc8358ee66842aa2330917d49c2abfd60c53c853e508a30dd19cb77cbc3eba7a14cab29c50fc28aadf5de062e575

  • memory/268-58-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB

  • memory/268-57-0x0000000000000000-mapping.dmp

  • memory/972-86-0x0000000000000000-mapping.dmp

  • memory/1100-67-0x0000000002390000-0x0000000002FDA000-memory.dmp

    Filesize

    12.3MB

  • memory/1100-65-0x0000000000000000-mapping.dmp

  • memory/1280-85-0x0000000000000000-mapping.dmp

  • memory/1376-55-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmp

    Filesize

    8KB

  • memory/1904-71-0x0000000000000000-mapping.dmp

  • memory/1904-80-0x0000000000400000-0x0000000002245000-memory.dmp

    Filesize

    30.3MB

  • memory/1904-81-0x0000000000400000-0x0000000002245000-memory.dmp

    Filesize

    30.3MB

  • memory/1904-83-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1904-79-0x0000000000400000-0x0000000002245000-memory.dmp

    Filesize

    30.3MB

  • memory/1904-78-0x0000000000400000-0x0000000002245000-memory.dmp

    Filesize

    30.3MB

  • memory/1904-77-0x0000000000400000-0x0000000002245000-memory.dmp

    Filesize

    30.3MB