Analysis

  • max time kernel
    169s
  • max time network
    176s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    31-01-2022 02:26

General

  • Target

    a6d90369d389bb04cf4619cd820b8210.exe

  • Size

    830KB

  • MD5

    a6d90369d389bb04cf4619cd820b8210

  • SHA1

    4481d1cdb623fd775cb342f27c44305018bbe746

  • SHA256

    0e6860a8ce361236ec4bff327266a53152fe642e30bc076cada2d8ec9c1fa3c1

  • SHA512

    e444232c1389ab346f5b0700dc31e672154f7c3384bcaa9b6c908085cb336b4044c63466a2d041921dadae217a21723e40e33b7ab1169a1dfe6b7f9f769f4d43

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6d90369d389bb04cf4619cd820b8210.exe
    "C:\Users\Admin\AppData\Local\Temp\a6d90369d389bb04cf4619cd820b8210.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\setup.exe
      C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\setup.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\sc.exe
        "C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\sc.exe"
        3⤵
        • Executes dropped EXE
        PID:676
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\OpenBoxAddInSetup.msi"
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:588
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 21FD1F6610C3D7EE19F0707744E9F035 C
      2⤵
      • Loads dropped DLL
      PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\OpenBoxAddInSetup.msi

    MD5

    26ad18c56df90105a3da3054c07569ed

    SHA1

    f82d41ffeac56c3eeb4ecd3ac31e3d734037687b

    SHA256

    9550233216fce040a26fec30780a8402fbb221e4dcbc6e7490ef9670eae57119

    SHA512

    a37acbcaae6061b2aa36c04966e8376ee30c2f111f4f8202e6f248b364f1eb4a4fcd2add55bf8272feaab4903033d8f746510498728a7c9d4622eeb600d80894

  • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\sc.exe

    MD5

    7803a246c6dc35ec8175c29490f6bdf5

    SHA1

    bd850fbae93154446922c86df751f08fed93cf05

    SHA256

    f6c47a385d38ab29100f6c3ba57ca3cc14e0c6e17e02d00a1f2f948e79aa14f3

    SHA512

    efc66b74e74cfa212a872eeb7296a88944dfc14cd617b775ea7e3966cd79e50ca9abd1b2361fa0933f2c1eceb8141d5e4d050d0f4434fc37fbf6cd5fcec25b00

  • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\sc.exe

    MD5

    7803a246c6dc35ec8175c29490f6bdf5

    SHA1

    bd850fbae93154446922c86df751f08fed93cf05

    SHA256

    f6c47a385d38ab29100f6c3ba57ca3cc14e0c6e17e02d00a1f2f948e79aa14f3

    SHA512

    efc66b74e74cfa212a872eeb7296a88944dfc14cd617b775ea7e3966cd79e50ca9abd1b2361fa0933f2c1eceb8141d5e4d050d0f4434fc37fbf6cd5fcec25b00

  • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\setup.exe

    MD5

    242601e34bc56f41709f376706aad640

    SHA1

    0262974e437c644d891bc81ea16122b6b8cb37d2

    SHA256

    d43fee20211443a24dac895080137efabedf45e8b11aa98e552a9d2add734440

    SHA512

    5069f41d16c8b42b653e925937752fc8275cba23fd984949407518ba4d407e28954c0d9c4b2c2fbfafebaa7c29bd2bd253c06a534ba1b4e228ed86f6f2ee3bb8

  • C:\Users\Admin\AppData\Local\OpenBoxAddIn_202223316\prerequisites\setup.exe

    MD5

    242601e34bc56f41709f376706aad640

    SHA1

    0262974e437c644d891bc81ea16122b6b8cb37d2

    SHA256

    d43fee20211443a24dac895080137efabedf45e8b11aa98e552a9d2add734440

    SHA512

    5069f41d16c8b42b653e925937752fc8275cba23fd984949407518ba4d407e28954c0d9c4b2c2fbfafebaa7c29bd2bd253c06a534ba1b4e228ed86f6f2ee3bb8

  • C:\Users\Admin\AppData\Local\Temp\MSIEA38.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • C:\Users\Admin\AppData\Local\Temp\MSIF11F.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • \Users\Admin\AppData\Local\Temp\MSIEA38.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5

  • \Users\Admin\AppData\Local\Temp\MSIF11F.tmp

    MD5

    9945f10135a4c7214fa5605c21e5de9b

    SHA1

    3826fb627c67efd574a30448ea7f1e560b949c87

    SHA256

    9f3b0f3af4bfa061736935bab1d50ed2581358ddc9a9c0db22564aced1a1807c

    SHA512

    f385e078ceeb54fe86f66f2db056baba9556817bbf9a110bcd9e170462351af0dd4462429412410c7c3b2b76ea808d7bce4ea1f756a18819aa1762edb3745cc5