Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    16-03-2022 04:20

General

  • Target

    https://download.nutanix.com/Foundation/5.1.1/foundation-5.1.1-windows.msi?Expires=1647317017618&Key-Pair-Id=APKAJTTNCWPEI42QKMSA&Signature=G-MEsjjAR8ynl~LpkXPKS3R0s4kj0q1Owu7DO~Jq2QashOc5n1M0pP883g8mGTNkRA7uIbpCaom1RKSYk0R4xlkD-Pm6MFdjnZbXwQskCcynegYCq7SQV3TYC7~jXRqYbwpQhY4Uox7wUC2pA6zRPFnrCQoyXlnp0Jqyn8M-lNpsdSp2bdTMKDCn4l03LH5nsiZdBmXesNx6bKgmDhZRbxpYWbo56i-8VvSgmkk0DaY21GAs2~oujB~41gFVe-~rfuu4bDVWTqrGNGD--Uz~oLp8A7k4sLm3QM8h0iSHbvclBTmTRdQhc71Wjv3sm8HXxrSeuObaPzmR06wpEjJoFQ__

Score
9/10

Malware Config

Signatures

  • Detect jar appended to MSI 1 IoCs
  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://download.nutanix.com/Foundation/5.1.1/foundation-5.1.1-windows.msi?Expires=1647317017618&Key-Pair-Id=APKAJTTNCWPEI42QKMSA&Signature=G-MEsjjAR8ynl~LpkXPKS3R0s4kj0q1Owu7DO~Jq2QashOc5n1M0pP883g8mGTNkRA7uIbpCaom1RKSYk0R4xlkD-Pm6MFdjnZbXwQskCcynegYCq7SQV3TYC7~jXRqYbwpQhY4Uox7wUC2pA6zRPFnrCQoyXlnp0Jqyn8M-lNpsdSp2bdTMKDCn4l03LH5nsiZdBmXesNx6bKgmDhZRbxpYWbo56i-8VvSgmkk0DaY21GAs2~oujB~41gFVe-~rfuu4bDVWTqrGNGD--Uz~oLp8A7k4sLm3QM8h0iSHbvclBTmTRdQhc71Wjv3sm8HXxrSeuObaPzmR06wpEjJoFQ__
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3088
    • C:\Windows\System32\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GGB3KH7Z\foundation-5.1.1-windows.msi"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3104

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GGB3KH7Z\foundation-5.1.1-windows.msi.pt99xc9.partial
    MD5

    a8041319eaa4cfbc83bb439e5e058f1f

    SHA1

    35f1b3a4a38d07ca213488615e04c8abfff3e3d4

    SHA256

    dc1b0eac07c4e5ebaacbf999d98e7b30d3dfe7f8efbe2295efbff410118e8564

    SHA512

    d84c56277e5218f3a375c9d9bd3d83c8ee8e8489de09fcfef39180b20ad1cc15b9f314df232218976346dd36e0af8f68d59d9fecd70ce0812b6d1d90e1d1d2ec