Analysis

  • max time kernel
    220s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-07-2022 06:10

General

  • Target

    508e8538c481ab57bb700d88ccc5ad644c8e2348f7612eadcb1e536f27aba1df.msi

  • Size

    20.7MB

  • MD5

    30df77a05a3ff9da6cfce5fd7e4d1dfa

  • SHA1

    f1dba529bca024d000cfef50bb8aa9c603077c88

  • SHA256

    508e8538c481ab57bb700d88ccc5ad644c8e2348f7612eadcb1e536f27aba1df

  • SHA512

    91bf4bcc4b60c73d24830bb7c8094af55ac7028bc9315970ad5fed8bd3a274ccc7a8497aa17ba954543d5ee039f2b4825f561cb2c236aab996210857a4eb6bee

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\508e8538c481ab57bb700d88ccc5ad644c8e2348f7612eadcb1e536f27aba1df.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1092
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding FC29B2469686D0864354DBA781DF3120 C
      2⤵
      • Loads dropped DLL
      PID:2028
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:320
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C0" "0000000000000568"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSI191D.tmp

      Filesize

      108KB

      MD5

      6584147067e0dd70298383a3dcbeea48

      SHA1

      8717aa19f309dc8c03337edd0e6a2f28e950a5b1

      SHA256

      284d2cb961a72db2b4e91508537d8712eb08eeb858d96d6924eb28fd57fee3b4

      SHA512

      7e3b2c838d2d6de89d3cf30f9fb0c580e0f69cf179240072a11fa9afb4123a4a07f8848a962df83ca89e473a19444b4951e6cbaedb6d2715fc6471f0c335e968

    • \Users\Admin\AppData\Local\Temp\MSI191D.tmp

      Filesize

      108KB

      MD5

      6584147067e0dd70298383a3dcbeea48

      SHA1

      8717aa19f309dc8c03337edd0e6a2f28e950a5b1

      SHA256

      284d2cb961a72db2b4e91508537d8712eb08eeb858d96d6924eb28fd57fee3b4

      SHA512

      7e3b2c838d2d6de89d3cf30f9fb0c580e0f69cf179240072a11fa9afb4123a4a07f8848a962df83ca89e473a19444b4951e6cbaedb6d2715fc6471f0c335e968

    • memory/1092-54-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

      Filesize

      8KB

    • memory/2028-56-0x0000000000000000-mapping.dmp