Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 15:16

General

  • Target

    CEP_COMPROBANTE-ELECTRONICO-PAGO-CEP-41136d968a589ee7f4bf39cd15d31bd8e9fc.msi

  • Size

    5.6MB

  • MD5

    96d57b5a423ef71ba40e0539f8be828d

  • SHA1

    95c1ea471cf592c6511ac6dfec4e3bf95221c871

  • SHA256

    60eaf2ea62e78bbec6bced32cb9abd3fbf03b2099ff1a4ccece5e836b2ca187e

  • SHA512

    c62cf674867bd18d9d010217cdba9b6d946af2c5d0f5b6ddb78a33c4478c7860eb3fb07ae54de07bbec29a88e9e6df364b13f070865b8927084a1913d3be31e6

  • SSDEEP

    98304:aYvtRfOHcxu6ZBjdaBiBq2S6hBeRMyeaEE9QptyZo4xIDA+KJTia/eCA:F3yH+BdNBvSHipUC4uD3aTj

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\CEP_COMPROBANTE-ELECTRONICO-PAGO-CEP-41136d968a589ee7f4bf39cd15d31bd8e9fc.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1648
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5E29A14217DF710FE98E4924BA0EF5B2
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI696.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • C:\Windows\Installer\MSI84C.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • C:\Windows\Installer\MSIC34.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • C:\Windows\Installer\MSIEBAB.tmp

    Filesize

    5.1MB

    MD5

    61b08b23b5f5191a707e7960edb887a1

    SHA1

    647ba301e2d99775ae7c818ab8cbc33cbabcca88

    SHA256

    4f31e3f3431f5cbb6c55e224d094b7e03a64dd1fbfc383f3a6a0abdd6fb87ad1

    SHA512

    e95fe5d5a00f38c1b7ab26288555813b16bfe59af7022c26af26609d2e8f5e75863afdac157333057f9df19da1b2b8f815ecab4c14e0f78ec4471d20ed76b5c2

  • \Windows\Installer\MSI696.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • \Windows\Installer\MSI84C.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • \Windows\Installer\MSIC34.tmp

    Filesize

    381KB

    MD5

    d90ab57e6c584f90fbbea74b566216e3

    SHA1

    4616e59aed33848f5870e5e1fe865f932721a162

    SHA256

    44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

    SHA512

    5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

  • \Windows\Installer\MSIEBAB.tmp

    Filesize

    5.1MB

    MD5

    61b08b23b5f5191a707e7960edb887a1

    SHA1

    647ba301e2d99775ae7c818ab8cbc33cbabcca88

    SHA256

    4f31e3f3431f5cbb6c55e224d094b7e03a64dd1fbfc383f3a6a0abdd6fb87ad1

    SHA512

    e95fe5d5a00f38c1b7ab26288555813b16bfe59af7022c26af26609d2e8f5e75863afdac157333057f9df19da1b2b8f815ecab4c14e0f78ec4471d20ed76b5c2

  • memory/624-57-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/624-68-0x0000000002700000-0x000000000334A000-memory.dmp

    Filesize

    12.3MB

  • memory/624-67-0x0000000002660000-0x00000000030A4000-memory.dmp

    Filesize

    10.3MB

  • memory/624-69-0x0000000002700000-0x000000000334A000-memory.dmp

    Filesize

    12.3MB

  • memory/624-70-0x0000000002660000-0x00000000030A4000-memory.dmp

    Filesize

    10.3MB

  • memory/1648-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp

    Filesize

    8KB