Analysis

  • max time kernel
    116s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2023, 14:44

General

  • Target

    Focus To-Do(en).msi

  • Size

    68.8MB

  • MD5

    56f693053e98c6ce6c42ea903f1c299b

  • SHA1

    0b6095d2990ef366f3723327fdd06a58fe61cb26

  • SHA256

    cc10151143a8a574cb183c06d513d2c6c568dd9109021d8c866c2feef0be4ceb

  • SHA512

    496415c0107817c27b865330ae1745535224c002f6c15bb556778fb3e316dbd3b32d5f5f615221079b45792f35becb01e567359fcc29ef12ecbbb9a3d7f5c18a

  • SSDEEP

    1572864:CRX5lkvMUvBn4dycsgBhqFxI2lNLL48KA5JBIZQ16I5DU:YX5OM2J4AclBqxXNI8JjBIZQ162D

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Focus To-Do(en).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2084
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8C796B544E9252879E396A7C649A0DD3 C
      2⤵
      • Loads dropped DLL
      PID:3140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIBF8C.tmp

    Filesize

    325KB

    MD5

    f048cf239cc583f8433634acf23cae55

    SHA1

    7d3a296a05267855cc637c5bf95fe687b7a765a2

    SHA256

    4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

    SHA512

    a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53

  • C:\Users\Admin\AppData\Local\Temp\MSIBF8C.tmp

    Filesize

    325KB

    MD5

    f048cf239cc583f8433634acf23cae55

    SHA1

    7d3a296a05267855cc637c5bf95fe687b7a765a2

    SHA256

    4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

    SHA512

    a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53

  • C:\Users\Admin\AppData\Local\Temp\MSIC1EE.tmp

    Filesize

    325KB

    MD5

    f048cf239cc583f8433634acf23cae55

    SHA1

    7d3a296a05267855cc637c5bf95fe687b7a765a2

    SHA256

    4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

    SHA512

    a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53

  • C:\Users\Admin\AppData\Local\Temp\MSIC1EE.tmp

    Filesize

    325KB

    MD5

    f048cf239cc583f8433634acf23cae55

    SHA1

    7d3a296a05267855cc637c5bf95fe687b7a765a2

    SHA256

    4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

    SHA512

    a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53