Analysis

  • max time kernel
    58s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2023 11:22

General

  • Target

    putty-64bit-0.78-installer.msi

  • Size

    3.5MB

  • MD5

    108b432c4dc0a66b657d985e180bec71

  • SHA1

    262812d43303b7ddc7c04a1c243172ebe6579f00

  • SHA256

    e64775374097f1b1c8fd4173f7d5be4305b88cec26a56d003113aff2837ae08e

  • SHA512

    5ddb97078b417f22c54dce768564dec58fd92a9c190f7a6cac9c7979a0f136dd439da1d59dd3c088e709433f5c4f79c033abd4b6ca8989d38620c20f4623386e

  • SSDEEP

    98304:Ujhyh9EoxGHgBRn8Tg4IDrwRW8FMDMb34+NHC6:UjhyJPR8Tg4IDrwdFMD048

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\putty-64bit-0.78-installer.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1752
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 638524DDCE1BAD3A32334000DF5222F8 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\PuTTY\README.txt
        3⤵
          PID:672
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:1780
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003B0" "0000000000000558"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:2016

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\PuTTY\README.txt

        Filesize

        1KB

        MD5

        6cf727766580b6019becca7e62c49e70

        SHA1

        6842fa969ca4a83a8780e59b75bd30d8859917c1

        SHA256

        11bdf4f12d34f617cf81f0c30aef7b596dbd00d0d19cf9e3c2e4648d672b3809

        SHA512

        0710ad72f032f54946b089aed10dc3da00f54d9bf835e09cd6fcc90603afb2ca91a6efd0a496b71d51275828f545996885a8718468d69edb45bd4070234b9234

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

        Filesize

        765B

        MD5

        699cd7cab884d69fa42884d852483961

        SHA1

        5bfb5fe2a9988b4449de9cc8a6ca20ef77aad022

        SHA256

        521700f06a433941ed57f75a86bf74bf5431375c31e8088c8cbefdff49def725

        SHA512

        b6635cb845e39b8b87ce9b305ff88a0e6d414723241c15edfa3d6dcd5b788fd1d9e3979dcb967c9b14f9ac87d72075dc0871834faf73099d9d10a116ed3546e6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_383EB3891E16580A90C892D349C28A00

        Filesize

        638B

        MD5

        2aaca6b5a6015dda41e8ba05168e6ee0

        SHA1

        5a6183aeb39d8dde39c8ee6e1400a3045a94cdf6

        SHA256

        f59cfc6b9822da316d7cb2aee7da2208cefae024de2951e3790b16630137d5fd

        SHA512

        e285d7f0548d34b31781a491ba8cf9d656cd7ea0790735e9921d1a998a387eb2c1bf0f261d1dfdcca3ba78664712af77372a1793884d41cec242564fd2d30772

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

        Filesize

        1KB

        MD5

        636b10c20ef4ece80aa28183d44eb72a

        SHA1

        903ac629ffd221da3485450a677f23333353d679

        SHA256

        c11395b80919741a4e6e9af0fe297ac35a455f5b1ed99c252b30acd20fe34313

        SHA512

        c3a636ca3740eb7c30255e880af573efab6629b7fc65d76f0a7632039f90b7af03fd696204119c9b81837b026037e9025b9a4a979874e849dca21dda1ad5098b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

        Filesize

        484B

        MD5

        f9259997c64a82f475173560844cc35f

        SHA1

        5611055e5914907064a54fdcd36f53d60416b606

        SHA256

        1791b32ba7293f6690096b02ecd01f1175c4d0bbb906ed39d20e25ebc183795e

        SHA512

        39eaa9f9865c27e4dc45372ff60ca6fc495589ed0a802e18a51df862cea34115bce9bd0278be492fe91228a848a1cfa3b952424879fd6e747d8d53121c131d61

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        170b118769eb7e3db3c8f7e246513c08

        SHA1

        f2a4b3f4aebf372f2c10ccd0bafcf33e6f6e0e88

        SHA256

        b92a3c1634d26a04e50816a8e1f341a6c77a551e5581678401cded69bd5d435a

        SHA512

        deb2776ac248c6a2773c7ebfb79d3f8dd335cf72e7bf466092bfa63c6b03613e0e28111d8d1bfd6c3b35ae9d9d465aad671b31cc22027f46452d3a2dee1fa2b2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_383EB3891E16580A90C892D349C28A00

        Filesize

        488B

        MD5

        aa6bce4f3c097aa0aebe4a0c70691d58

        SHA1

        25942cb500fc2ccb71d66f4f9a3adbaae2c29e7e

        SHA256

        ee49c7d67f340cce63ba8f437949ce44f159dc3be57e5ddde837523ed7cf2200

        SHA512

        784684c754e34b63fdaaaae9cd7c0301ad6245f123e8631e5c3b8c96d7231116f0dfc2cdf8409d66fe04f2cc078816d3d21a30a7dcbe37537e575cd4b37b84ae

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

        Filesize

        482B

        MD5

        0105a8d29c5f8bead3239f17cb11295b

        SHA1

        063c956ca645aaa11f9c49424c4ec3c8806e909c

        SHA256

        4cb2e03588c51b82f072d9d16ecf608ed6bc62cc13f457c555e59ff4c38b57e8

        SHA512

        9728b7dc8e0ade4202e505b7f4e528f6fe082eafe7015afcd72b456c1d98df6493c192c056735f7179a44a33648d04535a4c470c3d8a19168846ec698565fd90

      • C:\Users\Admin\AppData\Local\Temp\MSI49F4.tmp

        Filesize

        199KB

        MD5

        3a4e61909500d677745ef2ab508f3f3b

        SHA1

        ee398e1a153ca96c2592816eb8e8b2b7bb845e1e

        SHA256

        fb7a6eb19d1d1042d3bd8b3add9271116b8b6db3714dfcc0b6fee8e088d4a2cc

        SHA512

        feba07bba5007a20e0a1e2ca8c9050ae8624e8fbb0f24aada5dc7c2bde3be561b844453a573cab2a24c3769a8dba401db4eeef0d22ef86e2109b67e54392ee45

      • C:\Users\Admin\AppData\Local\Temp\MSI882A.tmp

        Filesize

        102KB

        MD5

        d9ac1b56edf330a6eb7894ab293f14f6

        SHA1

        022d8944e3927fff2b330dab54716ddcbb366d16

        SHA256

        097f1c3f27b18010448d77e3f70c4d9f774cb9c5ab435c62baa1c00e4cadd5ef

        SHA512

        e434410e2b2c2bb1fba4f3fc7c277b978c45b1df1d3c3994d6dc1530558393d7d42a713506bf95d013b2e40e9da36fd3e588fea8d8dc062a24ad931e4d76c328

      • \Program Files\PuTTY\pageant.exe

        Filesize

        521KB

        MD5

        d5042b0b48c1e0c71e9a129e47e38b20

        SHA1

        8c5dcc1aaaec7b934b65938da518d5dd73621529

        SHA256

        8a6377d555bb7f37364553c2a790ea25da85594361b3fbf126578a551705fc31

        SHA512

        ac3fa2c2267a3c68ae6fbb8c32dae74e5ba5f493e8efdc75a8b21f7660497f29b00bc38aa20b07d80ae79410fb5f301bac904dae620d1023b90c13dbe3b4ce0a

      • \Program Files\PuTTY\psftp.exe

        Filesize

        982KB

        MD5

        32b3f329f055f95fd29412e2a8597120

        SHA1

        6ec230545a0408dbeef01ad1731a611949158dd0

        SHA256

        bf4931804c98c13c2696f4adc565f06eb102291b6bc304cce255a8b346fba0a5

        SHA512

        d771d23bdf25cf7ee7ef580ef69e3744338a9a32cc6e4f40ad19b51283c4cbaeba83fbeb42208c6c747af1663f52db02e61ae8fa1357e5b6d280935b44c2d505

      • \Program Files\PuTTY\putty.exe

        Filesize

        1.2MB

        MD5

        14080a3e4e877be235f06509b2a4b6a9

        SHA1

        868866bd51f1ac744991c08eda6446222a0ccdae

        SHA256

        35c9df3a348ae805902a95ab8ad32a6d61ef85ca8249ae78f1077edd2429fe6b

        SHA512

        78c8fe794d0634c74cf172649cd6c6f46244f327dd1a7a8e029fd3c98302b2df6d6ba4279262cb425fca86fe8ba2ef38293c33b85acb3854faabce934a91fc32

      • \Program Files\PuTTY\puttygen.exe

        Filesize

        598KB

        MD5

        14169eaee45a1c21044543efd081ec18

        SHA1

        e33652a171fd4769f2393822f445ced632d37abc

        SHA256

        1abd47a6395ffc9fdc5f1d04910725c51eda1d6afbd400df050c197b7b3f6928

        SHA512

        852928c57754231a90ad0a2b29115af31c22cb0064d0df1c2618b76bf8263a47257ee0743267b545f8ecc87907d62bcb6e51833411064792db8b57bb070c40ef

      • \Users\Admin\AppData\Local\Temp\MSI49F4.tmp

        Filesize

        199KB

        MD5

        3a4e61909500d677745ef2ab508f3f3b

        SHA1

        ee398e1a153ca96c2592816eb8e8b2b7bb845e1e

        SHA256

        fb7a6eb19d1d1042d3bd8b3add9271116b8b6db3714dfcc0b6fee8e088d4a2cc

        SHA512

        feba07bba5007a20e0a1e2ca8c9050ae8624e8fbb0f24aada5dc7c2bde3be561b844453a573cab2a24c3769a8dba401db4eeef0d22ef86e2109b67e54392ee45

      • \Users\Admin\AppData\Local\Temp\MSI882A.tmp

        Filesize

        102KB

        MD5

        d9ac1b56edf330a6eb7894ab293f14f6

        SHA1

        022d8944e3927fff2b330dab54716ddcbb366d16

        SHA256

        097f1c3f27b18010448d77e3f70c4d9f774cb9c5ab435c62baa1c00e4cadd5ef

        SHA512

        e434410e2b2c2bb1fba4f3fc7c277b978c45b1df1d3c3994d6dc1530558393d7d42a713506bf95d013b2e40e9da36fd3e588fea8d8dc062a24ad931e4d76c328

      • memory/1080-57-0x0000000076681000-0x0000000076683000-memory.dmp

        Filesize

        8KB

      • memory/1752-54-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

        Filesize

        8KB