Analysis

  • max time kernel
    371s
  • max time network
    390s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    15/01/2023, 22:18

General

  • Target

    Factura63c47.msi

  • Size

    6.6MB

  • MD5

    2187f88f99a58bbe6d8d76447ddec93e

  • SHA1

    86b0b6e867b97f68b666fd2d93b42b8308d7426e

  • SHA256

    7aed2f04618c60642965a3544d5927aa58b4092c1cce70c3a9ed55f161bb4a0a

  • SHA512

    bc7bfad3a1f2e86a4e56adb2caf78f2123dd256cfcb37f6143ab0ff090b5391cbb5df3515dba1bfb53bce61bc6044b0c64681c3657781eff670bdf6f9b712a53

  • SSDEEP

    98304:NYEtM2Af5tdoOS8mcA18WgQLKk9jEOy0pqQdA43Ak+jVktqMh8+pBwThNVCjHRrG:9M5tyr8mak9c0p243MlQwTLVCxZw

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 20 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Factura63c47.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5008
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 64BD5D340C32602B6C8756D3EB4F344E
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:940
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3376

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Installer\MSI6B03.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6B03.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6D85.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6D85.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6E12.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6E12.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6E33.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI6E33.tmp

            Filesize

            376KB

            MD5

            e12c5bcc254c953b1a46d1434804f4d2

            SHA1

            99f67acf34af1294f3c6e5eb521c862e1c772397

            SHA256

            5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

            SHA512

            9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

          • C:\Windows\Installer\MSI7019.tmp

            Filesize

            6.0MB

            MD5

            990647e9ac8084a66c48c1e08f33cbf0

            SHA1

            27b1c4b90d8eba3181da7c115783e5126e496691

            SHA256

            7e7c825fb357e8ac5efdf015add8e190df1ecb104ea12a55c7eca9f359db3c28

            SHA512

            938410beba22efcf47427649409fce514b6f5cf7800804acc5b36186440cd4366b41d6f45eace0ec426d63262457c26edb84eef747dd554cbc17c807873a419c

          • C:\Windows\Installer\MSI7019.tmp

            Filesize

            6.0MB

            MD5

            990647e9ac8084a66c48c1e08f33cbf0

            SHA1

            27b1c4b90d8eba3181da7c115783e5126e496691

            SHA256

            7e7c825fb357e8ac5efdf015add8e190df1ecb104ea12a55c7eca9f359db3c28

            SHA512

            938410beba22efcf47427649409fce514b6f5cf7800804acc5b36186440cd4366b41d6f45eace0ec426d63262457c26edb84eef747dd554cbc17c807873a419c

          • C:\Windows\Installer\MSI7019.tmp

            Filesize

            6.0MB

            MD5

            990647e9ac8084a66c48c1e08f33cbf0

            SHA1

            27b1c4b90d8eba3181da7c115783e5126e496691

            SHA256

            7e7c825fb357e8ac5efdf015add8e190df1ecb104ea12a55c7eca9f359db3c28

            SHA512

            938410beba22efcf47427649409fce514b6f5cf7800804acc5b36186440cd4366b41d6f45eace0ec426d63262457c26edb84eef747dd554cbc17c807873a419c

          • memory/940-144-0x0000000002900000-0x00000000036E3000-memory.dmp

            Filesize

            13.9MB

          • memory/940-146-0x0000000002900000-0x00000000036E3000-memory.dmp

            Filesize

            13.9MB

          • memory/940-147-0x0000000002900000-0x00000000036E3000-memory.dmp

            Filesize

            13.9MB