Analysis

  • max time kernel
    40s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 15:09

General

  • Target

    FACT63eb9.msi

  • Size

    7.2MB

  • MD5

    d5ad2aed1360f13721756a52a9a47d12

  • SHA1

    c3e11b221dc4591a4e8a5634d4a66b77ff8171c9

  • SHA256

    6719c4bd451f0c988e20c4e6d4773c015fd98f2882ac1342ef4d48f31bde6cfe

  • SHA512

    d61a280b47910055ffed83af2f59ba4bc645c0f171c1a526259fe7d10773bdb928d32fe8a645b9e5a69d621e9583cefb1b8f5deb320facf0a911c8700475d177

  • SSDEEP

    196608:s8/r1/apIF/njBNqpVjShyC5NKj/C1B3:s8/mIFvVNqp1SYkK/C

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\FACT63eb9.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1816
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FC29B6C76E862E03DBD9314DF45185CE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1960

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Installer\MSI38CD.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSI3CF3.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSI407D.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSI4639.tmp

          Filesize

          6.6MB

          MD5

          a0a67d1601a367964146dbf4851593be

          SHA1

          498a9231266eae7cf03590d004e51a734f45ee48

          SHA256

          2992497461eebc63e53dd484b0a22fc6d864687353bbb29a3fa876242672b5f2

          SHA512

          6c5d42158ddbae47c5e7c800c1f3cce5b9c26fc337e69d1e6a0750314364ddea949b427bc67c1350eba1fdcb20bdbdb77a6db6ca9ba5ef0e632b0ac990e49e8a

        • \Windows\Installer\MSI38CD.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSI3CF3.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSI407D.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSI4639.tmp

          Filesize

          6.6MB

          MD5

          a0a67d1601a367964146dbf4851593be

          SHA1

          498a9231266eae7cf03590d004e51a734f45ee48

          SHA256

          2992497461eebc63e53dd484b0a22fc6d864687353bbb29a3fa876242672b5f2

          SHA512

          6c5d42158ddbae47c5e7c800c1f3cce5b9c26fc337e69d1e6a0750314364ddea949b427bc67c1350eba1fdcb20bdbdb77a6db6ca9ba5ef0e632b0ac990e49e8a

        • memory/1816-54-0x000007FEFC181000-0x000007FEFC183000-memory.dmp

          Filesize

          8KB

        • memory/1960-57-0x00000000756A1000-0x00000000756A3000-memory.dmp

          Filesize

          8KB

        • memory/1960-66-0x0000000002D2F000-0x00000000033C7000-memory.dmp

          Filesize

          6.6MB

        • memory/1960-67-0x00000000025D0000-0x000000000321A000-memory.dmp

          Filesize

          12.3MB

        • memory/1960-68-0x00000000023E0000-0x00000000033C8000-memory.dmp

          Filesize

          15.9MB

        • memory/1960-70-0x00000000025D0000-0x000000000321A000-memory.dmp

          Filesize

          12.3MB

        • memory/1960-71-0x00000000023E0000-0x00000000033C8000-memory.dmp

          Filesize

          15.9MB

        • memory/1960-72-0x00000000025D0000-0x000000000321A000-memory.dmp

          Filesize

          12.3MB

        • memory/1960-73-0x00000000025D0000-0x000000000321A000-memory.dmp

          Filesize

          12.3MB

        • memory/1960-74-0x00000000023E0000-0x00000000033C8000-memory.dmp

          Filesize

          15.9MB