Analysis

  • max time kernel
    42s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 18:25

General

  • Target

    FACT63eb9.msi

  • Size

    7.2MB

  • MD5

    d5ad2aed1360f13721756a52a9a47d12

  • SHA1

    c3e11b221dc4591a4e8a5634d4a66b77ff8171c9

  • SHA256

    6719c4bd451f0c988e20c4e6d4773c015fd98f2882ac1342ef4d48f31bde6cfe

  • SHA512

    d61a280b47910055ffed83af2f59ba4bc645c0f171c1a526259fe7d10773bdb928d32fe8a645b9e5a69d621e9583cefb1b8f5deb320facf0a911c8700475d177

  • SSDEEP

    196608:s8/r1/apIF/njBNqpVjShyC5NKj/C1B3:s8/mIFvVNqp1SYkK/C

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\FACT63eb9.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1788
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 29535B2EDC1B47150FE9FCC712B6D403
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Installer\MSIEA60.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSIEC54.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSIEFFD.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • C:\Windows\Installer\MSIF4FE.tmp

          Filesize

          6.6MB

          MD5

          a0a67d1601a367964146dbf4851593be

          SHA1

          498a9231266eae7cf03590d004e51a734f45ee48

          SHA256

          2992497461eebc63e53dd484b0a22fc6d864687353bbb29a3fa876242672b5f2

          SHA512

          6c5d42158ddbae47c5e7c800c1f3cce5b9c26fc337e69d1e6a0750314364ddea949b427bc67c1350eba1fdcb20bdbdb77a6db6ca9ba5ef0e632b0ac990e49e8a

        • \Windows\Installer\MSIEA60.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSIEC54.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSIEFFD.tmp

          Filesize

          376KB

          MD5

          e12c5bcc254c953b1a46d1434804f4d2

          SHA1

          99f67acf34af1294f3c6e5eb521c862e1c772397

          SHA256

          5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

          SHA512

          9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

        • \Windows\Installer\MSIF4FE.tmp

          Filesize

          6.6MB

          MD5

          a0a67d1601a367964146dbf4851593be

          SHA1

          498a9231266eae7cf03590d004e51a734f45ee48

          SHA256

          2992497461eebc63e53dd484b0a22fc6d864687353bbb29a3fa876242672b5f2

          SHA512

          6c5d42158ddbae47c5e7c800c1f3cce5b9c26fc337e69d1e6a0750314364ddea949b427bc67c1350eba1fdcb20bdbdb77a6db6ca9ba5ef0e632b0ac990e49e8a

        • memory/1104-57-0x0000000076321000-0x0000000076323000-memory.dmp

          Filesize

          8KB

        • memory/1104-66-0x0000000002F5F000-0x00000000035F7000-memory.dmp

          Filesize

          6.6MB

        • memory/1104-70-0x00000000025E0000-0x000000000322A000-memory.dmp

          Filesize

          12.3MB

        • memory/1104-71-0x00000000025E0000-0x000000000322A000-memory.dmp

          Filesize

          12.3MB

        • memory/1104-72-0x00000000025E0000-0x000000000322A000-memory.dmp

          Filesize

          12.3MB

        • memory/1788-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp

          Filesize

          8KB