Resubmissions

15/02/2023, 12:16

230215-pfpz9abf74 10

15/02/2023, 11:44

230215-nv62msbd2z 10

15/02/2023, 10:05

230215-l4rbfabc82 10

Analysis

  • max time kernel
    403s
  • max time network
    407s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2023, 12:16

General

  • Target

    Nicht bestätigt 172391.msi

  • Size

    13.5MB

  • MD5

    2e3bdf628e9bfaa6fe04786c390bdc6e

  • SHA1

    09e783f6b97b7e84e0b736b8db308d25a8c22633

  • SHA256

    079c18a81472a9ed6c3f7522d2013a813ae24c50b2e5e7ea79c4d280e60a3c4e

  • SHA512

    cc0a6b5ba08534c73f180160699e65fa02afb2f9551cae25442d8d9f96cf5457aea2d4b15d4467f2ddf81cdec31adfe468b80f3397ddbdf5550e33ecf487fe47

  • SSDEEP

    3072:imCP97KZrhPNN0JNIT3DM8X2Rb+kDRsT:idF+BhPNNkNIzDdmRKkDk

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 172391.msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:832
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 1BF18117C9C7CF052424535199A1D091 C
      2⤵
      • Loads dropped DLL
      PID:1528
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:1860
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000002CC" "00000000000004AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1624

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      25995dbc7a949aff9f4ea46069ffd3e3

      SHA1

      e162fd9532772ad09fd009bb7325747083066cce

      SHA256

      5cacdfbbb810c1220061dbb42da0f733181d5c6edd4ab9093dc7448b9cc1987e

      SHA512

      cf58dc4f36514009e79d9ab6af8f0056dfe0092ba7a2d34f7ea04a95d10d87661f24df23b76408386cc23a3c45f89b4bc495f5b7cf3ce2101bbd7c80ea792f90

    • C:\Users\Admin\AppData\Local\Temp\MSIF7FB.tmp

      Filesize

      92KB

      MD5

      8fd36288c6c2977a056bce524010dfdc

      SHA1

      431f2a45c67441a15a8f86d86664b8760a1cfd34

      SHA256

      828578d9511a494fa357c0cf73d927cb70ada2af5cca2875356109154d7da6e2

      SHA512

      641417d1fcd7f0099e643c58dd060fdd4233197186008341059efa41096b3e344419230d66f67c2b532e33d9414667bb0d2b746191137dea44c5d76c41524a2c

    • \Users\Admin\AppData\Local\Temp\MSIF7FB.tmp

      Filesize

      92KB

      MD5

      8fd36288c6c2977a056bce524010dfdc

      SHA1

      431f2a45c67441a15a8f86d86664b8760a1cfd34

      SHA256

      828578d9511a494fa357c0cf73d927cb70ada2af5cca2875356109154d7da6e2

      SHA512

      641417d1fcd7f0099e643c58dd060fdd4233197186008341059efa41096b3e344419230d66f67c2b532e33d9414667bb0d2b746191137dea44c5d76c41524a2c

    • memory/832-54-0x000007FEFC611000-0x000007FEFC613000-memory.dmp

      Filesize

      8KB