Analysis

  • max time kernel
    138s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    15/03/2023, 01:54

General

  • Target

    VirtualBox-7.0.6-155176-Win.exe

  • Size

    105.3MB

  • MD5

    2ad82b25d85fca75b78f34df3223bbfe

  • SHA1

    af9ece37b9d1bd7e8d942f48afe4d5cea8e1b206

  • SHA256

    a4142ecf52657bd6e06b66573919ac342ef460a61f4ee7d35c235c54640c3a39

  • SHA512

    c787271617785e94719e2bc5ec9a9f70455b61e6408f5f69e0bdaf2718d0d7e00fa8b7f044bbe78b98abbc474c6b25767520efb4c5baf80cd1f91369126e5688

  • SSDEEP

    1572864:IloHyCtX4f1cFecNDgiA13VIfR89CrpWIlof8gM0GnPuCPIY4HaiTFJX0w0WCi4:dtX4d8Nkf13aRffloUgtGZPoXJkw0Fi4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.6-155176-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.6-155176-Win.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4648
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding FA6A350108D1A2E64EB158B350C77A72 C
      2⤵
      • Loads dropped DLL
      PID:936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIBE15.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIBE15.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC077.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC077.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC097.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC097.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC097.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC144.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\MSIC144.tmp

    Filesize

    297KB

    MD5

    61c9992e504032dae2156f0f9f44ebc3

    SHA1

    1572a86f8c245a569c2a80ab0e74c3e1db78a2ba

    SHA256

    4315debc4219e3a49c62533abf7c82b5239b4cf6a652d452d28b9019ecb1dd4d

    SHA512

    2857bbe849b9146312e05adf168ee8fa980fac276ae6932bf91d2b1152d0316d2401f2467ccf539f9adeda260b00c9cbd91c747515d0838073212c9b15dbe2f1

  • C:\Users\Admin\AppData\Local\Temp\w6kywopdaysyd5fealrt2jzh\87myn9pwa2n1pfpdocm525s8.msi

    Filesize

    104.7MB

    MD5

    671e00c0b7e8a58a709467b6364bce4a

    SHA1

    d75192b8be4ecfc2b2a2bf7a9b39887b6806b3c9

    SHA256

    d64f01a383a02f2f76f4e537ba53fdeb9c06ad773fc33e2b3e20b58adabb465a

    SHA512

    7f889d526bcb3eab8633058012e9df515fb00ea9d09afb8d9da27aaf69548e9facc19f400506c586420b7f109905f7b5bfb0429c19f64e835d2eb094986a5143