Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 18:59

General

  • Target

    HWIDkey_Changer.exe

  • Size

    3.1MB

  • MD5

    e9354e124cd94c7de7c49ddd8a9fdc8e

  • SHA1

    cc4c887b678592015d1a69ac1b42222a012f0b5d

  • SHA256

    41b60776b642d8d3b40c68f7af83aee59490016189f547f708506fd1dff46c4c

  • SHA512

    269066f35e5c9b89b3440458e82f7d718c01525d1d0cee6188e8c7d475b29932c27973aa96f3fd6036eb4d507ccdde9f52f96bc2cde0347b8f2a176574402cfa

  • SSDEEP

    98304:2n0RraFH51QKghosKOhxBdNNvYbiVWKjG8OtDB:2ncm3Oj9NvqKjG8UB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWIDkey_Changer.exe
    "C:\Users\Admin\AppData\Local\Temp\HWIDkey_Changer.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1496
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2762C5A25A4C58AAC9A9A321DF642C64 C
      2⤵
      • Loads dropped DLL
      PID:4824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5F7987E\HWIDkey_Changer.msi

    Filesize

    1.8MB

    MD5

    f765783a5af98642a16080b3599fe892

    SHA1

    83228f1c274bbafe56912df83af4ceb1c9528afe

    SHA256

    8ca367d6fe03f1e5ca9f1005b2cb2df8d062cbdb2dac2bb288c8a9abcd7c77d7

    SHA512

    26add12994ee9b915290d84df5d6eabe1018a01cc1dbc9ddabd35b1f0247089e958bc0b3fc977b40d18ece6ae9dc8b14bd003373168f06b094a8a0d4cea862ad

  • C:\Users\Admin\AppData\Local\Temp\MSIB7AD.tmp

    Filesize

    373KB

    MD5

    f21b7303582dc0bf18fc734df1245043

    SHA1

    306de4746ec0fa5fd6f67127060640abb26f2a9e

    SHA256

    58e954de5dbec06179e7c749f321555520c8fcfbd9d3b05cc2b0110573a507d4

    SHA512

    0170f83e53e28ad09dcf00649aa7e4c3d9e8cead49b54971df594c60062f8f4ed5b3c18588942fc038337a1f2478fb039e213fbadb55fe5091fdaaf28d9911b4

  • C:\Users\Admin\AppData\Local\Temp\MSIB7AD.tmp

    Filesize

    373KB

    MD5

    f21b7303582dc0bf18fc734df1245043

    SHA1

    306de4746ec0fa5fd6f67127060640abb26f2a9e

    SHA256

    58e954de5dbec06179e7c749f321555520c8fcfbd9d3b05cc2b0110573a507d4

    SHA512

    0170f83e53e28ad09dcf00649aa7e4c3d9e8cead49b54971df594c60062f8f4ed5b3c18588942fc038337a1f2478fb039e213fbadb55fe5091fdaaf28d9911b4

  • C:\Users\Admin\AppData\Local\Temp\decoder.dll

    Filesize

    182KB

    MD5

    dca95f4411a1c7eeb221c095c9ef8196

    SHA1

    b6e7053dd667cf6b75dc08bb9c1b5fb0db403377

    SHA256

    51e89bfa578fdcdcb324f5caa2c36c5cc8f1dbd73658bed39445c57c722b91f4

    SHA512

    c21351975426f072f8c2c601e0cc88d66813e855a8537cabaf5ab13e8416d36278253a64d84654bd44ca80a912fb48d35787834c63a8275d1265bd435a84a0e0

  • C:\Users\Admin\AppData\Local\Temp\decoder.dll

    Filesize

    182KB

    MD5

    dca95f4411a1c7eeb221c095c9ef8196

    SHA1

    b6e7053dd667cf6b75dc08bb9c1b5fb0db403377

    SHA256

    51e89bfa578fdcdcb324f5caa2c36c5cc8f1dbd73658bed39445c57c722b91f4

    SHA512

    c21351975426f072f8c2c601e0cc88d66813e855a8537cabaf5ab13e8416d36278253a64d84654bd44ca80a912fb48d35787834c63a8275d1265bd435a84a0e0

  • C:\Users\Admin\AppData\Local\Temp\decoder.dll

    Filesize

    182KB

    MD5

    dca95f4411a1c7eeb221c095c9ef8196

    SHA1

    b6e7053dd667cf6b75dc08bb9c1b5fb0db403377

    SHA256

    51e89bfa578fdcdcb324f5caa2c36c5cc8f1dbd73658bed39445c57c722b91f4

    SHA512

    c21351975426f072f8c2c601e0cc88d66813e855a8537cabaf5ab13e8416d36278253a64d84654bd44ca80a912fb48d35787834c63a8275d1265bd435a84a0e0

  • C:\Users\Admin\AppData\Local\Temp\decoder.dll

    Filesize

    182KB

    MD5

    dca95f4411a1c7eeb221c095c9ef8196

    SHA1

    b6e7053dd667cf6b75dc08bb9c1b5fb0db403377

    SHA256

    51e89bfa578fdcdcb324f5caa2c36c5cc8f1dbd73658bed39445c57c722b91f4

    SHA512

    c21351975426f072f8c2c601e0cc88d66813e855a8537cabaf5ab13e8416d36278253a64d84654bd44ca80a912fb48d35787834c63a8275d1265bd435a84a0e0