Analysis
-
max time kernel
23s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
LTTS7 Engine Full Distribution.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LTTS7 Engine Full Distribution.exe
Resource
win10v2004-20230220-en
General
-
Target
LTTS7 Engine Full Distribution.exe
-
Size
14.8MB
-
MD5
19c968b35da20bf0acc3a00bc11e0132
-
SHA1
6336bf10960f8c8db4206d570ed65e7b15cc1742
-
SHA256
2bcaaae78e79d37e344760e51b3fabde018101ffabb2505daf47c5d5a35191ba
-
SHA512
37d6c31ac9f94d97101868ce47e2697e1d8b1fe2bd3f67862fb8ef8efd10f86a9abc631bd8895061c28b060d4a7b691797f7c12cc846d79a52bb6c14a3aa23d6
-
SSDEEP
393216:SA0TTnrZru9s8Gnj1aoE4s8Gnj1aoEfP05wUjVG7h:Svnr9us8EMoE4s8EMoEfP0SJ7
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS16096EE733434835B9AFC63492BD89B3_7_5_0.MSI LTTS7 Engine Full Distribution.exe File opened for modification C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS16096EE733434835B9AFC63492BD89B3_7_5_0.MSI LTTS7 Engine Full Distribution.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1296 msiexec.exe Token: SeTakeOwnershipPrivilege 1296 msiexec.exe Token: SeSecurityPrivilege 1296 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1788 msiexec.exe Token: SeLockMemoryPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeMachineAccountPrivilege 1788 msiexec.exe Token: SeTcbPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeLoadDriverPrivilege 1788 msiexec.exe Token: SeSystemProfilePrivilege 1788 msiexec.exe Token: SeSystemtimePrivilege 1788 msiexec.exe Token: SeProfSingleProcessPrivilege 1788 msiexec.exe Token: SeIncBasePriorityPrivilege 1788 msiexec.exe Token: SeCreatePagefilePrivilege 1788 msiexec.exe Token: SeCreatePermanentPrivilege 1788 msiexec.exe Token: SeBackupPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeDebugPrivilege 1788 msiexec.exe Token: SeAuditPrivilege 1788 msiexec.exe Token: SeSystemEnvironmentPrivilege 1788 msiexec.exe Token: SeChangeNotifyPrivilege 1788 msiexec.exe Token: SeRemoteShutdownPrivilege 1788 msiexec.exe Token: SeUndockPrivilege 1788 msiexec.exe Token: SeSyncAgentPrivilege 1788 msiexec.exe Token: SeEnableDelegationPrivilege 1788 msiexec.exe Token: SeManageVolumePrivilege 1788 msiexec.exe Token: SeImpersonatePrivilege 1788 msiexec.exe Token: SeCreateGlobalPrivilege 1788 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1788 msiexec.exe Token: SeLockMemoryPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeMachineAccountPrivilege 1788 msiexec.exe Token: SeTcbPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeLoadDriverPrivilege 1788 msiexec.exe Token: SeSystemProfilePrivilege 1788 msiexec.exe Token: SeSystemtimePrivilege 1788 msiexec.exe Token: SeProfSingleProcessPrivilege 1788 msiexec.exe Token: SeIncBasePriorityPrivilege 1788 msiexec.exe Token: SeCreatePagefilePrivilege 1788 msiexec.exe Token: SeCreatePermanentPrivilege 1788 msiexec.exe Token: SeBackupPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeDebugPrivilege 1788 msiexec.exe Token: SeAuditPrivilege 1788 msiexec.exe Token: SeSystemEnvironmentPrivilege 1788 msiexec.exe Token: SeChangeNotifyPrivilege 1788 msiexec.exe Token: SeRemoteShutdownPrivilege 1788 msiexec.exe Token: SeUndockPrivilege 1788 msiexec.exe Token: SeSyncAgentPrivilege 1788 msiexec.exe Token: SeEnableDelegationPrivilege 1788 msiexec.exe Token: SeManageVolumePrivilege 1788 msiexec.exe Token: SeImpersonatePrivilege 1788 msiexec.exe Token: SeCreateGlobalPrivilege 1788 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1348 wrote to memory of 1788 1348 LTTS7 Engine Full Distribution.exe 28 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30 PID 1296 wrote to memory of 328 1296 msiexec.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\LTTS7 Engine Full Distribution.exe"C:\Users\Admin\AppData\Local\Temp\LTTS7 Engine Full Distribution.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /L*v c:\LTTS_7-EngineFull.log /I "C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS16096EE733434835B9AFC63492BD89B3_7_5_0.MSI" WISE_SETUP_EXE_PATH="C:\Users\Admin\AppData\Local\Temp\LTTS7 Engine Full Distribution.exe"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1788
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5F290585B254A15EDB47A71443C25749 C2⤵PID:328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS16096EE733434835B9AFC63492BD89B3_7_5_0.MSI
Filesize14.8MB
MD596ee8ef36e2f2dd0b6ceae4f70aaeebd
SHA1e9783eb7bb3a04764efc7d43c9f9f2e6c04450a2
SHA2567bcf1e131c8cd3a92721b66733ca8bca66ab451eb5f5a31c907fdfca969c5872
SHA512df5204a0bfc34cda6dc93bb9c06238aa7118d6fd0b844c6a55e6dcb38137444aabd3ce4915fcef968d7c29e50b77641829613226b48dfa1ebf19079495a3970f
-
C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS16096EE733434835B9AFC63492BD89B3_7_5_0.MSI
Filesize14.8MB
MD596ee8ef36e2f2dd0b6ceae4f70aaeebd
SHA1e9783eb7bb3a04764efc7d43c9f9f2e6c04450a2
SHA2567bcf1e131c8cd3a92721b66733ca8bca66ab451eb5f5a31c907fdfca969c5872
SHA512df5204a0bfc34cda6dc93bb9c06238aa7118d6fd0b844c6a55e6dcb38137444aabd3ce4915fcef968d7c29e50b77641829613226b48dfa1ebf19079495a3970f