Analysis

  • max time kernel
    40s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2023 10:44

General

  • Target

    3b553b9166004e78799c5096daa412f4a01563e3b02c44d93e35b2ce63bf922c.msi

  • Size

    4.1MB

  • MD5

    060f773f5b91ea96cfd5a21678d2a1ba

  • SHA1

    4de99e61485d8ddfd1dae963e17da24aa6312b86

  • SHA256

    3b553b9166004e78799c5096daa412f4a01563e3b02c44d93e35b2ce63bf922c

  • SHA512

    5a41f716d4ef24651e439068e57e7fe0b6ad079610bf582b53ce06c79d168350d730a059dc21fd40bc7a2ba4b0cdf71067ee7611b9681453e791debd6269e4f7

  • SSDEEP

    98304:4PKnw39kiUnMUYeg8F1HWMUKFln1hoDCQDnMpIgqCf:FwNJUnMUYetUKFZjoDCQDnMigqCf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\3b553b9166004e78799c5096daa412f4a01563e3b02c44d93e35b2ce63bf922c.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2024
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisapp.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\-nicxfrd.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE948.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE947.tmp"
          4⤵
            PID:1952
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:636
        • C:\Windows\system32\msiexec.exe
          /i "C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\"
          3⤵
          • Enumerates connected drives
          • Suspicious use of FindShellTrayWindow
          PID:676
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding DCA47132A3033181FCF871526EDF998E C
        2⤵
        • Loads dropped DLL
        PID:656
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:560
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E8" "0000000000000548"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:272

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6cdb26.rbs

      Filesize

      7KB

      MD5

      26fb45b5c531449eadc2e35608d3dbed

      SHA1

      0fee376ed9d205221dabbe42a8d71ca412d67796

      SHA256

      0b6689501a36f74fdd8fc8fb45d6c802fd867443092c856fe77fd55802e78eae

      SHA512

      2401f0d0e728d95ca3205de1912f47f088e2c87b1c6a27f83665de7629b31e7813e45d6c72a2bd8defcad34a61924d962213b729ba7fa43f772768b4da15ab15

    • C:\Users\Admin\AppData\Local\Temp\-nicxfrd.dll

      Filesize

      3KB

      MD5

      3eccfae05761d62151c88c2751a52b6e

      SHA1

      4ef14ac79adc6ffc4d7e74e03852cf1d6147e8c1

      SHA256

      9c004368a64f660245fce88cad48048a8566d59a4593f962aa2382fb8f14c393

      SHA512

      857471044c87e1107b16e9c2693e022bf3168a0207c5b2bd65998a438b8b1d258f304df9db06f4e32ad5eaa5c91b995cdae12778b842eb53f4a73834cbc0e40c

    • C:\Users\Admin\AppData\Local\Temp\-nicxfrd.pdb

      Filesize

      7KB

      MD5

      8052df13839b3a211ccd2a0ca30af31e

      SHA1

      4077d91d2d2f204c07f6cd9869c9a0fd4633991f

      SHA256

      a727e60bff7dcd243b05bd89e5813d44ef0a54ce704838ce24c0ad17bdea6cd4

      SHA512

      731729d7ffb1c01b99d68686a553c884db0e7afa0dc7791f24c52a9e4a29e00cf187a2b6cee6d4b1a930665b51158f7498c6a94e2951d12eada8cba862dcebdd

    • C:\Users\Admin\AppData\Local\Temp\MSIE85D.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\MSIF4DC.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisapp.ps1

      Filesize

      2.2MB

      MD5

      303ae282275206fde8818b3af6f1389d

      SHA1

      7df83cc687289effb4cf10fadb301c0e3ffea7e3

      SHA256

      f55f5c52da9b9518414577ec3767056090efae8b3fbbea2490eeffc6a455d024

      SHA512

      656328ee28c6588bed90b87a1844766671525294d3b3157183a670485b954db5faee338758690908ec47a52f7d19d40bc26c90943f7b81ef9b206464580a2ac3

    • C:\Users\Admin\AppData\Local\Temp\RESE948.tmp

      Filesize

      1KB

      MD5

      000b4ea0b0d63bc3a037ceac53657b1a

      SHA1

      f38cd457d180570e9fb1389575dd6e27d581e200

      SHA256

      e5d19e8700cf77ae7a0766d97a315b7d780586904498afd7069be837ffa80589

      SHA512

      20a367116b8d5f99083867f5b0ba922e361899dcda658a9945672cba79a6ff2f58ea46d26f366ad6b0216e868626d2c0e348fc876426ebe20388959bf3ffc9fa

    • C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi

      Filesize

      347KB

      MD5

      9e81383d5c5694835ebe9c853546b856

      SHA1

      a115c76e85960ae9c6dc505dad92ebb4e206567e

      SHA256

      8058c37115d53b13d0bdccfc5b1360364e2d1476873906f924deff84c3c73e00

      SHA512

      0566890e88a7e70c0d3dde84acfb9e5e24023af68acb9dc00884f3dc061613afc1d6b669c48fa4d600aa2fb5f92534c117d301159e416b7ac46391d419e554a2

    • C:\Windows\Installer\6cdb24.msi

      Filesize

      4.1MB

      MD5

      060f773f5b91ea96cfd5a21678d2a1ba

      SHA1

      4de99e61485d8ddfd1dae963e17da24aa6312b86

      SHA256

      3b553b9166004e78799c5096daa412f4a01563e3b02c44d93e35b2ce63bf922c

      SHA512

      5a41f716d4ef24651e439068e57e7fe0b6ad079610bf582b53ce06c79d168350d730a059dc21fd40bc7a2ba4b0cdf71067ee7611b9681453e791debd6269e4f7

    • \??\c:\Users\Admin\AppData\Local\Temp\-nicxfrd.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\-nicxfrd.cmdline

      Filesize

      309B

      MD5

      efc8ad5e3b694fc5b3a6ccf809067cef

      SHA1

      96e1067cd7bccdfb46725cd520bcb04044549539

      SHA256

      ff7fc4bfcc66da601fb69b5a8a8db41ba0566417829d12243f03250179a3d32f

      SHA512

      9a09034574b17a860bbfd6b6f0d9f126971d181e43c5ae8b5e1dcda2ee1ecda188e633f5fb3d6d80d626ee55e969123d5c7da3c581de0b75d2148ffe77f5088c

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCE947.tmp

      Filesize

      652B

      MD5

      59f35bd8b84b838bc963911ef297c12f

      SHA1

      1128980a8806cdc6217627fdf51ceb9a4b5dca62

      SHA256

      cb76c5ab3d1f05999cca0b72d081d34f14f23a762052d638e544e5bdef5f7a26

      SHA512

      f5f3f2a22bf824f276569f70c67da3828a859f8771da21057d473bb83446b0707445f73e4b0a9fe096862c5d0b7e694ea0f48d9bfb1af0fd31f327d77d9b9b19

    • \Users\Admin\AppData\Local\Temp\MSIE85D.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\MSIF4DC.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\install\decoder.dll

      Filesize

      105KB

      MD5

      143da6747fff236a473bdf6007629490

      SHA1

      aed2e6ecbd53ce1e281cee958b3c867f14c8262d

      SHA256

      75f59cfba8c75d7646a697609a9baefb3388b1b6e66db37c50924e3fcba68893

      SHA512

      d52393c33b647ad82adfa1c66f7adb3f8d148d71675fca7df62c974ef9c1d0b25092164fe9603184370f8ecdb5d00d1dd61dd626ec7655b94e03509aaf9fddd1

    • memory/1540-91-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/1540-92-0x0000000001F40000-0x0000000001F48000-memory.dmp

      Filesize

      32KB

    • memory/1540-206-0x0000000002770000-0x0000000002778000-memory.dmp

      Filesize

      32KB

    • memory/1540-93-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/1540-210-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/1540-211-0x0000000002400000-0x0000000002480000-memory.dmp

      Filesize

      512KB

    • memory/1540-90-0x000000001B280000-0x000000001B562000-memory.dmp

      Filesize

      2.9MB