Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2023, 14:24

General

  • Target

    f_4_T_u_r_4_34536_45645_3345_wo.msi

  • Size

    6.9MB

  • MD5

    3987c0f3ab2a1bb65a0d5e9208b62d46

  • SHA1

    6e7013e293c5a0910666ea488868d9216b2bb791

  • SHA256

    61b65fe68d4a0acbcb1ea4512ebdc5c7a41aee8a3bf848cb52657738a6033156

  • SHA512

    dc6a8d5aaaaa40c5feefbad29170933ea4764507d09655054d036295876f7957a2fb7a87964bee8088e4a01eaf35bbe60d1b95ae316f19458a478e0504a01732

  • SSDEEP

    196608:2oWn7jJ96d9Beq0OdBL9lPy9tXL5pwRD:2oOSd9wHOnLDq7XL5p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f_4_T_u_r_4_34536_45645_3345_wo.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1052
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24FCB786D931A534C9893281748C43B6
      2⤵
      • Loads dropped DLL
      PID:1392
    • C:\Users\Admin\AppData\Roaming\abd1ª.exe
      "C:\Users\Admin\AppData\Roaming\abd1ª.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\6c0d4d.rbs

    Filesize

    1KB

    MD5

    80c629b580b2060349f9655796e492d6

    SHA1

    c2ee9aeeedfc6d684924b77694407bb017669ea9

    SHA256

    c10a1ff7f7f92be76826c8039d0aaafbfe5d04ab8a54e094a59400e5c7173839

    SHA512

    659320507636400088eba32801d3d8cf2880aebd05ac167699f10f7298b2bb7340a81b1b9f17880bf2afdc57b6e2c6399aa069622c69b64ea3e69fc4771cb93a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6b51c20f2c6a7f23cbca69de75863129

    SHA1

    fb477a27e3be1665e742a73991f4bd983542a041

    SHA256

    8008704f73f580b5ec48ee8446b17863ba7a258ce81cf1edf6fdb15a684dd8a9

    SHA512

    906686396010d60b3f87f3eaba01056f79c409cdf5a8b493fe455ba95595e315e31d2994621d05ed50f87c6bdacd9b592597c561080b8e905af9234d33c7e26a

  • C:\Users\Admin\AppData\Local\Temp\Cab516D.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\MSIc0aac.LOG

    Filesize

    20KB

    MD5

    001df423b06a8ffa51f55a0e61ef29fc

    SHA1

    9c6b32a4253e71903da860aaf30bae4101f7cf34

    SHA256

    7097220ff86f7bb0560f308cb9b5a0060fbaa302b15ee5479a03c9d989fe83fa

    SHA512

    1db0613aa2b3ba6def7ebbbc728d78526f2fff632c982980f16321ae5309fc7899cc89de6aad766c585f6686275a3e53a83ed7f5b757c2400e8ef4b10a6522f7

  • C:\Users\Admin\AppData\Local\Temp\Tar530A.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\WebUI.dll

    Filesize

    5.2MB

    MD5

    b407f1ee6dd56acfba29cf140109447b

    SHA1

    9b7c1a62a1480d496715b340c56f260b2a2ea2f7

    SHA256

    99ec15c63820e40dbe409aeeba542d4b0c23c6a24af878cd10e4b4726259db99

    SHA512

    8a4aa202b8fb1bbe8f98bb614cf81e82ef007435cb9ad7ed5838d7e86fed6a600738a631b3864ca6ddffb69972f74c911650198be70d5d5665ca2001bee1f71b

  • C:\Users\Admin\AppData\Roaming\abd1ª.exe

    Filesize

    1.8MB

    MD5

    ceef4762b36067f1d32a0db621ee967e

    SHA1

    d23da38df6b0fca8c524b641c59c700a2338648e

    SHA256

    efb6169bbb869a849afb91184a75b906fe509cbf6e672b6b4f3311c02343bbbb

    SHA512

    6301871a95e48f2873b60c706757af38d956c895112f14c28eac4c4a83456a1acdf15d0a5b1cd35f267a4149dc78b2469c427bde6a1bf5aa99de51d5e824d1b3

  • C:\Users\Admin\AppData\Roaming\abd1ª.exe

    Filesize

    1.8MB

    MD5

    ceef4762b36067f1d32a0db621ee967e

    SHA1

    d23da38df6b0fca8c524b641c59c700a2338648e

    SHA256

    efb6169bbb869a849afb91184a75b906fe509cbf6e672b6b4f3311c02343bbbb

    SHA512

    6301871a95e48f2873b60c706757af38d956c895112f14c28eac4c4a83456a1acdf15d0a5b1cd35f267a4149dc78b2469c427bde6a1bf5aa99de51d5e824d1b3

  • C:\Windows\Installer\MSI10A6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • C:\Windows\Installer\MSI10A6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • C:\Windows\Installer\MSIDE6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • C:\Windows\Installer\MSIFCB.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • \Users\Admin\AppData\Roaming\WebUI.dll

    Filesize

    5.2MB

    MD5

    b407f1ee6dd56acfba29cf140109447b

    SHA1

    9b7c1a62a1480d496715b340c56f260b2a2ea2f7

    SHA256

    99ec15c63820e40dbe409aeeba542d4b0c23c6a24af878cd10e4b4726259db99

    SHA512

    8a4aa202b8fb1bbe8f98bb614cf81e82ef007435cb9ad7ed5838d7e86fed6a600738a631b3864ca6ddffb69972f74c911650198be70d5d5665ca2001bee1f71b

  • \Windows\Installer\MSI10A6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • \Windows\Installer\MSIDE6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • \Windows\Installer\MSIFCB.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • memory/1496-110-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1496-128-0x0000000074CF0000-0x0000000074CFB000-memory.dmp

    Filesize

    44KB

  • memory/1496-100-0x0000000000260000-0x0000000000265000-memory.dmp

    Filesize

    20KB

  • memory/1496-99-0x0000000075B00000-0x0000000075BCC000-memory.dmp

    Filesize

    816KB

  • memory/1496-101-0x0000000075280000-0x000000007530F000-memory.dmp

    Filesize

    572KB

  • memory/1496-102-0x0000000075740000-0x000000007589C000-memory.dmp

    Filesize

    1.4MB

  • memory/1496-103-0x0000000074DF0000-0x0000000074E09000-memory.dmp

    Filesize

    100KB

  • memory/1496-106-0x0000000076270000-0x00000000762A5000-memory.dmp

    Filesize

    212KB

  • memory/1496-107-0x0000000074D00000-0x0000000074D38000-memory.dmp

    Filesize

    224KB

  • memory/1496-108-0x0000000074CD0000-0x0000000074CEC000-memory.dmp

    Filesize

    112KB

  • memory/1496-109-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/1496-95-0x0000000075DD0000-0x0000000075E7C000-memory.dmp

    Filesize

    688KB

  • memory/1496-111-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/1496-112-0x00000000755F0000-0x0000000075637000-memory.dmp

    Filesize

    284KB

  • memory/1496-114-0x0000000075740000-0x000000007589C000-memory.dmp

    Filesize

    1.4MB

  • memory/1496-113-0x0000000075280000-0x000000007530F000-memory.dmp

    Filesize

    572KB

  • memory/1496-115-0x0000000075DD0000-0x0000000075E7C000-memory.dmp

    Filesize

    688KB

  • memory/1496-119-0x0000000076250000-0x0000000076256000-memory.dmp

    Filesize

    24KB

  • memory/1496-118-0x0000000076270000-0x00000000762A5000-memory.dmp

    Filesize

    212KB

  • memory/1496-120-0x0000000071850000-0x0000000073A88000-memory.dmp

    Filesize

    34.2MB

  • memory/1496-124-0x0000000074E20000-0x0000000074E23000-memory.dmp

    Filesize

    12KB

  • memory/1496-96-0x00000000755F0000-0x0000000075637000-memory.dmp

    Filesize

    284KB

  • memory/1496-126-0x0000000076020000-0x0000000076023000-memory.dmp

    Filesize

    12KB

  • memory/1496-122-0x0000000075B00000-0x0000000075BCC000-memory.dmp

    Filesize

    816KB

  • memory/1496-129-0x0000000074CD0000-0x0000000074CEC000-memory.dmp

    Filesize

    112KB

  • memory/1496-130-0x0000000074CC0000-0x0000000074CC7000-memory.dmp

    Filesize

    28KB

  • memory/1496-93-0x0000000000610000-0x00000000006B0000-memory.dmp

    Filesize

    640KB

  • memory/1496-94-0x0000000000240000-0x0000000000244000-memory.dmp

    Filesize

    16KB

  • memory/1496-91-0x0000000071850000-0x0000000073A88000-memory.dmp

    Filesize

    34.2MB

  • memory/1496-86-0x0000000071850000-0x0000000073A88000-memory.dmp

    Filesize

    34.2MB

  • memory/1496-211-0x0000000071850000-0x0000000073A88000-memory.dmp

    Filesize

    34.2MB

  • memory/1496-212-0x0000000000610000-0x00000000006B0000-memory.dmp

    Filesize

    640KB

  • memory/1496-214-0x00000000755F0000-0x0000000075637000-memory.dmp

    Filesize

    284KB

  • memory/1496-216-0x0000000075740000-0x000000007589C000-memory.dmp

    Filesize

    1.4MB

  • memory/1496-217-0x0000000075DD0000-0x0000000075E7C000-memory.dmp

    Filesize

    688KB

  • memory/1496-220-0x0000000076270000-0x00000000762A5000-memory.dmp

    Filesize

    212KB

  • memory/1496-229-0x0000000074D00000-0x0000000074D38000-memory.dmp

    Filesize

    224KB

  • memory/1496-233-0x0000000000260000-0x0000000000265000-memory.dmp

    Filesize

    20KB

  • memory/1496-238-0x0000000075740000-0x000000007589C000-memory.dmp

    Filesize

    1.4MB

  • memory/1496-239-0x0000000075DD0000-0x0000000075E7C000-memory.dmp

    Filesize

    688KB

  • memory/1496-244-0x0000000071850000-0x0000000073A88000-memory.dmp

    Filesize

    34.2MB