Analysis

  • max time kernel
    147s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2023 02:14

General

  • Target

    fadc9824c68402143239f764c99bb82d.msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fadc9824c68402143239f764c99bb82d.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t9sagehw.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES821D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC821C.tmp"
          4⤵
            PID:660
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1968
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1468
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000054C" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:288

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6c7072.rbs

      Filesize

      7KB

      MD5

      14f65f2768b068c0ccb7bd9f236e524b

      SHA1

      cfd7f627846611de225ff011314222e8739f83a7

      SHA256

      dfd3785d0db086e7bb3773d2daa79b9f03c6b0fed09401acd08e6a7716695920

      SHA512

      e297ce59a36df63f1e8e26024fdb5819da2fb4926b4e5cf765ea3651e785d765d3ab7c5ff2d7e56e021f1ba15fb07d43d9230bf59e3f9e3876c5c4abece4752e

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

      Filesize

      2.2MB

      MD5

      4e0e85a590f4972732f1f0de81aa5507

      SHA1

      8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

      SHA256

      bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

      SHA512

      2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\RES821D.tmp

      Filesize

      1KB

      MD5

      616a1f596bae034d32c42761829e6deb

      SHA1

      95d74665a00e751348f0843e8d656790cae371aa

      SHA256

      2347c87fcb5250d3933190ada1541feeffd18195f7d83bfb102cf32c32b669c7

      SHA512

      714c737d4294a086174072735a578d399eb831dbd33be54e56a08f6331727bff78c1bce25ae4ffa02d6904d9c49628fb1c250f8f1ea2c93935cdb1ed4ea62b15

    • C:\Users\Admin\AppData\Local\Temp\t9sagehw.dll

      Filesize

      3KB

      MD5

      b5965168ca5e3f6b3daff66f4300b03d

      SHA1

      c8fbb44117be33cd4db74dcc028dcbf0b90f9e9b

      SHA256

      fdbab038c4f61a6703d0c3374b3337eb121917aa955c4722b498ca0e4744f5ae

      SHA512

      b7a16f6140bf64333242a5436348d6f58e53d8f313c3313736e7460c840d77916bb36362cb53a71695c3dea2009654156f40f8a7ad54aba616f4585e3c918aae

    • C:\Users\Admin\AppData\Local\Temp\t9sagehw.pdb

      Filesize

      7KB

      MD5

      246f0fafa454f280b09c30e2e4f6736a

      SHA1

      bb43d2c0b9454b4c8f90450ea3fea82de5ff3910

      SHA256

      5ce8350ffb9a0ad75076d4030c744c65cd48a2bb6ad35bd7dd15e6de970a7abf

      SHA512

      c9f2945a293941f7a510eaca00a11aada2b752d6b72cbb3c7856951d37ed9a91d5f13d72056ffeae0a29e2f29f03b1832fccaf4e67d567c2df0fb69e25b32c14

    • C:\Windows\Installer\6c7070.msi

      Filesize

      2.2MB

      MD5

      fadc9824c68402143239f764c99bb82d

      SHA1

      7eb72321c2c1e25b11c9d44229af22a179e27ce8

      SHA256

      9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

      SHA512

      916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC821C.tmp

      Filesize

      652B

      MD5

      17b2eec3f1b1217912d98b1e05ae48fd

      SHA1

      82cb352678edca57acb28d63c05da8bd8b9de419

      SHA256

      dc53936685eeab4d0646a0ef8585ee0d904c6906b8cda97e1c679cdc62c87d97

      SHA512

      5d172244eb4aeb5605f6d0d24d2ba8a0c3e803011cf3787edef5f9e41ce7e1a0b17ba94fe34c34a779f38d7ee71370eea018d209f010f94c2a2b20a62fb5ca83

    • \??\c:\Users\Admin\AppData\Local\Temp\t9sagehw.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\t9sagehw.cmdline

      Filesize

      309B

      MD5

      a122a3a4ac8d99a5fbf7ff2e0c8ab361

      SHA1

      f94d73acb751d06fae2b953f386c9eaecf579eed

      SHA256

      139c86042f8630f0a459222143dc4aecce37ace83489e6d4b83ee10efc0136ca

      SHA512

      3b4d8058edeeb58b3d00f4386bd4e67714ee9cd341dab4efad1511594d5522c8960b75348ee77ebc75ede58d8fb3afaf6714a2a8fdab06ae6d5ad75e5f3eb0dd

    • memory/624-95-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/624-94-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/624-93-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/624-92-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/624-88-0x0000000002310000-0x0000000002318000-memory.dmp

      Filesize

      32KB

    • memory/624-87-0x000000001B300000-0x000000001B5E2000-memory.dmp

      Filesize

      2.9MB

    • memory/624-110-0x00000000026F0000-0x00000000026F8000-memory.dmp

      Filesize

      32KB

    • memory/1968-91-0x00000000000F0000-0x00000000000F3000-memory.dmp

      Filesize

      12KB

    • memory/1968-79-0x0000000000320000-0x0000000000759000-memory.dmp

      Filesize

      4.2MB

    • memory/1968-164-0x0000000000320000-0x0000000000759000-memory.dmp

      Filesize

      4.2MB

    • memory/1968-169-0x0000000000320000-0x0000000000759000-memory.dmp

      Filesize

      4.2MB

    • memory/1968-172-0x0000000000320000-0x0000000000759000-memory.dmp

      Filesize

      4.2MB

    • memory/1968-179-0x0000000000320000-0x0000000000759000-memory.dmp

      Filesize

      4.2MB