Analysis

  • max time kernel
    61s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2023 09:18

General

  • Target

    d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f.msi

  • Size

    4.2MB

  • MD5

    e4a5383ac32d5642eaf2c7406a0f1c0f

  • SHA1

    3e5637d253c40aefdb0465df15bc057ed5c26186

  • SHA256

    d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f

  • SHA512

    ed7ae40e2475ca2bdeefbfb3f15df6e93c8c7d7781b31c2b0c5cab99ff8fec0487f7975b406eebb8117aca2038a11a658d129c32d4147275fd7770c1bfa28da8

  • SSDEEP

    98304:lPKnw39kiUnMUYeg8F1HWMUKFln1RiZmSZ9J1zYfWwG:4wNJUnMUYetUKFZnpSf1w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1408
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisco2.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vabq_jy9.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES652B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC652A.tmp"
          4⤵
            PID:1032
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\system32\msiexec.exe
          /i "C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\"
          3⤵
          • Enumerates connected drives
          • Suspicious use of FindShellTrayWindow
          PID:1680
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding FCA7ADDDBBF8F849D4CE038E05C481C1 C
        2⤵
        • Loads dropped DLL
        PID:1260
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1080
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000005C" "00000000000005AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1656

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6c5821.rbs

      Filesize

      7KB

      MD5

      95128461173385507b4ceaf17f2d825a

      SHA1

      9f537ef737c036df2adb2e9268fbe2533dae9b63

      SHA256

      12981edf86e7d2d24f17e7cc2d51bb2eaa4ba82b6d358d3266b11b57a683c54f

      SHA512

      8d7200e10aa0f91207ec7d2489f4dee27568bf31e327eb7a9a5c8b8e1b2f50f82d5c6b3665a875cfcc394a9014e6a8ff5a81fbcaf84273498acf5106f87f8c53

    • C:\Users\Admin\AppData\Local\Temp\MSI621E.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\MSI6D36.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisco2.ps1

      Filesize

      2.2MB

      MD5

      7708f4d0a27fcb9a315e0e2b9fa24248

      SHA1

      498ac3d0ddf4b19f6f7d3dacf03c4e2fbf8f993b

      SHA256

      0afe02415b9523c9f840be11d9561d1c07b41ac1f7b803b7112608ae8db29950

      SHA512

      af6b285e63c9c3db98d35492ff03ec08196c859f508834fc39d6b76283447f493bc721dfa15a2ad777c6e8547ade639f9379ac1cefa54e226096fb0aa4956f54

    • C:\Users\Admin\AppData\Local\Temp\RES652B.tmp

      Filesize

      1KB

      MD5

      c4608518d896310af88b401981493827

      SHA1

      4c67176ac6fb7dc18faa7d6b9af43260ca77d23e

      SHA256

      0b20afb95c173d82c0001aa95a7a03db963bbe9bd88b97cd9d53295f71688f9b

      SHA512

      124c474d64415c19eed3529c35399fcf047bd2582fe10d077e5809d3a5e7603529da4140471cee1a0b651f780f15c8a29d3dc24790069a8e06e0449b9471ed97

    • C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi

      Filesize

      347KB

      MD5

      9e81383d5c5694835ebe9c853546b856

      SHA1

      a115c76e85960ae9c6dc505dad92ebb4e206567e

      SHA256

      8058c37115d53b13d0bdccfc5b1360364e2d1476873906f924deff84c3c73e00

      SHA512

      0566890e88a7e70c0d3dde84acfb9e5e24023af68acb9dc00884f3dc061613afc1d6b669c48fa4d600aa2fb5f92534c117d301159e416b7ac46391d419e554a2

    • C:\Users\Admin\AppData\Local\Temp\vabq_jy9.dll

      Filesize

      3KB

      MD5

      f0dede2e052d9c2c48cd43913771e951

      SHA1

      a90aa125b48f6c7741eb5693ab641fed9ca0bdf0

      SHA256

      2af74cb28e1a68bb73ce2bbaf0f61b7fafaca11a32e382b7cba5f29b29af2e7a

      SHA512

      2dffe637306bbdb40d4a0ce6fbe0932de971120e5a25265f14e85abd53ef2326cf0246d0491c632ee2b9a486c5011dd69c15e99b716f6ff6d6244c63b2584024

    • C:\Users\Admin\AppData\Local\Temp\vabq_jy9.pdb

      Filesize

      7KB

      MD5

      7e81ba789319387037381c57a1745c10

      SHA1

      5ebac758e4dfa5a98b6ed746508f85c5491341d8

      SHA256

      6a0f069ad515480481875d951ee0ca29a13853acf9cd912ecc7bf2907ce10340

      SHA512

      d510dd55e2274c2a204c583be31dbf8abe5fddcb8529ef63c648a98cc1ffd1e14bed1d54509022a10fa0eb851e0d729779630db7f4dca9f02ac32a2a887d136a

    • C:\Windows\Installer\6c581f.msi

      Filesize

      4.2MB

      MD5

      e4a5383ac32d5642eaf2c7406a0f1c0f

      SHA1

      3e5637d253c40aefdb0465df15bc057ed5c26186

      SHA256

      d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f

      SHA512

      ed7ae40e2475ca2bdeefbfb3f15df6e93c8c7d7781b31c2b0c5cab99ff8fec0487f7975b406eebb8117aca2038a11a658d129c32d4147275fd7770c1bfa28da8

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC652A.tmp

      Filesize

      652B

      MD5

      fad22eef1972aef685731a8895b80ba2

      SHA1

      fa1afeea12efdae7ada5675a059d0eeb048cb334

      SHA256

      ced1596928a23049d9fd42ca47220530159f328c3ee8efe6f40521886dbd4599

      SHA512

      b981fa0a8fa775a8700ed71b3438c75a61c1313f65b89098d8fbe6f4a4bb9b647e1c10199c2588fd38a2138dc1a951d58bfd0a493d87273b9f9451186d8a3eb8

    • \??\c:\Users\Admin\AppData\Local\Temp\vabq_jy9.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\vabq_jy9.cmdline

      Filesize

      309B

      MD5

      52880c5fc50a16cdd294019bf96c3c23

      SHA1

      665ca800b052eabae4d6b8cdb293382438cb4fd1

      SHA256

      63a0d7e01d69151faddd9151029f811b40bd6b67103e7368dbfa4899759a2c12

      SHA512

      4db00e513393ab61412e24c5fbadfb879e55e7d01bf9d059e2f459fd744881ef0ef3605b6704cf2e75841c495a1bd195346a666beb30787617e3045b689ea750

    • \Users\Admin\AppData\Local\Temp\MSI621E.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\MSI6D36.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\install\decoder.dll

      Filesize

      105KB

      MD5

      143da6747fff236a473bdf6007629490

      SHA1

      aed2e6ecbd53ce1e281cee958b3c867f14c8262d

      SHA256

      75f59cfba8c75d7646a697609a9baefb3388b1b6e66db37c50924e3fcba68893

      SHA512

      d52393c33b647ad82adfa1c66f7adb3f8d148d71675fca7df62c974ef9c1d0b25092164fe9603184370f8ecdb5d00d1dd61dd626ec7655b94e03509aaf9fddd1

    • memory/1964-198-0x0000000002780000-0x0000000002800000-memory.dmp

      Filesize

      512KB

    • memory/1964-202-0x0000000002780000-0x0000000002800000-memory.dmp

      Filesize

      512KB

    • memory/1964-203-0x0000000002780000-0x0000000002800000-memory.dmp

      Filesize

      512KB

    • memory/1964-205-0x0000000002750000-0x0000000002758000-memory.dmp

      Filesize

      32KB

    • memory/1964-184-0x0000000001E90000-0x0000000001E98000-memory.dmp

      Filesize

      32KB

    • memory/1964-183-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

      Filesize

      2.9MB