Analysis

  • max time kernel
    305s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2023, 02:51

General

  • Target

    ffe0142116170841058ef82dad227da9bc6f4957f586ceba34b6cbdb466dae2b.msi

  • Size

    6.6MB

  • MD5

    2841262f80eb554d8ef5d1f98c535238

  • SHA1

    6661bd65f5161dc336db60e0f47ca2b12e4edfc6

  • SHA256

    ffe0142116170841058ef82dad227da9bc6f4957f586ceba34b6cbdb466dae2b

  • SHA512

    5349391a29e2fcc3a244a1e556b0fd55e67abb54fbcb7d76ea5cd3359b2d6ca237f38e2bcf0de070dadab62bec1341d017d71baf3032d2e4b9f284302268ac96

  • SSDEEP

    196608:yVAHMzCnSHiRU4InYCEKxsko8o0v+6KlZE2BrNGx6GnO:yKHWCSH1p5y6IE2dNDGnO

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ffe0142116170841058ef82dad227da9bc6f4957f586ceba34b6cbdb466dae2b.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 763CC4D05159D0C1CFF8FCA71CF51517
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.exe
        "C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.exe" "C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.ahk"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1888
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\6c48b8.rbs

    Filesize

    1KB

    MD5

    5648e98d08b82ebf8cfb934dc99fbb20

    SHA1

    a5deb083a60bb479fd0a6aa610d1d89e44c5a011

    SHA256

    0c02fa9c494d2e3e93f4e6d1c0a82dddc03e1f367f13e13b4e56e26dc095f84a

    SHA512

    79d1b6a096817efc795d502edde36e077828c5294e447ad0ff235faeb477040fa4da9e120efcb15f15f686fc8d4de325d898c7d116483b1e2e4dd11347ed90cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    84b8f7bb5a371e650e7b24f21d1cd56d

    SHA1

    2967a9d54a9e32850ce4b35473052f93350e8797

    SHA256

    df74677c580779dc797e32821524ce97c42f6f0a2e6077ac324b1d49ced3de05

    SHA512

    6f9d1c8999cbf01259226d10a842da7b3c1eaa09104f9be7c15e845f365f8e53262156e729e2b9c40ee7a524acc99a0527bc1e9c779042724cb1f4e5ccdbb383

  • C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.ahk

    Filesize

    193B

    MD5

    adbe26c9f3f3a8e44bb5b6d78966d0f2

    SHA1

    390ddc65992d2d673d00e030e8f8d80393a83138

    SHA256

    21bef7fc86d149cb883eebb84ea5b40f4e3631080dd201a99f52b77777475206

    SHA512

    98fac039a67b882159d18a03136a1f557929badcbd9cd32390f9b5c45bf0ea7a49bc0483e1d560e5f70b53875b0f1969dbbc0fcca51e0cf6b4ceeb5a7f343ce8

  • C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.exe

    Filesize

    889KB

    MD5

    03c469798bf1827d989f09f346ce95f7

    SHA1

    05e491bc1b8fbfbfdca24b565f2464137f30691e

    SHA256

    de87c8713fac002b0b0a0f9b02c4e3ebcccf65282a22f5ab5912a9da00f35c2a

    SHA512

    d95aed75dd7b2470d4e5052b4b494ad9efbb9eee42c63cf0b38f1d0275ff7b1bb8ee4cbc69d1bb219dbbf33ad3b01cea97f87fa8fe69be7f943aa4417a603238

  • C:\Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.exe

    Filesize

    889KB

    MD5

    03c469798bf1827d989f09f346ce95f7

    SHA1

    05e491bc1b8fbfbfdca24b565f2464137f30691e

    SHA256

    de87c8713fac002b0b0a0f9b02c4e3ebcccf65282a22f5ab5912a9da00f35c2a

    SHA512

    d95aed75dd7b2470d4e5052b4b494ad9efbb9eee42c63cf0b38f1d0275ff7b1bb8ee4cbc69d1bb219dbbf33ad3b01cea97f87fa8fe69be7f943aa4417a603238

  • C:\Users\Admin\AppData\Local\AitLqTR3n\WRIXRPIWIZ.qHV

    Filesize

    11.4MB

    MD5

    7afe39d86c49399932b3f905c20da7f6

    SHA1

    61b617998fceb146c9d2a5d26623f267dca05afd

    SHA256

    870ce33b028ff3554f7d7fdef668bab7f71fda0b275978e0531bd075e854904c

    SHA512

    d16cf7a5eb5713775a73cdf32db6c46e55f1cb3f0c9cc0f53d245bacf988f50b7a336274830b4c4df4ad8def6d5df77327b3deb2be7b62e258fd22fc59f11bd6

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\Cab913B.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar92C8.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Windows\Installer\MSI4941.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI4D57.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI4DE5.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI4DE5.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI53DF.tmp

    Filesize

    6.0MB

    MD5

    c64a65f28f31ce44df497b4abd23e031

    SHA1

    c310ac295ddb4bb1add4d0703970d195821300a9

    SHA256

    e13360e31779d0fd4df2748ded8785f58a2f1ff1c1bb174d075b65d0d5127335

    SHA512

    e32219a77142dc99cdd175df1e57e51d40d3d81cad22431999d2ef3b0a47638730b38cb75dc873f1b34e9a47405591144adb8c258f3a902fee2dd74469454b0b

  • \Users\Admin\AppData\Local\AitLqTR3n\4Xm.M.exe

    Filesize

    889KB

    MD5

    03c469798bf1827d989f09f346ce95f7

    SHA1

    05e491bc1b8fbfbfdca24b565f2464137f30691e

    SHA256

    de87c8713fac002b0b0a0f9b02c4e3ebcccf65282a22f5ab5912a9da00f35c2a

    SHA512

    d95aed75dd7b2470d4e5052b4b494ad9efbb9eee42c63cf0b38f1d0275ff7b1bb8ee4cbc69d1bb219dbbf33ad3b01cea97f87fa8fe69be7f943aa4417a603238

  • \Users\Admin\AppData\Local\AitLqTR3n\WRIXRPIWIZ.qHV

    Filesize

    11.4MB

    MD5

    7afe39d86c49399932b3f905c20da7f6

    SHA1

    61b617998fceb146c9d2a5d26623f267dca05afd

    SHA256

    870ce33b028ff3554f7d7fdef668bab7f71fda0b275978e0531bd075e854904c

    SHA512

    d16cf7a5eb5713775a73cdf32db6c46e55f1cb3f0c9cc0f53d245bacf988f50b7a336274830b4c4df4ad8def6d5df77327b3deb2be7b62e258fd22fc59f11bd6

  • \Users\Admin\AppData\Local\Temp\124c5dd1.dll

    Filesize

    8KB

    MD5

    d8f4ab8284f0fda871d6834e24bc6f37

    SHA1

    641948e44a1dcfd0ef68910768eb4b1ea6b49d10

    SHA256

    c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912

    SHA512

    f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0

  • \Windows\Installer\MSI4941.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI4D57.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI4DE5.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI53DF.tmp

    Filesize

    6.0MB

    MD5

    c64a65f28f31ce44df497b4abd23e031

    SHA1

    c310ac295ddb4bb1add4d0703970d195821300a9

    SHA256

    e13360e31779d0fd4df2748ded8785f58a2f1ff1c1bb174d075b65d0d5127335

    SHA512

    e32219a77142dc99cdd175df1e57e51d40d3d81cad22431999d2ef3b0a47638730b38cb75dc873f1b34e9a47405591144adb8c258f3a902fee2dd74469454b0b

  • memory/1176-78-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/1176-82-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-91-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/1176-92-0x0000000002640000-0x0000000003464000-memory.dmp

    Filesize

    14.1MB

  • memory/1176-94-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-89-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/1176-88-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/1176-87-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/1176-85-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1176-179-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-84-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1176-74-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1176-81-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-79-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/1176-76-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1176-75-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1176-71-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-72-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-73-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-90-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/1588-254-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1888-201-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-204-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-206-0x0000000061E00000-0x0000000061EC1000-memory.dmp

    Filesize

    772KB

  • memory/1888-203-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-227-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-229-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1888-230-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-233-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-202-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-247-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-252-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-200-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-199-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-198-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-381-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-388-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-395-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-396-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB

  • memory/1888-397-0x0000000003200000-0x0000000004F37000-memory.dmp

    Filesize

    29.2MB