Analysis

  • max time kernel
    135s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2023, 22:32

General

  • Target

    VirtualBox-7.0.2-154219-Win(1).exe

  • Size

    105.0MB

  • MD5

    5615443c79de81d4427fcb36a0048ec2

  • SHA1

    55df20799f7f33fd8a004fc9583aafba1ead4f90

  • SHA256

    41d4f3ba691da9d0c0e7a269f8d3fff7c843c3f8249131dcf112cb149499ec73

  • SHA512

    62787b79c5631e63c948a4eb1ef88eecae03b01b39f0134d975579f430f92e63443a5e05f04bacc7c2484f7b7eae60bb83fdbe4a1bd4fb301c314dedb3b54fdf

  • SSDEEP

    3145728:IJG3vysnMAfaW1IfA96jD6yMcU+VnBmK4:IJG36sMtuuBm

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 4 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.2-154219-Win(1).exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.2-154219-Win(1).exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4408
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 217902E6A5467B0DB7F3D373568080B4 C
      2⤵
      • Loads dropped DLL
      PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIF0AE.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF0AE.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF65C.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF65C.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF67C.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF67C.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF67C.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF69D.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\MSIF69D.tmp

    Filesize

    297KB

    MD5

    0520c53c6b3c32f59ca1463545ca2e00

    SHA1

    9991a1173ddf366b7ac361dab6c2e033b44fa8f1

    SHA256

    811ecb9409b347854bd70e5528a74b4706a8657151a8aea162982f12dd370a5b

    SHA512

    db2edc4be3cc82410de6e50eb01d3b46cd6c82566916907fa609c0dc7b3696b9bb667d8e9b87f35a1a6053c30bb8e1ff803b185cf76ce06d2fb9bebab346e710

  • C:\Users\Admin\AppData\Local\Temp\r27uuy1zqczicclb2x9b9swc\2blhop2xmfdokidqs8be34fn.msi

    Filesize

    104.4MB

    MD5

    545e2bb954f4791292bfc34a3cce9804

    SHA1

    630aa38b5b826b20264d281a7037299db4d42faf

    SHA256

    c7ad5a63e966d856ab37d0c903d151bc7db949a22e7c1a406eb2419b2abbcfaa

    SHA512

    730d902886b22f45ea323f2b353d04fe642da92c64f52469745b17454992857b371b49d1afbd32e51b0f41ecebeea41a1af5b3942923429e2a9989e030181870