Analysis
-
max time kernel
508s -
max time network
400s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
RECIB_VNT-895.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RECIB_VNT-895.msi
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
~.exe
Resource
win7-20230220-en
General
-
Target
RECIB_VNT-895.msi
-
Size
3.2MB
-
MD5
815cba7b075fee8259e422b541dfe370
-
SHA1
c1b6d78ca160e849524e2f94727f695dbe3630e1
-
SHA256
f0f4b15613e70b2a0f8e754647f67cd38b9f3e1c49a1fc98af69d016b56ece48
-
SHA512
ae56fc184fb31ac1b3821bf37da12cf8dc38e1ba909ba7fe503a06c99d55f24f5ca5cd380af163a2de8a1cb7f235c429700647a4651157cd74d342295387d13e
-
SSDEEP
49152:7zfauo8Jc1dkX3rqlu01QZN5viOfL5yPFpeHAkdQVgQnJiG2TT2e/g7jizoL5lai:etrAOP1WDjFyPzvkd6n1QTn/M0
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 3752 MsiExec.exe -
resource yara_rule behavioral2/files/0x0006000000023177-157.dat upx behavioral2/files/0x0006000000023177-158.dat upx behavioral2/memory/3752-159-0x0000000062FA0000-0x0000000063925000-memory.dmp upx -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI6C7B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6D18.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{YCF1EX0S-3F2H-VKN3-Z986-CXI4KA9WTJVC} msiexec.exe File opened for modification C:\Windows\Installer\MSI6E53.tmp msiexec.exe File created C:\Windows\Installer\e56695d.msi msiexec.exe File opened for modification C:\Windows\Installer\e56695d.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI6A28.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6D68.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6EC1.tmp msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 msiexec.exe 1528 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4616 msiexec.exe Token: SeIncreaseQuotaPrivilege 4616 msiexec.exe Token: SeSecurityPrivilege 1528 msiexec.exe Token: SeCreateTokenPrivilege 4616 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4616 msiexec.exe Token: SeLockMemoryPrivilege 4616 msiexec.exe Token: SeIncreaseQuotaPrivilege 4616 msiexec.exe Token: SeMachineAccountPrivilege 4616 msiexec.exe Token: SeTcbPrivilege 4616 msiexec.exe Token: SeSecurityPrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeLoadDriverPrivilege 4616 msiexec.exe Token: SeSystemProfilePrivilege 4616 msiexec.exe Token: SeSystemtimePrivilege 4616 msiexec.exe Token: SeProfSingleProcessPrivilege 4616 msiexec.exe Token: SeIncBasePriorityPrivilege 4616 msiexec.exe Token: SeCreatePagefilePrivilege 4616 msiexec.exe Token: SeCreatePermanentPrivilege 4616 msiexec.exe Token: SeBackupPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeShutdownPrivilege 4616 msiexec.exe Token: SeDebugPrivilege 4616 msiexec.exe Token: SeAuditPrivilege 4616 msiexec.exe Token: SeSystemEnvironmentPrivilege 4616 msiexec.exe Token: SeChangeNotifyPrivilege 4616 msiexec.exe Token: SeRemoteShutdownPrivilege 4616 msiexec.exe Token: SeUndockPrivilege 4616 msiexec.exe Token: SeSyncAgentPrivilege 4616 msiexec.exe Token: SeEnableDelegationPrivilege 4616 msiexec.exe Token: SeManageVolumePrivilege 4616 msiexec.exe Token: SeImpersonatePrivilege 4616 msiexec.exe Token: SeCreateGlobalPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4616 msiexec.exe 4616 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4764 1528 msiexec.exe 84 PID 1528 wrote to memory of 4764 1528 msiexec.exe 84 PID 1528 wrote to memory of 4764 1528 msiexec.exe 84 PID 1528 wrote to memory of 3752 1528 msiexec.exe 85 PID 1528 wrote to memory of 3752 1528 msiexec.exe 85
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RECIB_VNT-895.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4616
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E2A0A30BC036DEE19EF9E3D41DDD5A622⤵
- Loads dropped DLL
PID:4764
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding B4D503AD64CEB65CEF02BA5826D6351C2⤵
- Loads dropped DLL
PID:3752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
559B
MD55b69061bd46ae9319eb7a691b0d4891f
SHA1d5e78acf57ee815a98ea5b3c3de2272cdff31255
SHA25668b0f40a39d4e840b27f3bac3160615ead28ab909e928f0d1fe699374dbbaa8e
SHA5123e02823600be53868a59f8a6dfc8214ac8cc374caf3ce3717762ed888fcf0544474b776c09907a36438e7a702b85935d9749682c424c973a8238090b777256ba
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
2.2MB
MD585c345e8c8f651490ee12b84f639e88d
SHA14ffefe1585ba65cd1e5d9c8a1c5b2e01f02e74b4
SHA256eaaa54dfde8ebeac59b260fc49e154be5570e0a48174666151bd1a9b3ee375c8
SHA512787c82b4192c9b72b712baf3552036837de4f418bed65190fc2329d7a09f37ecaf5b6b3d0b1406c6de938ae49c08eab845081b4381b73328cbe7b7ed879139e6
-
Filesize
2.2MB
MD585c345e8c8f651490ee12b84f639e88d
SHA14ffefe1585ba65cd1e5d9c8a1c5b2e01f02e74b4
SHA256eaaa54dfde8ebeac59b260fc49e154be5570e0a48174666151bd1a9b3ee375c8
SHA512787c82b4192c9b72b712baf3552036837de4f418bed65190fc2329d7a09f37ecaf5b6b3d0b1406c6de938ae49c08eab845081b4381b73328cbe7b7ed879139e6