Analysis

  • max time kernel
    33s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2023, 17:22

General

  • Target

    Arm_001824166751_373861779141603786019168618121690839645.msi

  • Size

    829KB

  • MD5

    29dd3123671e78c1c5a72f45768b80ee

  • SHA1

    48ece59a018b836ff3f32b7f4666d9589ba5805c

  • SHA256

    5c65169a0f859006aff88449c19d1d2b1d6ac945206c108c88d98c6cae1486c2

  • SHA512

    44f347a5209b626a1f430c6f5f0d5214d4b4703248d957d057aadf711c0a4b88c9221c3c5a69dac9bc08cc5e534c0d15cf40dcf0cd04418daee31576900e7f37

  • SSDEEP

    12288:qtBYy4b2WGwp6zceQ3ku67mjjulfpWAfWkHxncU2UiH+HbJtgFU3+0w7OLCYvC:qtBYya8c52JvOnHyJouA7OWYK

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 11 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Arm_001824166751_373861779141603786019168618121690839645.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1496
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86C03854471B05A346F3F5A5DB7629DD C
      2⤵
      • Loads dropped DLL
      PID:428
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 4DDFDB59D117DCAA7DD2BBCCD9185343 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:1716
  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
    "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
    1⤵
    • Executes dropped EXE
    PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\6c18e1.rbs

    Filesize

    8KB

    MD5

    d976604e06273939ab4ddb46e733e8ba

    SHA1

    fd796766ee2d45d2cb671e61ee7d37f76be7abf7

    SHA256

    07d5532542ed477419078ff21f581e6cd63c6269a4176a52e3a2cee0edebf61e

    SHA512

    6f15aa27b926ec6493a46051bcdd61edf7684017a57123772a21844df2a6149a7a7e80864612118f124747aa620f89f9ff7c7e5b90916231a9327b40c1994c64

  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe

    Filesize

    80KB

    MD5

    f2ceee9abbcef207acb103215ac28bc2

    SHA1

    54684acd69cf8cc3649993a5db2953330e5601f4

    SHA256

    f8f8b8af6317926d7ac0ca2ca23628b2c69327a2792d58d3328443c5ed9514e9

    SHA512

    beb6295fbf55b2409724a3b42d110e6ec91674b0553585c9c3ab9b962bd3efdee351ee91c1578ec3c6cee49222f60ce3d61bfcb00340386a7e47cf331f085ff9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

    Filesize

    1KB

    MD5

    5ecb29409ef0cabba0a15e655dd01bc5

    SHA1

    79fe2dcf14b1862a97b8dd8d4ef394af3514d761

    SHA256

    3ef0c693aac41fa229c696ac0a0a091eb3a7cfec8f0546485561b1321d734044

    SHA512

    640c45733854a25cb1297605b568273d649d62be43497ee682acb81e8a19c4ad1dd5d453d7902bcdd3b5a07c8cf5659fe0172039211c7f69a22300fae2a7b77e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

    Filesize

    1KB

    MD5

    9e7035f0e5196e606dfeeb2dfb29772d

    SHA1

    371906996758b364bddaaffe242ada331e72e93c

    SHA256

    66c04839917c720529850ee6bdc40942538e5cad07a4a379e48078eaadce6fbd

    SHA512

    6f0505a584799befc57afb44bf4c9007af7a57338bff6f292f22d4682a05a33b61bf28693f67a931ba2209917e42281b445033e55dac4ad122b40c0a298e3726

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

    Filesize

    398B

    MD5

    ac8436084295e73070f45b91ab891a90

    SHA1

    9452a22fa1c1e3aed225637e30746e377562c726

    SHA256

    b35061908174cfa12ee7977f47009d2323d18d72d5ca8ad3e6ec9133e0271569

    SHA512

    4c939a5e80b15ec64c0df368eea4eb49821c51d0aba2ca89294c5b979dee2aca3c40a11b58a8fd796e745315d22ced91b2a183ded8601fcd8a4b9d14c7b35a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

    Filesize

    392B

    MD5

    7627a5ac6a0614a75714dc3f6e0f9e53

    SHA1

    c90e8f69daf3fc1ba4da896041f84d8fd4ccb7e3

    SHA256

    a5b86f17c419dcc49a0294427f15337299ae7fd4a3fe402c932792af741e59a8

    SHA512

    e140d015af9bdbeb31cb0bd6ae18ea2c20aec80682483830a18464a41777688d64cbc134d72d8315d67448a05b02ab7ff429b9ce4fe64caca68734c3f352223a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50cb89a972c587c143e532f656ff8e88

    SHA1

    fb99742126bc80e54487bb32502a60929d6280c4

    SHA256

    0d062662617b8da573761c43badb3acf7f153e1926dab97bcb04f255a732674b

    SHA512

    7f30aebd9b6d6bf7af931ca61dba14bf389ea84989ca9d4bae97159527441020d28cb645fe29b2089b0ca633eecbc8df188b36b3a4f4df91a81055a8c06a41c4

  • C:\Users\Admin\AppData\Local\Temp\MSIA96.tmp

    Filesize

    96KB

    MD5

    fadffef98d0f28368b843c6e9afd9782

    SHA1

    578101fadf1034c4a928b978260b120b740cdfb9

    SHA256

    73f7e51214b775421f6679acabc51ac1d34b4271116f5f3dd3426df50d214886

    SHA512

    ba5ab56a7e5d2e54fc304d77c78a14b35b187fdd95a090d39193b3da6ab40ef1b38c3cd56b160edceded3d622c0b645376efaf3df8fc8c437f448f91587f3233

  • C:\Users\Admin\AppData\Local\Temp\Tar601.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Windows\Installer\6c18df.msi

    Filesize

    829KB

    MD5

    29dd3123671e78c1c5a72f45768b80ee

    SHA1

    48ece59a018b836ff3f32b7f4666d9589ba5805c

    SHA256

    5c65169a0f859006aff88449c19d1d2b1d6ac945206c108c88d98c6cae1486c2

    SHA512

    44f347a5209b626a1f430c6f5f0d5214d4b4703248d957d057aadf711c0a4b88c9221c3c5a69dac9bc08cc5e534c0d15cf40dcf0cd04418daee31576900e7f37

  • C:\Windows\Installer\MSI211D.tmp

    Filesize

    95KB

    MD5

    a5c8b1a35c5dae0296ea31087ad70824

    SHA1

    93b9b87c2a9b67c99c587bea51f9f549861d0e16

    SHA256

    4b9e66e5da895ab2b937f9732573917e333a32d06862c3b0ce157252ae3a4a6c

    SHA512

    6bf87519fd54a98f8e9e5bd69545232f8791a959e8c2d42fc856151a6dda66812031a402e96300857420161a317baf28b7c51c820d198531b01a80d2f90ae0f1

  • C:\Windows\Installer\MSI21BA.tmp

    Filesize

    95KB

    MD5

    a5c8b1a35c5dae0296ea31087ad70824

    SHA1

    93b9b87c2a9b67c99c587bea51f9f549861d0e16

    SHA256

    4b9e66e5da895ab2b937f9732573917e333a32d06862c3b0ce157252ae3a4a6c

    SHA512

    6bf87519fd54a98f8e9e5bd69545232f8791a959e8c2d42fc856151a6dda66812031a402e96300857420161a317baf28b7c51c820d198531b01a80d2f90ae0f1

  • \Users\Admin\AppData\Local\Temp\MSIA96.tmp

    Filesize

    96KB

    MD5

    fadffef98d0f28368b843c6e9afd9782

    SHA1

    578101fadf1034c4a928b978260b120b740cdfb9

    SHA256

    73f7e51214b775421f6679acabc51ac1d34b4271116f5f3dd3426df50d214886

    SHA512

    ba5ab56a7e5d2e54fc304d77c78a14b35b187fdd95a090d39193b3da6ab40ef1b38c3cd56b160edceded3d622c0b645376efaf3df8fc8c437f448f91587f3233

  • \Windows\Installer\MSI211D.tmp

    Filesize

    95KB

    MD5

    a5c8b1a35c5dae0296ea31087ad70824

    SHA1

    93b9b87c2a9b67c99c587bea51f9f549861d0e16

    SHA256

    4b9e66e5da895ab2b937f9732573917e333a32d06862c3b0ce157252ae3a4a6c

    SHA512

    6bf87519fd54a98f8e9e5bd69545232f8791a959e8c2d42fc856151a6dda66812031a402e96300857420161a317baf28b7c51c820d198531b01a80d2f90ae0f1

  • \Windows\Installer\MSI21BA.tmp

    Filesize

    95KB

    MD5

    a5c8b1a35c5dae0296ea31087ad70824

    SHA1

    93b9b87c2a9b67c99c587bea51f9f549861d0e16

    SHA256

    4b9e66e5da895ab2b937f9732573917e333a32d06862c3b0ce157252ae3a4a6c

    SHA512

    6bf87519fd54a98f8e9e5bd69545232f8791a959e8c2d42fc856151a6dda66812031a402e96300857420161a317baf28b7c51c820d198531b01a80d2f90ae0f1