Analysis

  • max time kernel
    53s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2023, 02:31

General

  • Target

    SiiMarzoFacturanopagada.msi

  • Size

    5.7MB

  • MD5

    fb5fe2eb324b21fd22597b12f6124e69

  • SHA1

    a085c0f3ae01b807e8596b61057a4ad824ee2d45

  • SHA256

    dcd729840ba364ad1134c607e21c657d0ec5e9716373ec3a8360422743347971

  • SHA512

    5a046068953eba2854b11dd87ba0439fba2beddca50944515896aa410e820e4652a491550c2c7e744cffdeecbeedfec9e5b2d77f9b65ab4f4ce8c97926ad8e7f

  • SSDEEP

    98304:tYqtM0yU8wtIhf+UJ0MgUsymBGtVH6RqKxsmjTyFSRDfNPMbhA:/RCdf+6iUpGGtV3KxsERD1PM

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SiiMarzoFacturanopagada.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1336
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CEDBCFB26E85034C96495E158181A171
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06e496927d40555f17679ad95c51b5c9

    SHA1

    faec0c7b77ad951cb936d2beb3b19bde52dcb403

    SHA256

    427019a885c58491714d983be09cb6797e9b42dbb734cbfa14ac2dacf8ebde3d

    SHA512

    ad2a01b2a412e76c9ad97b18f3fb1e60f0048fdf81c0ed5096d96cddd7813c606944044b1ce197112b2568aff699cf0b12728abfd22bca1c22dc683fe09bd27b

  • C:\Users\Admin\AppData\Local\Temp\CabAE7B.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\TarAFAA.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Windows\Installer\MSI6182.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI6624.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI6693.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI6693.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI6E42.tmp

    Filesize

    5.2MB

    MD5

    2ccde06fc769d5c106822d2c6fcf4246

    SHA1

    e4c90d57ad7bba15aa2b7429c443a24b90c95aca

    SHA256

    71491942fca5470c254db1b610809f66810732be55c44a4ff2cab0443659e4a9

    SHA512

    5b83cbec26c9d1c6ceed43161bdd654a12527ec4e3d9947fa0f2ef6a7cb8377e7105ddf124a63bc82a4779c6bf72c18f40b48dc36f953ed51ab047c8e110c251

  • \Windows\Installer\MSI6182.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI6624.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI6693.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • \Windows\Installer\MSI6E42.tmp

    Filesize

    5.2MB

    MD5

    2ccde06fc769d5c106822d2c6fcf4246

    SHA1

    e4c90d57ad7bba15aa2b7429c443a24b90c95aca

    SHA256

    71491942fca5470c254db1b610809f66810732be55c44a4ff2cab0443659e4a9

    SHA512

    5b83cbec26c9d1c6ceed43161bdd654a12527ec4e3d9947fa0f2ef6a7cb8377e7105ddf124a63bc82a4779c6bf72c18f40b48dc36f953ed51ab047c8e110c251

  • memory/796-78-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/796-87-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/796-77-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/796-74-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/796-79-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/796-81-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/796-82-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/796-84-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/796-85-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/796-76-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/796-88-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/796-90-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/796-91-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/796-92-0x0000000002600000-0x00000000032AC000-memory.dmp

    Filesize

    12.7MB

  • memory/796-94-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/796-75-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/796-73-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/796-72-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/796-71-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/796-179-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB