Analysis

  • max time kernel
    128s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2023 19:04

General

  • Target

    AgentRansack_867.exe

  • Size

    14.9MB

  • MD5

    7747481db9322b854024f98d43f57e2e

  • SHA1

    6af2115b473fde77a9dc958de4ff730eb25810ea

  • SHA256

    c5f5524e60adcb5019b33b07892da0a24822f5b85dfdc0419b256aee802f5811

  • SHA512

    b98be6fd4189133ff7bb74a86e751aebb62b67aa1f47b74ea73f116a44df42790709292928abef8b0666e4cff1e8a64e5b089818c413faed23cb73f173fa9587

  • SSDEEP

    393216:imhHKnM/cj1E1xXnc4g4wbsgz7hi+qyrU01EwZ9FDycyVWdhZ+:lInM/waxXaBI+9i+qP0i2hy3VUhw

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AgentRansack_867.exe
    "C:\Users\Admin\AppData\Local\Temp\AgentRansack_867.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec /i "C:\Users\Admin\AppData\Local\Temp\Mythicsoft\AgentRansack_8.0.867.1\install64.msi" REG_DETAILS="TRIAL" WixComponentInstaller="3537D0AD-610D-4F0F-A9EA-428EC46C2121"
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:808
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 29B20FC0AA4E540059F8BB9127291BB7 C
      2⤵
      • Loads dropped DLL
      PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Cab1B51.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\MSI29E1.tmp

    Filesize

    209KB

    MD5

    a39c970952f0135eebb686a9e186ed16

    SHA1

    286417153c3a6be222ce8b157e2377f3fe1caad0

    SHA256

    0c6da3d456bd374d20b92b267adac25ca2bb6a36b2c7af101ef6e251931b6ea2

    SHA512

    867d8f3c9a53a45a1c146e353660212f2f29f9e5d59b810eafb619e42c09d794420a4fca1966ec4160abb3ed2c764ee8a0c11797508dd9127486414f763aaa4f

  • C:\Users\Admin\AppData\Local\Temp\MSI2A9E.tmp

    Filesize

    695KB

    MD5

    8967de8eb874da91ac1c9d316365a19c

    SHA1

    29534abd76437c8d7e1682ab3135f99eea70fff9

    SHA256

    a021e2c26e7ca2a702df0d38febce1cafecc6f25cc25d973a40a53bbbc970151

    SHA512

    3eb7a6f810a31f373bf3153257a5f474261605324ae4ff5fe2df826a4b3bb681cd5af7cab0f652195bf0bd800ecfcf9c6e64fe15416b05170215e805317f71b8

  • C:\Users\Admin\AppData\Local\Temp\Mythicsoft\AgentRansack_8.0.867.1\install64.msi

    Filesize

    31.9MB

    MD5

    b263a8130dc149814dd2d6c50b482ce4

    SHA1

    e243c3c82e6acbe05d23752315d5783aa90bd04c

    SHA256

    804ed479b2fefaec17a5d4a6196fcbf64e663aa84d3273fac13f2922e42dd08f

    SHA512

    22dc4242d127b7add3eed603c1c6b22d880199c169576ab41362ad512f231c02799194cda77f867e7e9e924580446288ae572cffc253a8243fe416feae9ef593

  • C:\Users\Admin\AppData\Local\Temp\Tar1CAB.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar2401.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • \Users\Admin\AppData\Local\Temp\MSI29E1.tmp

    Filesize

    209KB

    MD5

    a39c970952f0135eebb686a9e186ed16

    SHA1

    286417153c3a6be222ce8b157e2377f3fe1caad0

    SHA256

    0c6da3d456bd374d20b92b267adac25ca2bb6a36b2c7af101ef6e251931b6ea2

    SHA512

    867d8f3c9a53a45a1c146e353660212f2f29f9e5d59b810eafb619e42c09d794420a4fca1966ec4160abb3ed2c764ee8a0c11797508dd9127486414f763aaa4f

  • \Users\Admin\AppData\Local\Temp\MSI2A9E.tmp

    Filesize

    695KB

    MD5

    8967de8eb874da91ac1c9d316365a19c

    SHA1

    29534abd76437c8d7e1682ab3135f99eea70fff9

    SHA256

    a021e2c26e7ca2a702df0d38febce1cafecc6f25cc25d973a40a53bbbc970151

    SHA512

    3eb7a6f810a31f373bf3153257a5f474261605324ae4ff5fe2df826a4b3bb681cd5af7cab0f652195bf0bd800ecfcf9c6e64fe15416b05170215e805317f71b8

  • \Users\Admin\AppData\Local\Temp\nso448.tmp\System.dll

    Filesize

    11KB

    MD5

    2ae993a2ffec0c137eb51c8832691bcb

    SHA1

    98e0b37b7c14890f8a599f35678af5e9435906e1

    SHA256

    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

    SHA512

    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9