Analysis

  • max time kernel
    140s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    29/06/2023, 20:10

General

  • Target

    A4C30N90IRKPO4OTWCD.msi

  • Size

    6.3MB

  • MD5

    83efc255c44e0b5f9861948f2bbbd676

  • SHA1

    a03e63a2324acea809f1ab5b949a79a51098f94d

  • SHA256

    bfdae5da8f01ea8756eaa6d3529fd76894948967adfe8862a1399cb973ee5f3e

  • SHA512

    ffe32c46b8e00271b2b1f3913bf1fa4ee7d33d39029d1f6a5dcb51577b9d3dc984d4256c7046a08c4c7b16fdf4f94598da98622b95185dfd4b64ae45a9e01144

  • SSDEEP

    98304:kYUtMEAjtulbxKO1fTC4woarOBy3lAPlT4b+PK5WkEIcL3qmUi3kOlODhw86/r14:snxfTC4wducuucemUqkOEDMoPu8

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\A4C30N90IRKPO4OTWCD.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4580
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0303DB6D929019130C764940AD6B961D
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI9DEA.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI9DEA.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIAF7F.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIAF7F.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB117.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB117.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB117.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB175.tmp

    Filesize

    860KB

    MD5

    71b541254864bd52f85e932e2040cbe8

    SHA1

    713766e1818f8d7ca814c86109c9cdd5d57914ef

    SHA256

    b29ab4744ff6c8c9c440e878abf6f76255c538e71564e6a6279513b543be0538

    SHA512

    4d2e0a30fd6729eb40fad358795db152327b0441da574052a371762f33c9f9e7b9a77c4a4762207bcb401a2d3ef6438730c245916f4a81cd20f748857d5170d2

  • C:\Windows\Installer\MSIB175.tmp

    Filesize

    860KB

    MD5

    71b541254864bd52f85e932e2040cbe8

    SHA1

    713766e1818f8d7ca814c86109c9cdd5d57914ef

    SHA256

    b29ab4744ff6c8c9c440e878abf6f76255c538e71564e6a6279513b543be0538

    SHA512

    4d2e0a30fd6729eb40fad358795db152327b0441da574052a371762f33c9f9e7b9a77c4a4762207bcb401a2d3ef6438730c245916f4a81cd20f748857d5170d2

  • C:\Windows\Installer\MSIB3F7.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB3F7.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSIB64B.tmp

    Filesize

    4.9MB

    MD5

    dd5476bc84e93976ed610dd8a1b16f49

    SHA1

    13eb482378cb0a2d4e63fd570a591f27e3c8ea2f

    SHA256

    babbb82a46861f91a3a1b0e5b37d13ba6c82a2829b311ab7ad1763b0f03b2733

    SHA512

    393263cd36fe8eb725d8d92c2dec130a5b58671f2c7c1cb4b1142f4f0c2323a704be60d8c94ab1a2c572c5724f547a60df34e0682ab4157e2a79e80d96da3a1f

  • C:\Windows\Installer\MSIB64B.tmp

    Filesize

    4.9MB

    MD5

    dd5476bc84e93976ed610dd8a1b16f49

    SHA1

    13eb482378cb0a2d4e63fd570a591f27e3c8ea2f

    SHA256

    babbb82a46861f91a3a1b0e5b37d13ba6c82a2829b311ab7ad1763b0f03b2733

    SHA512

    393263cd36fe8eb725d8d92c2dec130a5b58671f2c7c1cb4b1142f4f0c2323a704be60d8c94ab1a2c572c5724f547a60df34e0682ab4157e2a79e80d96da3a1f

  • C:\Windows\Installer\MSIB64B.tmp

    Filesize

    4.9MB

    MD5

    dd5476bc84e93976ed610dd8a1b16f49

    SHA1

    13eb482378cb0a2d4e63fd570a591f27e3c8ea2f

    SHA256

    babbb82a46861f91a3a1b0e5b37d13ba6c82a2829b311ab7ad1763b0f03b2733

    SHA512

    393263cd36fe8eb725d8d92c2dec130a5b58671f2c7c1cb4b1142f4f0c2323a704be60d8c94ab1a2c572c5724f547a60df34e0682ab4157e2a79e80d96da3a1f

  • memory/4384-160-0x0000000003410000-0x0000000003FA5000-memory.dmp

    Filesize

    11.6MB

  • memory/4384-161-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/4384-162-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/4384-163-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/4384-164-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/4384-165-0x00000000032F0000-0x00000000032F1000-memory.dmp

    Filesize

    4KB

  • memory/4384-166-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/4384-167-0x00000000040C0000-0x00000000040C1000-memory.dmp

    Filesize

    4KB

  • memory/4384-168-0x0000000003410000-0x0000000003FA5000-memory.dmp

    Filesize

    11.6MB

  • memory/4384-170-0x0000000004220000-0x0000000004221000-memory.dmp

    Filesize

    4KB

  • memory/4384-178-0x0000000004220000-0x0000000004221000-memory.dmp

    Filesize

    4KB