Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2023 03:43

General

  • Target

    00f1RT50167S56T0rTI4c2.msi

  • Size

    7.3MB

  • MD5

    9c03935079502fd8e9cdeb9c4ad4d332

  • SHA1

    84cbd726276cb692c0eaeef75238db3fb7d16554

  • SHA256

    b40e0825b374d997e63a0544cabe0b318931eefbf681e1f51a2671a8394f86db

  • SHA512

    bcf526c7ba6844218f1c48d5152d1934176a6af42d8605b6175f1e27ce7e4a0e207b2ab4d98282bf5522c86b065bef519d78fac4b0f58495de6011404dcd2341

  • SSDEEP

    196608:33ffvMQqki+YMyfNRl0XWZbOmzAgZeNfvGtHZAFxfTC:33ffvMgiFFl0XcbtMgZ8CCFM

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 56 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\00f1RT50167S56T0rTI4c2.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4728
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 14E7F20A068663F2F89F9819DB20615A
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI6E0C.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI6E0C.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI706E.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI706E.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI712B.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI712B.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI712B.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI714B.tmp

    Filesize

    860KB

    MD5

    71b541254864bd52f85e932e2040cbe8

    SHA1

    713766e1818f8d7ca814c86109c9cdd5d57914ef

    SHA256

    b29ab4744ff6c8c9c440e878abf6f76255c538e71564e6a6279513b543be0538

    SHA512

    4d2e0a30fd6729eb40fad358795db152327b0441da574052a371762f33c9f9e7b9a77c4a4762207bcb401a2d3ef6438730c245916f4a81cd20f748857d5170d2

  • C:\Windows\Installer\MSI714B.tmp

    Filesize

    860KB

    MD5

    71b541254864bd52f85e932e2040cbe8

    SHA1

    713766e1818f8d7ca814c86109c9cdd5d57914ef

    SHA256

    b29ab4744ff6c8c9c440e878abf6f76255c538e71564e6a6279513b543be0538

    SHA512

    4d2e0a30fd6729eb40fad358795db152327b0441da574052a371762f33c9f9e7b9a77c4a4762207bcb401a2d3ef6438730c245916f4a81cd20f748857d5170d2

  • C:\Windows\Installer\MSI7265.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI7265.tmp

    Filesize

    376KB

    MD5

    e12c5bcc254c953b1a46d1434804f4d2

    SHA1

    99f67acf34af1294f3c6e5eb521c862e1c772397

    SHA256

    5316cfae8b4d28ab7cbc5cab60e27b0c0f5a3210a921a4b0560769c5021c911b

    SHA512

    9a61aa00b651fc616cd09d28f4a6b872889a026c61d818595a82c58fdff187e3ad57916c2b8690d1e7016d73a05435e13a85758917cfb89029b34c4a1685aa0b

  • C:\Windows\Installer\MSI73BF.tmp

    Filesize

    5.9MB

    MD5

    21a1b3e23c9d647da31b974c8bfdb01f

    SHA1

    b3ba524d31555cca0bc0df2d277c2310a5bb0ab5

    SHA256

    33448acd722b1eda62865788fdc0272eb794dd7f11b9fb6c7926b97d13808f66

    SHA512

    0af3e2ba774aa421667a3f4b19e79c8f0312c3873136d11faea9fb1d69212a155f5a39827ba91d1feeca376fde048c20efbcfc4dec61c3cda1ed360c61cf6578

  • C:\Windows\Installer\MSI73BF.tmp

    Filesize

    5.9MB

    MD5

    21a1b3e23c9d647da31b974c8bfdb01f

    SHA1

    b3ba524d31555cca0bc0df2d277c2310a5bb0ab5

    SHA256

    33448acd722b1eda62865788fdc0272eb794dd7f11b9fb6c7926b97d13808f66

    SHA512

    0af3e2ba774aa421667a3f4b19e79c8f0312c3873136d11faea9fb1d69212a155f5a39827ba91d1feeca376fde048c20efbcfc4dec61c3cda1ed360c61cf6578

  • C:\Windows\Installer\MSI73BF.tmp

    Filesize

    5.9MB

    MD5

    21a1b3e23c9d647da31b974c8bfdb01f

    SHA1

    b3ba524d31555cca0bc0df2d277c2310a5bb0ab5

    SHA256

    33448acd722b1eda62865788fdc0272eb794dd7f11b9fb6c7926b97d13808f66

    SHA512

    0af3e2ba774aa421667a3f4b19e79c8f0312c3873136d11faea9fb1d69212a155f5a39827ba91d1feeca376fde048c20efbcfc4dec61c3cda1ed360c61cf6578

  • memory/4288-160-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4288-162-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

    Filesize

    4KB

  • memory/4288-161-0x0000000003C90000-0x0000000003C91000-memory.dmp

    Filesize

    4KB

  • memory/4288-163-0x0000000003CC0000-0x0000000003CC1000-memory.dmp

    Filesize

    4KB

  • memory/4288-164-0x0000000003CD0000-0x0000000003CD1000-memory.dmp

    Filesize

    4KB

  • memory/4288-165-0x0000000003CE0000-0x0000000003CE1000-memory.dmp

    Filesize

    4KB

  • memory/4288-166-0x0000000003CF0000-0x0000000003CF1000-memory.dmp

    Filesize

    4KB

  • memory/4288-167-0x0000000002D40000-0x0000000003C81000-memory.dmp

    Filesize

    15.3MB

  • memory/4288-170-0x0000000003D10000-0x0000000003D11000-memory.dmp

    Filesize

    4KB

  • memory/4288-178-0x0000000003D10000-0x0000000003D11000-memory.dmp

    Filesize

    4KB