Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2023, 15:47

General

  • Target

    327a1ad6228adca42a92cf0c054df5ab68cebb0794c3e8a34d6cdeb7751cf5ffmsi_JC.msi

  • Size

    4.0MB

  • MD5

    de8169e2707963743591529483506b85

  • SHA1

    dca874742694fb3c125c60cf9da0f9a06ad0952c

  • SHA256

    327a1ad6228adca42a92cf0c054df5ab68cebb0794c3e8a34d6cdeb7751cf5ff

  • SHA512

    e462d1ba5f98617e88030be2be47cdfa872f5385b41afdce6d1575b970fa0137a104a834fea493d52142030d58879f08f24256b85047cc9b3fe3bc3e64c63c90

  • SSDEEP

    98304:YY5AJHnvXw3IdEDhquv4KUlbhwtPWTQ2cw/n255NXH:oHfwBFjwp6pf2cW65NX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\327a1ad6228adca42a92cf0c054df5ab68cebb0794c3e8a34d6cdeb7751cf5ffmsi_JC.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1392
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7DFC0E2057653C22A8CEB1C1DBB2C1C4
      2⤵
      • Loads dropped DLL
      PID:1104
    • C:\Users\Admin\Documents\Downloads\BSPlayer\cdburner.exe
      "C:\Users\Admin\Documents\Downloads\BSPlayer\cdburner.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2268
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2972
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B8" "0000000000000344"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f76cae1.rbs

          Filesize

          1KB

          MD5

          12e18daf585e7dfc047619c6b20cf2d3

          SHA1

          ce6d1e91a6495620d2529c16e92bac0b4582996e

          SHA256

          89608f91c72ace21e0994628bc9525ee2609419af2b3fa61b175ce0a9ebb8b29

          SHA512

          8ed1027413127e8d6da923eb951782c13aad76c42d90b3664401fa4c00cc00d721164811f28c83d688cf21c121c473170cd03997599a17ae7e477c317f394808

        • C:\Users\Admin\Documents\Downloads\BSPlayer\STARBURN.DLL

          Filesize

          2.8MB

          MD5

          e026627ee327135bb6802197bb14aaf6

          SHA1

          3ec983bad17bddb0e579ea04565e74a4bb2db980

          SHA256

          49ab06760430c29e877858a1deb74189414f1722f78b224baeada395b773720a

          SHA512

          bdf0f9b0ad92bd33722763bfadc3248680ec46e24dce8f8e1753207665f2cbf34f251bf93e54ee8c18090a32770186593c2f64ca6b5c469530f9039eaa0e90aa

        • C:\Users\Admin\Documents\Downloads\BSPlayer\cdburner.exe

          Filesize

          1.6MB

          MD5

          bdc0cff1e6e3db489864041a623f0d1e

          SHA1

          cf1beeec71abbfbe8a6f47abaaa6c1af2fee37dc

          SHA256

          585741ca3c4041bb39d107f1f159d908650967fbccac3a491bca389cc4ba0769

          SHA512

          aeaf1d2da43584ae91ea032c59a945ab91f721cc3b5bb98c2c7096dfd8c728b4ebf735491e06e934b4b1c9f1ccc719f950ad6f45e212f638b52c7af5efcc18db

        • C:\Users\Admin\Documents\Downloads\BSPlayer\cdburner.exe

          Filesize

          1.6MB

          MD5

          bdc0cff1e6e3db489864041a623f0d1e

          SHA1

          cf1beeec71abbfbe8a6f47abaaa6c1af2fee37dc

          SHA256

          585741ca3c4041bb39d107f1f159d908650967fbccac3a491bca389cc4ba0769

          SHA512

          aeaf1d2da43584ae91ea032c59a945ab91f721cc3b5bb98c2c7096dfd8c728b4ebf735491e06e934b4b1c9f1ccc719f950ad6f45e212f638b52c7af5efcc18db

        • C:\Windows\Installer\MSICB2B.tmp

          Filesize

          91KB

          MD5

          9f1e5d66c2889018daef4aef604eebc4

          SHA1

          b80294261c8a1635e16e14f55a3d76889ff2c857

          SHA256

          02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

          SHA512

          8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

        • C:\Windows\Installer\MSICCE1.tmp

          Filesize

          91KB

          MD5

          9f1e5d66c2889018daef4aef604eebc4

          SHA1

          b80294261c8a1635e16e14f55a3d76889ff2c857

          SHA256

          02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

          SHA512

          8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

        • \Users\Admin\Documents\Downloads\BSPlayer\StarBurn.dll

          Filesize

          2.8MB

          MD5

          e026627ee327135bb6802197bb14aaf6

          SHA1

          3ec983bad17bddb0e579ea04565e74a4bb2db980

          SHA256

          49ab06760430c29e877858a1deb74189414f1722f78b224baeada395b773720a

          SHA512

          bdf0f9b0ad92bd33722763bfadc3248680ec46e24dce8f8e1753207665f2cbf34f251bf93e54ee8c18090a32770186593c2f64ca6b5c469530f9039eaa0e90aa

        • \Windows\Installer\MSICB2B.tmp

          Filesize

          91KB

          MD5

          9f1e5d66c2889018daef4aef604eebc4

          SHA1

          b80294261c8a1635e16e14f55a3d76889ff2c857

          SHA256

          02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

          SHA512

          8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

        • \Windows\Installer\MSICCE1.tmp

          Filesize

          91KB

          MD5

          9f1e5d66c2889018daef4aef604eebc4

          SHA1

          b80294261c8a1635e16e14f55a3d76889ff2c857

          SHA256

          02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

          SHA512

          8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

        • memory/2268-86-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2268-90-0x0000000000400000-0x0000000000590000-memory.dmp

          Filesize

          1.6MB

        • memory/2268-91-0x0000000074310000-0x00000000745E5000-memory.dmp

          Filesize

          2.8MB