Analysis

  • max time kernel
    82s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 16:09

General

  • Target

    e5ac15d.msi

  • Size

    77.5MB

  • MD5

    f4423feafa6af8382acdbe99269d662a

  • SHA1

    57fd7d8ce46c964428f21ea5169c85d85e51ac63

  • SHA256

    5a05eaa9635b5247d5d7e5c846194ba5868532a7ec555df57b8a8f25861d2471

  • SHA512

    57ccd1705456cd8894e8d1d8efeb52594d42639918fc09e058231221ea484dd0b3cca6498aa66275e0c2592547abed26e8a257529a79c6aabc2e033c55ba5df5

  • SSDEEP

    1572864:NnndAhSnbfH7y7m1PUp0SD+cafNzcZiku0M4339kUUCw:NnqSDwm1PRbcafkiku0M4dkUp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e5ac15d.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:716
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C05DB9D6CF230DA95E0594E4066E2B9E C
      2⤵
      • Loads dropped DLL
      PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIE290.tmp

    Filesize

    231KB

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • C:\Users\Admin\AppData\Local\Temp\MSIE290.tmp

    Filesize

    231KB

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • C:\Users\Admin\AppData\Local\Temp\MSIE80F.tmp

    Filesize

    231KB

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da

  • C:\Users\Admin\AppData\Local\Temp\MSIE80F.tmp

    Filesize

    231KB

    MD5

    0a2626fc9e4e0ca18386c029e9efffd9

    SHA1

    ac5576497afac2456f485cdb14bf52d895769651

    SHA256

    97a55524e0bf06419143b1b71778c0ec867716079ab477e8404a0f3125da7dc3

    SHA512

    40b25e507e64b5634e13e83d4bc420196b1294d533e60b01dae8898a8eed939417aec8341b409f59a722d14fb63884c24c5a31985da63933b761f1fc3acb24da