Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2023 14:00

General

  • Target

    putty-64bit-0.78-installer.msi

  • Size

    3.5MB

  • MD5

    108b432c4dc0a66b657d985e180bec71

  • SHA1

    262812d43303b7ddc7c04a1c243172ebe6579f00

  • SHA256

    e64775374097f1b1c8fd4173f7d5be4305b88cec26a56d003113aff2837ae08e

  • SHA512

    5ddb97078b417f22c54dce768564dec58fd92a9c190f7a6cac9c7979a0f136dd439da1d59dd3c088e709433f5c4f79c033abd4b6ca8989d38620c20f4623386e

  • SSDEEP

    98304:Ujhyh9EoxGHgBRn8Tg4IDrwRW8FMDMb34+NHC6:UjhyJPR8Tg4IDrwdFMD048

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\putty-64bit-0.78-installer.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:924
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89A842C7E152DDA720E9ADC0AA535715 C
      2⤵
      • Loads dropped DLL
      PID:2488
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2468
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000568" "0000000000000598"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f771335.rbs

      Filesize

      12KB

      MD5

      cc3beb2a6b7805652ba7410229543618

      SHA1

      152b065ef14e869f30c0f5dfb8256eaba8c735a9

      SHA256

      a892b8c25c605360d90f047003442ad30601cdbc61536a16ec7a81c6c140a367

      SHA512

      42940460be57ead19aa598fb070fdba35475b2a87538564c1746415c5ed4d75cd32743045234d552517463ca663dc37ff0475e209c32769574d15c56687253ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      765B

      MD5

      f81479da38ff642d6b7851f574bd2b40

      SHA1

      6577b027ab99b668ecf96d3da73bd4dcdfb04a35

      SHA256

      2e302d0d7c949ab815b7fdf8dff07a3b20961051ebaf216024e8bed9f8f56a27

      SHA512

      60f2c732c6a321ff3724a5227c1cc8d10b0fab553c6ce5ceab72de8dd1c362221d4637dc92e5a6e7988d0db5ef8cefc43728c76b4c3d4fe07f5c8c5ec485e10d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_383EB3891E16580A90C892D349C28A00

      Filesize

      638B

      MD5

      fdf4f63a2fe39debaacf037572544569

      SHA1

      007564edca2d0c7541e30734bbea627ecab65046

      SHA256

      4a9d5a4be4ad1841182f5bc6210f4ff1b2781adbc2c849ff724e43778461afd3

      SHA512

      cffde19ba72f64946586187b13b61dda45878c0a1f677bc5fef3333a6efdc2ce3f5e2fc8589622ef62e99037addf4d5ad14dbd2a1c5ca24906cae3ed23edd3a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      1KB

      MD5

      71278beb7e935c46d60016b40b9eb962

      SHA1

      ad4d5633791a083524c8f8bfa784496298a2ff23

      SHA256

      4496b14fa50f437b84eaf81ecc21d734bf6ef1cf2c50f869cb395f325acf379b

      SHA512

      be939fb6bbe1830a072c8e877f634aa6879006a493e38e4b400591c423e5c60279f7dc7252f1789001dea93bc80340ec4f9f236c7dff068c5d7d3e29438a6cb2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      484B

      MD5

      3ea76250c4a7e3479bd287b2ea25b2ae

      SHA1

      6b2591f193f0cbea3419f432526dc58b3b01427d

      SHA256

      2bb26b0f0eab3a3d1589b3527a4b2a766606fe0c53f1201bff01ed81506a74bf

      SHA512

      f5d4563fc5f516fef02f99a248b67bbd0ee1925aa50b69f58c9fcd572133d84bd7bca3b14e220d2083d6656336f03a934ea63cd4a4d24ac1cfb65a5555b8cfde

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cda46f40b01a35a21dd86a24d9e54f00

      SHA1

      efcafaf6b76b5f9e73c4a0eb8120015d6b6db822

      SHA256

      181fd97fcf4ba56b81192ccdf7afc4ded8287c5cba99c9ec439c0b2d065b3e5b

      SHA512

      83329b12d2bdb3e96e882923c047b76a4c3ba7f9e2f98640fa23bc76890cb02bbb0230fd2536a72cfdd8850291171c83d99eeb68891ce575c1a51710f05efe22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_383EB3891E16580A90C892D349C28A00

      Filesize

      488B

      MD5

      c7194a73970b59a11e1ca182fee1fa3f

      SHA1

      7dad8b5713ef645ba4ca6094ead059e8dc4bb460

      SHA256

      40891365723c71c1efa8eb4d01ab4a3f2806549c2f1f189023b5604012c6c0b5

      SHA512

      d61194bf008622e96bd6396e59f6608a21a8281c064db13c3ced706b07f1e0493a722cf304e67b9affdebe3ebb62acc5b6046639055662c1a067e46e920a38c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      482B

      MD5

      251c6ea9d77fd74c88a905b429c8ee55

      SHA1

      2e8421566bb7d24bb4c49ea96e9276ece01a8721

      SHA256

      1f13acf8ba62b3d90f6c54050cf793712fae6d7aee2544b6964a94096b98b274

      SHA512

      59d35d1e72ef0fe06b686067d6f51b634fa40a9a8bd5138a978ea4f3bf6481b9444ed4b9bdfba838d3b4276a3b762ec7e817d570fd1a1bdfde446612b873138f

    • C:\Users\Admin\AppData\Local\Temp\Cab894E.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\MSI9D8D.tmp

      Filesize

      102KB

      MD5

      d9ac1b56edf330a6eb7894ab293f14f6

      SHA1

      022d8944e3927fff2b330dab54716ddcbb366d16

      SHA256

      097f1c3f27b18010448d77e3f70c4d9f774cb9c5ab435c62baa1c00e4cadd5ef

      SHA512

      e434410e2b2c2bb1fba4f3fc7c277b978c45b1df1d3c3994d6dc1530558393d7d42a713506bf95d013b2e40e9da36fd3e588fea8d8dc062a24ad931e4d76c328

    • C:\Users\Admin\AppData\Local\Temp\Tar89FC.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PuTTY (64-bit)\PuTTY.lnk

      Filesize

      1KB

      MD5

      c0e7315618ad51954478c2d683b4f206

      SHA1

      7aea749671a6d5203bfdef8dd01114b589b2f818

      SHA256

      c478d89e2cacdafb90d34fa716177e8deb726e82aa0b817d7f41486548d1332d

      SHA512

      d6efdaf82e25cf8814bc0e4deb3691f3f5ef3b5b7b1702a6a327dbd9e2f7eeb6ed42204ed15df25a92447afcb8f5718fa4bad8a7211f2421238904169cee0d2f

    • C:\Windows\Installer\f771333.msi

      Filesize

      3.5MB

      MD5

      108b432c4dc0a66b657d985e180bec71

      SHA1

      262812d43303b7ddc7c04a1c243172ebe6579f00

      SHA256

      e64775374097f1b1c8fd4173f7d5be4305b88cec26a56d003113aff2837ae08e

      SHA512

      5ddb97078b417f22c54dce768564dec58fd92a9c190f7a6cac9c7979a0f136dd439da1d59dd3c088e709433f5c4f79c033abd4b6ca8989d38620c20f4623386e

    • \Program Files\PuTTY\pageant.exe

      Filesize

      521KB

      MD5

      d5042b0b48c1e0c71e9a129e47e38b20

      SHA1

      8c5dcc1aaaec7b934b65938da518d5dd73621529

      SHA256

      8a6377d555bb7f37364553c2a790ea25da85594361b3fbf126578a551705fc31

      SHA512

      ac3fa2c2267a3c68ae6fbb8c32dae74e5ba5f493e8efdc75a8b21f7660497f29b00bc38aa20b07d80ae79410fb5f301bac904dae620d1023b90c13dbe3b4ce0a

    • \Program Files\PuTTY\psftp.exe

      Filesize

      982KB

      MD5

      32b3f329f055f95fd29412e2a8597120

      SHA1

      6ec230545a0408dbeef01ad1731a611949158dd0

      SHA256

      bf4931804c98c13c2696f4adc565f06eb102291b6bc304cce255a8b346fba0a5

      SHA512

      d771d23bdf25cf7ee7ef580ef69e3744338a9a32cc6e4f40ad19b51283c4cbaeba83fbeb42208c6c747af1663f52db02e61ae8fa1357e5b6d280935b44c2d505

    • \Program Files\PuTTY\putty.exe

      Filesize

      1.2MB

      MD5

      14080a3e4e877be235f06509b2a4b6a9

      SHA1

      868866bd51f1ac744991c08eda6446222a0ccdae

      SHA256

      35c9df3a348ae805902a95ab8ad32a6d61ef85ca8249ae78f1077edd2429fe6b

      SHA512

      78c8fe794d0634c74cf172649cd6c6f46244f327dd1a7a8e029fd3c98302b2df6d6ba4279262cb425fca86fe8ba2ef38293c33b85acb3854faabce934a91fc32

    • \Program Files\PuTTY\puttygen.exe

      Filesize

      598KB

      MD5

      14169eaee45a1c21044543efd081ec18

      SHA1

      e33652a171fd4769f2393822f445ced632d37abc

      SHA256

      1abd47a6395ffc9fdc5f1d04910725c51eda1d6afbd400df050c197b7b3f6928

      SHA512

      852928c57754231a90ad0a2b29115af31c22cb0064d0df1c2618b76bf8263a47257ee0743267b545f8ecc87907d62bcb6e51833411064792db8b57bb070c40ef

    • \Users\Admin\AppData\Local\Temp\MSI9D8D.tmp

      Filesize

      102KB

      MD5

      d9ac1b56edf330a6eb7894ab293f14f6

      SHA1

      022d8944e3927fff2b330dab54716ddcbb366d16

      SHA256

      097f1c3f27b18010448d77e3f70c4d9f774cb9c5ab435c62baa1c00e4cadd5ef

      SHA512

      e434410e2b2c2bb1fba4f3fc7c277b978c45b1df1d3c3994d6dc1530558393d7d42a713506bf95d013b2e40e9da36fd3e588fea8d8dc062a24ad931e4d76c328