Analysis

  • max time kernel
    125s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2023, 12:11

General

  • Target

    ec58704fc6ae1463d3fc1fe15c5182dbd82e5e511d9cbca0417c2ef010078e93.exe

  • Size

    5.3MB

  • MD5

    822e066aeb2f019f4c71f3af72574b5d

  • SHA1

    3586107ea961f650bb380b22d68a82bf51e5bbcc

  • SHA256

    ec58704fc6ae1463d3fc1fe15c5182dbd82e5e511d9cbca0417c2ef010078e93

  • SHA512

    2d435155ca5d50dedd6f97fd348bc1a8ee5076396cc26f724e77186e9c46ee730d83b8df4ce1d57e50cf276c1c5a81e1eeb16942ffe668136d9c2380f06c74a5

  • SSDEEP

    98304:TbudDSwv0eTMPARHlnWKKet0NynU+BuFXiSBnUOQXmpMbQ:mEeTMPuHln70NL+8USx7QXQ

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec58704fc6ae1463d3fc1fe15c5182dbd82e5e511d9cbca0417c2ef010078e93.exe
    "C:\Users\Admin\AppData\Local\Temp\ec58704fc6ae1463d3fc1fe15c5182dbd82e5e511d9cbca0417c2ef010078e93.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE /iexpress CDCACHE=2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\system32\msiexec.exe" /I "C:\MSOCache\All Users\90520409-6000-11D3-8CFE-0150048383C9\VVIEWER.MSI" CDCACHE=2 LAUNCHEDFROMSETUP=1 SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ SETUPEXENAME=SETUP.EXE /lvpiwaeo "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001)_Task(0001).txt" LOGVERBOSE=1 STANDALONEOSE="C:\MSOCache\All Users\90520409-6000-11D3-8CFE-0150048383C9\FILES\SETUP\OSE.EXE" CDCACHE="2" DELETABLECACHE="1" LOCALCACHEDRIVE="C" DWSETUPLOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001).txt" DWMSILOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001)_Task(0001).txt"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2004
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1968
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A7B727F13476D946290E8EB1A149F4D0 C
      2⤵
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Enumerates system info in registry
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\90520409-6000-11D3-8CFE-0150048383C9\VVIEWER.MSI

    Filesize

    781KB

    MD5

    61f231eae7835a342f3dd41a87ad1c1b

    SHA1

    a940f26f09c5644429550c2f9f8638d46bba01d0

    SHA256

    f3a1e560ffa4f58412b71cbbb4e89aa0ada1335c32239c5a6b9292de77c78499

    SHA512

    706a28ad636994a93f3726f9c1b9ff351552daa91a4d0d430851bb8d1835dab5f513cceac174474e4e1c746027513dfd02705b24041c96a44d952071ab6c0a48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE

    Filesize

    87KB

    MD5

    7a56cf3e3f12e8af599963b16f50fb6a

    SHA1

    170290115fa1dec1b2e6f43c59996d442857db1b

    SHA256

    882c82bae96d263138d4c0d6c425458b770b7b9c8e9c1d28ac918bf6be94a5c2

    SHA512

    c726c2c85230defffb7936476b4b3623cec817452033ea50f1739fa3494358e0bc8d6e160205d97c8e34225fab730fb1927592d42954a5c4051d30c5b9e24509

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.INI

    Filesize

    2KB

    MD5

    2a585fbbb9650292d96e5be62b03bbad

    SHA1

    f4d921287973f97b05f3cc5ea69a0d479b91ca0c

    SHA256

    655f8f766d16b105e93f9a35dcf63983504567fc20ccec96fdf876cf9c1808ee

    SHA512

    9898f611ad377ac91ee055067090dc37313e0d786404ca32c1bf8be270d8dd059cdb407b88f9eee47bedf3d7f2c21cc69c70d449bc54f598acd991b8ce0775be

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VVIEWER.MSI

    Filesize

    781KB

    MD5

    61f231eae7835a342f3dd41a87ad1c1b

    SHA1

    a940f26f09c5644429550c2f9f8638d46bba01d0

    SHA256

    f3a1e560ffa4f58412b71cbbb4e89aa0ada1335c32239c5a6b9292de77c78499

    SHA512

    706a28ad636994a93f3726f9c1b9ff351552daa91a4d0d430851bb8d1835dab5f513cceac174474e4e1c746027513dfd02705b24041c96a44d952071ab6c0a48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VVIEWER.xml

    Filesize

    1KB

    MD5

    a1224302f859454f8c4af907afa333d4

    SHA1

    e2e222716a8cb23a5fca1b794375bb20bb0ba8f9

    SHA256

    a4c39090500c63b945ab480bbae79b73072f80bed606afa780680878d4a90975

    SHA512

    1860a1712566f1f34d3c7cc70190be77ce7c75658de37cfec4fad8c8850c82f5b7eb139c171d4c7aab05dac67dac2b468aae3eb7060f9f82e0785618a594b689

  • C:\Users\Admin\AppData\Local\Temp\MSID172.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIDB33.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIDC3E.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIDC3E.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIE12E.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIEB8B.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • C:\Users\Admin\AppData\Local\Temp\MSIEC19.tmp

    Filesize

    10KB

    MD5

    e39203f576770122a6c79d7da5809f18

    SHA1

    29d47dbd1c986b5211718407e834e2bf0fcb3ccf

    SHA256

    99e531ba0bbbc92b579d2aa2e761245559c68c1388d30a4dd1ac298380e030fa

    SHA512

    09604f3253b8df6760e73ca423061b3db4205fd2b93b5aa7a4c5a336582f251d6de0effdc37b1227f40626424fea6c35e9667c6ac91d5915eef0a026ff528ca9

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001).txt

    Filesize

    1KB

    MD5

    a1d39c52dbe8d968b9e0fffdaa759c93

    SHA1

    dfcc8c4e90099f70df9feb9d119078771935f894

    SHA256

    fcaf56e1ed020aec24bdd94b077cff74594a8090dca56e4ddf8d7eaa8eb5dc38

    SHA512

    111f3d86bf3d48b763cb5167a825f7edef721f6579413ef6d7879f70f65b755d675349ea6333291647542d3905bb053aaa9e148f9d08b58d3b5eaf3e9f2fce53

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001).txt

    Filesize

    2KB

    MD5

    f8bac1ad80a2fc9ce53012efa823c96c

    SHA1

    b75ec20583e5cb4983bf76f4b5c6ebf7af009bdd

    SHA256

    8003a14eb404da9852a2327e0deb5dc0f0012972a3aa5b6d00e316778b4af278

    SHA512

    cdd8ce4c2085162723d802b351fd168e6520ce368c6adb2dcb48cee9d25e91995a48464b8b18bda1bae520d13a467063ad16b8f96e5907152a2410808d68a43e

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001).txt

    Filesize

    3KB

    MD5

    1d3b47331a643d3df5535b120a1b6319

    SHA1

    fd95a3bcf5e1126e2dfda027dc2e5ebfa3b8d3af

    SHA256

    081110a8495dc0f412f3509d11ac9566cb3f09d247d098b8bc2517d9ed5f99a5

    SHA512

    63de9d9b19ab26be214145f2bd7e94cdd86fa05a6d8d2cd9b87c8ef88d1eea2c8a7146ac43588d1c79228a8a6ba8ffec2a88239e782b4d134fc462103d9a0c2b

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Visio Viewer 2003 Setup(0001).txt

    Filesize

    4KB

    MD5

    ff2562df7ea5372988d92e24ecfba564

    SHA1

    d877b55dafccc66bdfe171bc625b9dbadae90b52

    SHA256

    cd62867d1fb81b562fc02a8c6feec35f52f4a9a3bc6821b513a8da8a9859df74

    SHA512

    5fa81b21cf5eba71f3a16af39a0fe5c500e98de3f52a48a2dc65b1efb9cd21cbeb56f001b17dde7b4b3d79e781d92bf171102898c54ca9ef77f1f927b9631f31

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE

    Filesize

    87KB

    MD5

    7a56cf3e3f12e8af599963b16f50fb6a

    SHA1

    170290115fa1dec1b2e6f43c59996d442857db1b

    SHA256

    882c82bae96d263138d4c0d6c425458b770b7b9c8e9c1d28ac918bf6be94a5c2

    SHA512

    c726c2c85230defffb7936476b4b3623cec817452033ea50f1739fa3494358e0bc8d6e160205d97c8e34225fab730fb1927592d42954a5c4051d30c5b9e24509

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE

    Filesize

    87KB

    MD5

    7a56cf3e3f12e8af599963b16f50fb6a

    SHA1

    170290115fa1dec1b2e6f43c59996d442857db1b

    SHA256

    882c82bae96d263138d4c0d6c425458b770b7b9c8e9c1d28ac918bf6be94a5c2

    SHA512

    c726c2c85230defffb7936476b4b3623cec817452033ea50f1739fa3494358e0bc8d6e160205d97c8e34225fab730fb1927592d42954a5c4051d30c5b9e24509

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    407KB

    MD5

    d0d323b414b7748e713b51374d91b7d6

    SHA1

    4f53f10bce4df510d2bc6a8fd8ecb2fd224b64af

    SHA256

    4248dc2814960c11e26a6c5c66868941d77a1651b028311ccb536b3dfe39baa0

    SHA512

    ec0e73755e6a9597847fba6e3a1f91423e1e9399052512a90bfe39bc6f90e2302f89269894f05c9921b71a9846001254449197c4e14700e11a39c1a7d05cc505

  • \Users\Admin\AppData\Local\Temp\MSID172.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • \Users\Admin\AppData\Local\Temp\MSIDB33.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • \Users\Admin\AppData\Local\Temp\MSIDC3E.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • \Users\Admin\AppData\Local\Temp\MSIE12E.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • \Users\Admin\AppData\Local\Temp\MSIEB8B.tmp

    Filesize

    174KB

    MD5

    e545a9ae4cb8ad99d6fc0a880e693390

    SHA1

    9874e22cfa1333697e2ef99be4c5d87e7e47e10f

    SHA256

    bea4fed1f7767b1898c7c6fe79d70bd780c2b27873aabe993a7dc60d324146ae

    SHA512

    95e8df65b458f8e8f091fbde6938ac25670c368769d7c11f7c86d859659706f585fac837a1dde2acad2735b1720a1a6f04e34d061c924fda33b9bbf8ded2ca49

  • \Users\Admin\AppData\Local\Temp\MSIEC19.tmp

    Filesize

    10KB

    MD5

    e39203f576770122a6c79d7da5809f18

    SHA1

    29d47dbd1c986b5211718407e834e2bf0fcb3ccf

    SHA256

    99e531ba0bbbc92b579d2aa2e761245559c68c1388d30a4dd1ac298380e030fa

    SHA512

    09604f3253b8df6760e73ca423061b3db4205fd2b93b5aa7a4c5a336582f251d6de0effdc37b1227f40626424fea6c35e9667c6ac91d5915eef0a026ff528ca9