Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 02:32

General

  • Target

    nlm11.14.1.3_ipv4_ipv6_win64.msi

  • Size

    8.1MB

  • MD5

    ef812d21c5a53f3828ae9c66d347f6c2

  • SHA1

    36c7caea6dac0c8545d85adaa47fe6311a37e685

  • SHA256

    2055f55d9eba9c2212984725317533b0d8fbe80ab3934dc0b611125f3fee4f60

  • SHA512

    5e796c894102e662dc9c6a8ae0a15de6284bfe94db9eb5f42bcefcfca4dc2a16169959b42d932614d67ba3fd2f3f5e1d252d4d564d805f329cd7eeddb97075ab

  • SSDEEP

    98304:cT0zprH7T+Oml9pcfXGWxYeQiDVGaJzlNDKLOZ/g8HLYbA09u4sIb2vzDX3Z/i7m:blH7Ko1QeVGC4OZ/VIAku4sK2vz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\nlm11.14.1.3_ipv4_ipv6_win64.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4748
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F0FC33B800606F26602335B15F5EE177 C
      2⤵
      • Loads dropped DLL
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI3795.tmp

    Filesize

    202KB

    MD5

    ba84dd4e0c1408828ccc1de09f585eda

    SHA1

    e8e10065d479f8f591b9885ea8487bc673301298

    SHA256

    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

    SHA512

    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

  • C:\Users\Admin\AppData\Local\Temp\MSI3795.tmp

    Filesize

    202KB

    MD5

    ba84dd4e0c1408828ccc1de09f585eda

    SHA1

    e8e10065d479f8f591b9885ea8487bc673301298

    SHA256

    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

    SHA512

    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290