Analysis
-
max time kernel
225s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
8.3MB
-
MD5
cb2ffac2a251378cda3f91cd613f453d
-
SHA1
3a028761638f5aa93b0719c5650c83a138e8abc9
-
SHA256
10165e27e0db0a6708f346ddea657ab0409499f93eb8426a80864a966f0f401e
-
SHA512
1d203540fde5074f0d57e1ecbd9af2ee862b940f8fb58c3e55ad9db5ba029aff82a4468eee24c760b5e55cc96e61244af0fd6f3c46db857824e13e45ec1e802f
-
SSDEEP
196608:P4Z1cDw8TWMpWRGAk7R85du3dWbpkPbVAp2FG0c+imht+:PE1CE3k7R5NWqu0cU+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation installer.exe -
Executes dropped EXE 1 IoCs
pid Process 4860 installer.exe -
Loads dropped DLL 1 IoCs
pid Process 4852 MsiExec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 61 2652 msiexec.exe 63 2652 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Installer\e5a00fb.msi msiexec.exe File opened for modification C:\Windows\Installer\e5a00fb.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIB94F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{D9E14363-FD66-419D-9DC9-C62471755C9F} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 4860 installer.exe 2652 msiexec.exe 2652 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3640 msiexec.exe Token: SeIncreaseQuotaPrivilege 3640 msiexec.exe Token: SeSecurityPrivilege 2652 msiexec.exe Token: SeCreateTokenPrivilege 3640 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3640 msiexec.exe Token: SeLockMemoryPrivilege 3640 msiexec.exe Token: SeIncreaseQuotaPrivilege 3640 msiexec.exe Token: SeMachineAccountPrivilege 3640 msiexec.exe Token: SeTcbPrivilege 3640 msiexec.exe Token: SeSecurityPrivilege 3640 msiexec.exe Token: SeTakeOwnershipPrivilege 3640 msiexec.exe Token: SeLoadDriverPrivilege 3640 msiexec.exe Token: SeSystemProfilePrivilege 3640 msiexec.exe Token: SeSystemtimePrivilege 3640 msiexec.exe Token: SeProfSingleProcessPrivilege 3640 msiexec.exe Token: SeIncBasePriorityPrivilege 3640 msiexec.exe Token: SeCreatePagefilePrivilege 3640 msiexec.exe Token: SeCreatePermanentPrivilege 3640 msiexec.exe Token: SeBackupPrivilege 3640 msiexec.exe Token: SeRestorePrivilege 3640 msiexec.exe Token: SeShutdownPrivilege 3640 msiexec.exe Token: SeDebugPrivilege 3640 msiexec.exe Token: SeAuditPrivilege 3640 msiexec.exe Token: SeSystemEnvironmentPrivilege 3640 msiexec.exe Token: SeChangeNotifyPrivilege 3640 msiexec.exe Token: SeRemoteShutdownPrivilege 3640 msiexec.exe Token: SeUndockPrivilege 3640 msiexec.exe Token: SeSyncAgentPrivilege 3640 msiexec.exe Token: SeEnableDelegationPrivilege 3640 msiexec.exe Token: SeManageVolumePrivilege 3640 msiexec.exe Token: SeImpersonatePrivilege 3640 msiexec.exe Token: SeCreateGlobalPrivilege 3640 msiexec.exe Token: SeRestorePrivilege 2652 msiexec.exe Token: SeTakeOwnershipPrivilege 2652 msiexec.exe Token: SeRestorePrivilege 2652 msiexec.exe Token: SeTakeOwnershipPrivilege 2652 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4860 installer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4860 4364 tmp.exe 88 PID 4364 wrote to memory of 4860 4364 tmp.exe 88 PID 4364 wrote to memory of 4860 4364 tmp.exe 88 PID 4860 wrote to memory of 3640 4860 installer.exe 89 PID 4860 wrote to memory of 3640 4860 installer.exe 89 PID 4860 wrote to memory of 3640 4860 installer.exe 89 PID 2652 wrote to memory of 4852 2652 msiexec.exe 103 PID 2652 wrote to memory of 4852 2652 msiexec.exe 103 PID 2652 wrote to memory of 4852 2652 msiexec.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe" /rsetup2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms.host6.3.4ru_mod_mod.msi" /qn3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 877E4AA018748C780A7EEC376F9507412⤵
- Loads dropped DLL
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5c9704931d887685d96ce92d637d84045
SHA10875a71e9118ded121d92f3f46a3af1ec8380f8b
SHA2560448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826
SHA5123b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260
-
Filesize
6.0MB
MD5c9704931d887685d96ce92d637d84045
SHA10875a71e9118ded121d92f3f46a3af1ec8380f8b
SHA2560448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826
SHA5123b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260
-
Filesize
6.0MB
MD5c9704931d887685d96ce92d637d84045
SHA10875a71e9118ded121d92f3f46a3af1ec8380f8b
SHA2560448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826
SHA5123b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260
-
Filesize
7.3MB
MD5998f9b9eefeddbfc898356139220bab3
SHA1324bb9170598a73ce7f1359da7a35a6065f22f8e
SHA2560230d36dc995c5fa25b6dd3f33c670fdf5f06c014a0b2d1012c064d733e9d81c
SHA512efea0f628fca55733a29cd6c05aab11b8b4e49153d9ae94340daa00e5cb47f1ce4c2c2a3d9fea6108205fcb3a13ca13a4d533f47c561e8785f529d58c95f08e7
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7