Analysis

  • max time kernel
    123s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 03:58

General

  • Target

    e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b_JC.msi

  • Size

    527KB

  • MD5

    f21e7ee2ee6ab192ea920d1dbacbfc3e

  • SHA1

    7df2489e660c9f0f060b2897d732deb51a5dea37

  • SHA256

    e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b

  • SHA512

    10bdbb79d00dedb5945c6f2398d2bb6a438da80bb7273405dab3f3c19e2ef1493e66f9e6d0110ad31bec40c4c70c6ab80112e7101db4e6bd0e09cf40a86f86b6

  • SSDEEP

    12288:kfkdlY5AVTqp4nb5roPzfGXSjptsrYI21wlD:kfkdlY5Awp4b5fXSjp2b

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b_JC.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1540
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2ED057DC74E98C22F3762932C80E4AB2
      2⤵
      • Loads dropped DLL
      • Blocklisted process makes network request
      PID:1412
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2776
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B4" "0000000000000588"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f7773fc.rbs

          Filesize

          1KB

          MD5

          43d4fbf95fdbf957ecc58fa11f307134

          SHA1

          c793573537ac8c42f4a1d6bd6726eb50e8ee1fe9

          SHA256

          c727d0e8f0471f37cc3256b8af24569cc2484d65a8fc31868fd14c034560cb59

          SHA512

          c113d9cc913801f69d33ea5037ce699fb431624dccdd1d67dba21b8afc838e03384fdd5e2342d96eba4c07eeada7d70c2fa016491237cf86a53007b4b6650418

        • C:\Windows\Installer\MSI74B3.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • C:\Windows\Installer\MSI7A30.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • \Windows\Installer\MSI74B3.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • \Windows\Installer\MSI7A30.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • memory/1412-15-0x0000000000280000-0x0000000000282000-memory.dmp

          Filesize

          8KB