Analysis

  • max time kernel
    132s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 14:49

General

  • Target

    1.09_1.09_full/DISK/GReddy e-manage Ultimate.msi

  • Size

    1.6MB

  • MD5

    f0778b7bc125b476884ddf6c60354e54

  • SHA1

    b65f147220f5759dfd850454f42a6a4ea5cb25e4

  • SHA256

    f3d8b8eeabd8abd93ea2c9a91610b10ea65ce2c9c85fdea203dff21a38a5cca2

  • SHA512

    9b6fd41758d23126aeb7c8cb1bfc47898bfeb68fdeac8e9c9ed4bbaa559e80aa9501d444f92ccf09f0e9b616c4f59ef273ce1026fd86ff6cd25d48a48cee1cbc

  • SSDEEP

    24576:SJ3r+K7vay9ml1IeTFP9Bzj/AfNdyd0kGdc3ZwwNRH:SJ3D7vl9mlfP91/k7yX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\1.09_1.09_full\DISK\GReddy e-manage Ultimate.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4388
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DF756DC1F7D08CB9B48B8A04DEEE96F9 C
      2⤵
      • Loads dropped DLL
      PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIBCF2.tmp

    Filesize

    196KB

    MD5

    1241ff8b59071c3059e6a0cdde42e74a

    SHA1

    8d9fbebf2bfd85266d201e7cfa44d4b7fea027c6

    SHA256

    602ee56d2dbf86831017d6eb17c11133146e522be1f0b124cf523f62ee18afc2

    SHA512

    7119b316610d6cf567305b0f95128fb881a03565a9e64f03ece712d43f4fc8ff63e247b9a53582c4ee12cd0048f0c94f8bb5c99478a32595cce6c42cd39e91ea

  • C:\Users\Admin\AppData\Local\Temp\MSIBCF2.tmp

    Filesize

    196KB

    MD5

    1241ff8b59071c3059e6a0cdde42e74a

    SHA1

    8d9fbebf2bfd85266d201e7cfa44d4b7fea027c6

    SHA256

    602ee56d2dbf86831017d6eb17c11133146e522be1f0b124cf523f62ee18afc2

    SHA512

    7119b316610d6cf567305b0f95128fb881a03565a9e64f03ece712d43f4fc8ff63e247b9a53582c4ee12cd0048f0c94f8bb5c99478a32595cce6c42cd39e91ea