Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2023, 15:45

General

  • Target

    sample.exe

  • Size

    9.7MB

  • MD5

    a2f39491c9d6e8be4a1bf05ac024fdb4

  • SHA1

    e9ebec33472c7c78900214c363aeb45027f0c8c4

  • SHA256

    6cadfb0b3edb3fd000c5df1c8853957efe2de172befc3132c96e4afeee2b0427

  • SHA512

    9635600632e65c630a629449198b323d673b9370b44e4c839b52e8a18db1e25b881ee34660e3d3b8e3303d9b07a459bed1bb78c10d2edf2e4890bf86f41296ec

  • SSDEEP

    196608:vOlhlJ0nBjr+3XR1qU1SoisXgLp7iy39KqQv43nKZ:GhfYJy3HSBsXgRfO43y

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\Surveillance\UNP Client\install\UNP Setup.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\sample.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2876
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 99D0CF76FC815C1B05D73817E124D029 C
      2⤵
      • Loads dropped DLL
      PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MSI4AF5.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • C:\Users\Admin\AppData\Local\Temp\MSI4C1E.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • C:\Users\Admin\AppData\Local\Temp\MSI4C9C.tmp

          Filesize

          295KB

          MD5

          574849efb63075e6694868d7e6e7447e

          SHA1

          e2c2d4e6f753c418b34cf1f8ba9d3f43ed2721e0

          SHA256

          18e4651d53945d6e429d993615317b7fd649f6963891d5792e2a4b83383958ac

          SHA512

          aa9bda86251814bc906ed1b9836b1b5e2edf864dddb3c20581d0173ae7b893f9817f68eeab5b569fb2550049de47d9e2bdafe9cacbb3aecc9632cc3675b80ea7

        • C:\Users\Admin\AppData\Local\Temp\MSI4CFB.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • C:\Users\Admin\AppData\Local\Temp\MSI4CFB.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • C:\Users\Admin\AppData\Roaming\Surveillance\UNP Client\install\UNP Setup.msi

          Filesize

          571KB

          MD5

          ba96d680b92cf3afa8f90067336488f8

          SHA1

          2a97d5e096024ee0a04d340ba980ab88cd82938f

          SHA256

          40897eda60fd3159c420f09c2893f79fa1ec3d24256f577eb336abd19ba1757d

          SHA512

          58cda03d83136454a6df1675505e3bbce91ee80efd97854e4687c8975fa0f81690130a6f07c49f57d43f5069f7c2e025097d29fe4543619343a0e8c06e385309

        • \Users\Admin\AppData\Local\Temp\MSI4AF5.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • \Users\Admin\AppData\Local\Temp\MSI4C1E.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • \Users\Admin\AppData\Local\Temp\MSI4C9C.tmp

          Filesize

          295KB

          MD5

          574849efb63075e6694868d7e6e7447e

          SHA1

          e2c2d4e6f753c418b34cf1f8ba9d3f43ed2721e0

          SHA256

          18e4651d53945d6e429d993615317b7fd649f6963891d5792e2a4b83383958ac

          SHA512

          aa9bda86251814bc906ed1b9836b1b5e2edf864dddb3c20581d0173ae7b893f9817f68eeab5b569fb2550049de47d9e2bdafe9cacbb3aecc9632cc3675b80ea7

        • \Users\Admin\AppData\Local\Temp\MSI4CFB.tmp

          Filesize

          90KB

          MD5

          1031a5104e788f0c61988df18c4f41b3

          SHA1

          c0e7bd3e6b396c716817ad4794529296d850ec4b

          SHA256

          c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

          SHA512

          773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

        • memory/1676-0-0x00000000004C0000-0x00000000004C1000-memory.dmp

          Filesize

          4KB

        • memory/1676-19-0x00000000004C0000-0x00000000004C1000-memory.dmp

          Filesize

          4KB