Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2023 15:45

General

  • Target

    sample.exe

  • Size

    9.7MB

  • MD5

    a2f39491c9d6e8be4a1bf05ac024fdb4

  • SHA1

    e9ebec33472c7c78900214c363aeb45027f0c8c4

  • SHA256

    6cadfb0b3edb3fd000c5df1c8853957efe2de172befc3132c96e4afeee2b0427

  • SHA512

    9635600632e65c630a629449198b323d673b9370b44e4c839b52e8a18db1e25b881ee34660e3d3b8e3303d9b07a459bed1bb78c10d2edf2e4890bf86f41296ec

  • SSDEEP

    196608:vOlhlJ0nBjr+3XR1qU1SoisXgLp7iy39KqQv43nKZ:GhfYJy3HSBsXgRfO43y

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\Surveillance\UNP Client\install\UNP Setup.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\sample.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2580
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 238B676C5C93176BC1E1A7BF97A432A6 C
      2⤵
      • Loads dropped DLL
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI6FC1.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI6FC1.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI709D.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI709D.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI714A.tmp

    Filesize

    295KB

    MD5

    574849efb63075e6694868d7e6e7447e

    SHA1

    e2c2d4e6f753c418b34cf1f8ba9d3f43ed2721e0

    SHA256

    18e4651d53945d6e429d993615317b7fd649f6963891d5792e2a4b83383958ac

    SHA512

    aa9bda86251814bc906ed1b9836b1b5e2edf864dddb3c20581d0173ae7b893f9817f68eeab5b569fb2550049de47d9e2bdafe9cacbb3aecc9632cc3675b80ea7

  • C:\Users\Admin\AppData\Local\Temp\MSI714A.tmp

    Filesize

    295KB

    MD5

    574849efb63075e6694868d7e6e7447e

    SHA1

    e2c2d4e6f753c418b34cf1f8ba9d3f43ed2721e0

    SHA256

    18e4651d53945d6e429d993615317b7fd649f6963891d5792e2a4b83383958ac

    SHA512

    aa9bda86251814bc906ed1b9836b1b5e2edf864dddb3c20581d0173ae7b893f9817f68eeab5b569fb2550049de47d9e2bdafe9cacbb3aecc9632cc3675b80ea7

  • C:\Users\Admin\AppData\Local\Temp\MSI7199.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI7199.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Local\Temp\MSI7199.tmp

    Filesize

    90KB

    MD5

    1031a5104e788f0c61988df18c4f41b3

    SHA1

    c0e7bd3e6b396c716817ad4794529296d850ec4b

    SHA256

    c92712603239099ba51e519c57f1d11099732b934b595e6d527aaf1e151b11f4

    SHA512

    773a37e586e0e268b99b96b9ddf97510921f9e36e677b1fd847c971054a8257c6ba049c6e5a1996c817027978b063b2f16616c97689f9235476080adc6e7c4dc

  • C:\Users\Admin\AppData\Roaming\Surveillance\UNP Client\install\UNP Setup.msi

    Filesize

    571KB

    MD5

    ba96d680b92cf3afa8f90067336488f8

    SHA1

    2a97d5e096024ee0a04d340ba980ab88cd82938f

    SHA256

    40897eda60fd3159c420f09c2893f79fa1ec3d24256f577eb336abd19ba1757d

    SHA512

    58cda03d83136454a6df1675505e3bbce91ee80efd97854e4687c8975fa0f81690130a6f07c49f57d43f5069f7c2e025097d29fe4543619343a0e8c06e385309

  • memory/2000-0-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB

  • memory/2000-19-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB