Analysis

  • max time kernel
    1s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:30

General

  • Target

    VPN_Windows_Installer.msi

  • Size

    18.4MB

  • MD5

    240f6fcaea6b562d40decc19193e0f40

  • SHA1

    8fb8e0668d021a705e5beda16152492ac8d29a29

  • SHA256

    46746aca3805982e8b7ace71e9505f6f46fc77e1ff3efce20d7844f216b6ac9c

  • SHA512

    989d7b6f493d4a364180c84c4022a544d147b6e7c7ed49f42f730121901765cfc14df9483c3fad0527aa323e052f89c67d80a78e9f970072b53f187b93ad57c8

  • SSDEEP

    393216:jcf5oB4c6CdthqMCEnzFRSw303xb9EfVAhAK5yTVTmLDrSHL:koBl6Gq7Ez/SwkB5E2mK59ur

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\VPN_Windows_Installer.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2028
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
      PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      18KB

      MD5

      db468d2610152f1a447ef6d6c5fc8f11

      SHA1

      792593c400479f25495e848720021c868f033ca1

      SHA256

      f0edb45bc18b382f59af938b64adffb8bb23311168b7b17340a39a9cfb5e80d0

      SHA512

      b3a057a0da75ba4d2adecd4f1c499d4f4f94e8235d10a7b0c6f9cb977b4dd10ffd60433107bf8da12cfb7d7c13b38966b7e9ae8e174e8f1e0e39d421cdb5b316