Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 16:33

General

  • Target

    COMPROBANTE-DXP824387-52-23-25-234-23-52-45252-45-235-235235.msi

  • Size

    1.1MB

  • MD5

    5e2f3837aff5f7490f19656c1f60d177

  • SHA1

    ae46b08278c72c505d28f680650ee88725856e72

  • SHA256

    f58adebd3bc565e8b1c9a1711f142d43600ca19de16454b79da89b2d62dd0455

  • SHA512

    e015661881ec8ab6b083740e594b242b28fa979bc608b38d06a1d5046348b72ad41df4d178685007931022aefbdc903cc5ab2ea02aa84de3531c465cf6e0c71b

  • SSDEEP

    24576:r0Ute5Nk8RsenMoyr8x87B2SoxD4zHQLTtuaGY5Aq:r0UAlvyrRQSZHQLDGY5A

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\COMPROBANTE-DXP824387-52-23-25-234-23-52-45252-45-235-235235.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2268
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B19F438181855E498629F3D9B6FC2727
      2⤵
      • Loads dropped DLL
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\lc162F.tmp
        "C:\Users\Admin\AppData\Local\Temp\lc162F.tmp"
        3⤵
        • Executes dropped EXE
        PID:2600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Installer\MSI14E8.tmp

          Filesize

          75KB

          MD5

          18bf7260993c39fe2166281b8f948890

          SHA1

          9dd19591f59dac0d707ed20086eb8d410cdd01fb

          SHA256

          35892c90693f3c06c9a25af331a01f266d1ca060c2142a08bcf0d056c4b3cb56

          SHA512

          55b623fefa9728d63aa29d9bc24c4c501f4777d43f46392dd476d86f12de06977cdfa21e1d8fd9398f7a8507f297a32539d10908840685fd0213abc091d556c5

        • C:\Windows\Installer\MSI1809.tmp

          Filesize

          227KB

          MD5

          082dce3a1ccde3921731988438d45eec

          SHA1

          0928726fb1bd345f2187ac5dd30556b50e84c6ec

          SHA256

          4d1782ba84a744d9aeb8a8b7b9b49e994be2c169e74a48bd1ed28ce585a191e0

          SHA512

          39eb588159c07fce1263c71d6efa0fad75f56a2c1c153c0b125cac62d015bcddda857ef28297c0255999e3f0200bdbd0fa49ddd2e90da4b2f7be75997e3c5f6d

        • \Users\Admin\AppData\Local\Temp\lc162F.tmp

          Filesize

          12KB

          MD5

          55ffee241709ae96cf64cb0b9a96f0d7

          SHA1

          b191810094dd2ee6b13c0d33458fafcd459681ae

          SHA256

          64bc6cf6b6e9850cea2a36cabc88982b0b936dd7f0bc169a2f6dd2a5d1e86abf

          SHA512

          01d05a5f34be950ec660af9e1de5c7d3c0e473f7815c2e13157c0b7bf162ca5a6b34fabc3704ba6e4fb339a53b1a20862fe984e16feca81f45cf4a0f98e01c07

        • \Windows\Installer\MSI14E8.tmp

          Filesize

          91KB

          MD5

          9f1e5d66c2889018daef4aef604eebc4

          SHA1

          b80294261c8a1635e16e14f55a3d76889ff2c857

          SHA256

          02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

          SHA512

          8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

        • \Windows\Installer\MSI1809.tmp

          Filesize

          823KB

          MD5

          b40467c4e5221801eeae2bd7e9a37e01

          SHA1

          fb1d74573b863f62c60684c36991b58b2d75cbbc

          SHA256

          bddd998615dd0527feb37499ed93f38bef6c8f715616704ac910c6197456a1f3

          SHA512

          a78d60cd476de775bb567a70055b00684aad3638b16508db4d52f568589738c7db3fb05f70f40238033c1be8d774246d08548567c49b50950ffe62fc0e871e02

        • memory/2792-31-0x0000000002C20000-0x0000000002CF9000-memory.dmp

          Filesize

          868KB