Analysis

  • max time kernel
    117s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:02

General

  • Target

    15418acbdac891bae2c86af128d9ba53.msi

  • Size

    282KB

  • MD5

    15418acbdac891bae2c86af128d9ba53

  • SHA1

    dd0334f9f70dd037ca89e4ff399704d6d5cd7cb7

  • SHA256

    427804c962d63a68e833840acfc268ad58583b2182caecb02ec5d0f53fcb891f

  • SHA512

    68d8e2245a1e4df4f5aa1ce91af8ae3a940af8d017df723f0bde82d68eff670b8047ecca4a99281cb11a06136e3529660567e7a3d58dee3c2c0f5659877bad1c

  • SSDEEP

    3072:X3ygYXkj7q0vTYDryO1nroU6ij4qpXqnnDibAJBVkF9nY5AW3DJLgsjoY:X5ifoTqp4nwEOY5AW3DJLgsj

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\15418acbdac891bae2c86af128d9ba53.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2704
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56B252D9CF853C7DDBDBC70503BA860F
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Blocklisted process makes network request
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f76d6e3.rbs

          Filesize

          767B

          MD5

          157af611c5b540697d55740b746f1265

          SHA1

          a4ff7bbfea5add026d441d7cebb603d6fe9bdfff

          SHA256

          c46d161aace0b1c490407371a15e219448eca93aad5e62bd79ab9d1c2b37bf4a

          SHA512

          701b7ca45b9cafcb45492463001702197a98b158ed402eebaf9c15e8f41a6265f6fe5db1441e88f66b37edc342a2e53f6b2d705b5d1fc3e7fb3374530c0f6a17

        • memory/2728-14-0x00000000004D0000-0x00000000004D2000-memory.dmp

          Filesize

          8KB