Analysis

  • max time kernel
    132s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 01:55

General

  • Target

    588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe

  • Size

    58.1MB

  • MD5

    2c0e631815c43c426990837a3eb6a64c

  • SHA1

    e635bfcde96106c15781fbbf8b4212c3da547025

  • SHA256

    588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4

  • SHA512

    72b0f9410af3fc4c75eb003d19e07db4228922b4bef173a6face1d4f4d9a666f38bbe7920b0759c5e9f053901c90b7167d7b3d4eb09607106f764059654c3069

  • SSDEEP

    1572864:R7KtQ4RVxPQVr+8+o9hLeypNKFj6mUqHYJG:R7Kt2rAyHAj6mUY+

Score
9/10

Malware Config

Signatures

  • Detect jar appended to MSI 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 22 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe
    "C:\Users\Admin\AppData\Local\Temp\588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\ns24CB.tmp
      "C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\ns24CB.tmp" "C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\setup_asm_x86.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\setup_asm_x86.exe
        "C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\setup_asm_x86.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\SysWOW64\MSIEXEC.EXE
          MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{8C9F11A2-A2FB-497C-A679-6684A433A831}\Adaptec Storage Manager.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp" SETUPEXENAME="setup_asm_x86.exe"
          4⤵
          • Blocklisted process makes network request
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2572
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F938D78DFBD3147F665C68C5444F4604 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{489BF157-9664-4548-9C0B-18EBBCB1A4FE}
        3⤵
        • Executes dropped EXE
        PID:4568
      • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{08F1FEB8-CB86-4AB7-89A1-26B6293845C4}
        3⤵
        • Executes dropped EXE
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DD3F880A-95B7-47F3-A86E-CD64FA48ED6A}
        3⤵
        • Executes dropped EXE
        PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_CEB51F68387559C4CC9436E689F5D3A9

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\Local\Temp\MSI4A4E.tmp

    Filesize

    57KB

    MD5

    90ed4938fd712e3ac49dfdff0ff63cc0

    SHA1

    f3ae0ec59bd8fcb578310942bbf17c047d4895c9

    SHA256

    9d3eee64d97e0b082a2ab26f997b29fd6f16bb49a70b711fdc241fca079c788b

    SHA512

    c35ae7a402a01155a9aca294ee88a4029eeb2c560c25a33acb3e35d7060f8fa02d6bc0289b6cf44ed4e516cbd21a7c7b0843172d2686dc3a7270f40be08e0f70

  • C:\Users\Admin\AppData\Local\Temp\MSI4B49.tmp

    Filesize

    125KB

    MD5

    b0bcc622f1fff0eec99e487fa1a4ddd9

    SHA1

    49aa392454bd5869fa23794196aedc38e8eea6f5

    SHA256

    b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

    SHA512

    1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

  • C:\Users\Admin\AppData\Local\Temp\_is4D2C.tmp

    Filesize

    437B

    MD5

    3683743946fcf6f919bbadac2778304d

    SHA1

    83085b25e93914c58c5487a06e78289f1fdbbc38

    SHA256

    862db3751a376dc8fdd31a341cd8183f5487dcb22b18fb603113d58c56bd0398

    SHA512

    7e2e9e1d5791ceac75bbe4d6e6982a87af8bc62c21f21e60ff153e5cfd5f8e0f1f61f6a343e7af6446631a363b08f1f29c8a5a41b7f29e216e37d9c09c2d6e76

  • C:\Users\Admin\AppData\Local\Temp\issDC48.tmp

    Filesize

    1.3MB

    MD5

    e9884880c2c144aec14843b5b56a18d8

    SHA1

    7eb50576519bdad46e9fb00791d12a0857ed71fe

    SHA256

    4ab41b99157256823462ecb9c140f0c43a4928e0d1656ed36856c535b15f8fb8

    SHA512

    4733999d033186eb218c22d66f274bbdb304063bb606d9ed9ea7e7c3a86bace7b920580daf84b6a91d5a4f991f817b004b10b963966ace30d8e707f02925d221

  • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\Banner.dll

    Filesize

    4KB

    MD5

    6547d1af397e1f2719c53a99fb43bd7a

    SHA1

    1c6000b23c9fb52f0ac8d6d77fa7a06a61f25e2e

    SHA256

    19bc489f1e958abd0f47bc5d6c199a9bf74b379ddb0e2fca7b6ab4eeb9452848

    SHA512

    6f135848d212754315815ccae1b5f58dc2dd1b0dbe043fec947b75e0f6f81d5a0cf5f23496f7938fdb4391b83bb1863a12bdfd8a946044d0b881da6282c1989f

  • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\System.dll

    Filesize

    10KB

    MD5

    da802677276c27b430cfb11c9da0bed2

    SHA1

    6893b15fdd34fae3d35bc5b01355a5a919dd9a7b

    SHA256

    756861c52304402a3fc2e0fc9f3ecc8ebb546916fc2812f1df5f2e63da1c5a82

    SHA512

    0b212788ccca336fe228335189ec3bd0dc207c296cf3b219a88511c44735f8e1913bf745699be0f29078a47adc0442e4ff891c0877541ccbcfa1ad5e4dc1b187

  • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\ns24CB.tmp

    Filesize

    6KB

    MD5

    2b81b005983d2147fd587f6a54e2480e

    SHA1

    cb21d91fa43bec9b6948fdca4f312949e71beb9f

    SHA256

    e2b3645086c5e0c75e3676db80fdb5d6a31e0f5bc7ee1689d077de1d02f46e7a

    SHA512

    b436f636824291301543a3ecae879139bce22b9246cd01da4f1da65aa51122ce18feb53886eba398f51e991677c694ed244b0521a32d27be40c98523c0a845fb

  • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    03a1a9be1f1e72f926ec9161825eedd6

    SHA1

    d0574bafc615168c021788d413a3a73d275c492d

    SHA256

    8a8bce943b78093ecd86a42c203931ee625f445acf5cb5b705e3b7eaf29c7110

    SHA512

    8d82e15ee109d2236a995990fdd0c9fb39c9d3c4dea1c063f0806314e7a9d09a112f4f09091c265adba9f86ec7a0977294cce112e20ffb2f8b3ad62ab3dac396

  • C:\Users\Admin\AppData\Local\Temp\nssD1B.tmp\setup_asm_x86.exe

    Filesize

    52.4MB

    MD5

    de680c6af34c14fedf12a808d4a80a2b

    SHA1

    c01c5739f2cda08c95d10bc511dbb5d5b7434567

    SHA256

    7c2875b7c3ef4368ea6af08d7b51779d8c158a5a8f5a28ca8374f1ed4ac17686

    SHA512

    9a88768afd560f28d2e2f3109ef287b8e79a1a4a87d27477b840e560b16fc0a13f17b570580373aed3eddc9617d7c6c1ab421803481b96d283b4d9aac2cd5ef4

  • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe

    Filesize

    104KB

    MD5

    41cb698f967b4d9f2580ea2a21a5a710

    SHA1

    1e2db1ac09d0cfbd6601b95c2a1d78a80f78e236

    SHA256

    10205dd8642824f9c81f32e73d8402e892a839b71a13b3816f548f3805fded8b

    SHA512

    7e2f439d2ca8369c771819f8d137ec96822ea63ede9b34b10946343ea14b0b1cb3b828d43c17fb3c6c6ac8e2bd7aec4ee77dd6cce861706d476af1150d85a158

  • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISRT.dll

    Filesize

    255KB

    MD5

    0ec6b3d99d56f9fb9078b24d3b5ec4eb

    SHA1

    f56262260561f5c342661a4956ee96eb1c84946a

    SHA256

    eccd250aed9710a4b58f09bc2eea62bc5f9e181efd85dcbe2aa11d61f7a9c520

    SHA512

    3267e8648b599cedf84a8b2fff8405e6c0662264fed9707e0c89791d4c9e33845576bd96cb3d17621d5e4cde5cac07526e11791bd0ef8017fcc4b441ba304465

  • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\String1033.txt

    Filesize

    204KB

    MD5

    f9e229f43602a309eda918cd01593d3d

    SHA1

    1cefd11fb16b4f70f5dde5c6784b36c3afb072f1

    SHA256

    d8092829d8caea3cbef23d594f9de5e2bafc6b6ea63dbba0f2a3ee3056c33462

    SHA512

    c1164cff26455b7c7d65cf0b8003961df84fad8a0760dd908004c8eb11a012755cebe132831a1399586c6e052eb1973d0c97bdb477a72d515865d3d82e5091d6

  • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\_isres_0x0409.dll

    Filesize

    545KB

    MD5

    96a7ecd707ebcdd47e3a72e4b10fce6a

    SHA1

    6d69ab012e86b15409e6f4ad772866200052796d

    SHA256

    b65b04c73e7cbb2132faa0adb2e3a1ff1120470f1aa4440a5d7000750bb95b02

    SHA512

    28eab950039b67df05e7675724806b1630524752097fede48e62dc941b9c9e971bd9ac5cde6816ae40b76fbe10d0da0fe75f53002e0d1dc48b87736e56cc65c2

  • C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\setup.inx

    Filesize

    321KB

    MD5

    a13e6486c97f6d21f0d3aee8307b890e

    SHA1

    2fb258951625931d51fb654f5674497a9f076f95

    SHA256

    5cf3b88bba1f4e136916c593825250ddf70d5c6cf1d78ba0081768cc64fad98c

    SHA512

    58088ac72eef70c3a6b10dbf7d87d253abcac405cf8b5ed66c3ff13837250452b16015a6f62618905f88179eeae41ab9ba0fac124860cc4b19e2be47382f5aef

  • C:\Users\Admin\AppData\Local\Temp\{8C9F11A2-A2FB-497C-A679-6684A433A831}\0x0409.ini

    Filesize

    20KB

    MD5

    36affbd6ff77d1515cfc1c5e998fbaf9

    SHA1

    950d00ecc2e7fd2c48897814029e8eedf6397838

    SHA256

    fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3

    SHA512

    2f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808

  • C:\Users\Admin\AppData\Local\Temp\{8C9F11A2-A2FB-497C-A679-6684A433A831}\Adaptec Storage Manager.msi

    Filesize

    49.8MB

    MD5

    c7f0d269f5c537595da4f86082252a22

    SHA1

    290af8d17df535f328b4c042173cdb5ebbd2ec73

    SHA256

    7184076c34d84b639a0bfee29f80d60e523b416308d61670096b11c20609dea3

    SHA512

    37168b24dcde8ee600e624d52f182adc519e8a20c9fde7f161d7c4bc3aabede606eb9d4ff1f9d08307e646e2a5177463d2684ec815b8e31bfbd91af0b44c0f5a

  • C:\Users\Admin\AppData\Local\Temp\{CF93D87B-FCC9-452C-9A1A-D0EAD7B34B70}\IsConfig.ini

    Filesize

    1KB

    MD5

    42d0839f49601e747ec4ac60d1fa5fae

    SHA1

    e99a1a8698ae552c519d4198f4e631d9e7c8a8c7

    SHA256

    7c9d098f4b70283c617dbde2c2b4dde0a5ff10174e60945b76fdd537b283ae60

    SHA512

    b8b1d18869e93b9ed9b21a2ea8be64a5951f114b1234f4fc5524085434ff1ed4e3c3e9a8727f0fddd3c312001c8ef9e6fd531924692c6f402724010a2cbc8e40

  • C:\Users\Admin\AppData\Local\Temp\~4999.tmp

    Filesize

    2KB

    MD5

    1cfc7c1ee5f7be20a2224f5801570275

    SHA1

    c06cbdab64a1b80915df51267a3593eaf0b19264

    SHA256

    a7df5e52ae7d744d587f621b3abb14fa23941531402cf0b09db7f60a56c78fc7

    SHA512

    95f63be015984a9d8622e742df0ce401880bc326431c16a0df0edf548160d52aa0e5493e8a59d5e297a7abd37c5dc7f0fa07dda7606c09cea275add68b1b2c89

  • memory/4444-218-0x0000000002EF0000-0x0000000002EF2000-memory.dmp

    Filesize

    8KB

  • memory/4444-199-0x00000000038E0000-0x0000000003969000-memory.dmp

    Filesize

    548KB

  • memory/4444-193-0x00000000030A0000-0x0000000003141000-memory.dmp

    Filesize

    644KB

  • memory/4444-173-0x0000000010000000-0x00000000101B4000-memory.dmp

    Filesize

    1.7MB

  • memory/4444-219-0x00000000030A0000-0x0000000003141000-memory.dmp

    Filesize

    644KB

  • memory/4444-174-0x0000000002E90000-0x0000000002E92000-memory.dmp

    Filesize

    8KB

  • memory/4444-207-0x0000000002EC0000-0x0000000002EC2000-memory.dmp

    Filesize

    8KB

  • memory/4444-222-0x0000000003520000-0x00000000035A9000-memory.dmp

    Filesize

    548KB

  • memory/4444-194-0x0000000003150000-0x0000000003152000-memory.dmp

    Filesize

    8KB

  • memory/4444-195-0x00000000030A0000-0x0000000003141000-memory.dmp

    Filesize

    644KB

  • memory/4444-206-0x0000000010000000-0x00000000101B4000-memory.dmp

    Filesize

    1.7MB

  • memory/4444-234-0x0000000010000000-0x00000000101B4000-memory.dmp

    Filesize

    1.7MB

  • memory/4444-236-0x0000000002ED0000-0x0000000002ED2000-memory.dmp

    Filesize

    8KB

  • memory/4444-239-0x00000000030A0000-0x0000000003141000-memory.dmp

    Filesize

    644KB

  • memory/4444-240-0x00000000030A0000-0x0000000003141000-memory.dmp

    Filesize

    644KB

  • memory/4444-241-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

    Filesize

    8KB

  • memory/4444-244-0x0000000003560000-0x00000000035E9000-memory.dmp

    Filesize

    548KB