Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 12:43

General

  • Target

    9999.msi

  • Size

    156KB

  • MD5

    ebda5dc3980cd9246488a9446ceab215

  • SHA1

    1b16b02d423eb8dcc57673390e666ed349a91030

  • SHA256

    cc49bdc9aef4d1448eae83b55e55723ad737dabaf4b9620f48728329ce6b6cf2

  • SHA512

    5641dc04318e177b0c10d726c4f3c0e3ece55b91f9f46f3a1deb4471f81bf37eb261341987437f3db0bceea2e58f5697c0d5b2f4653adf83319c3e4f8da487ce

  • SSDEEP

    384:iHpe4ZvJXK7gzFM7Wu81j9SaoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyucjDCUyWMDC

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9999.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1216
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\Installer\MSIEC73.tmp
      "C:\Windows\Installer\MSIEC73.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\system32\cmd.exe
        cmd
        3⤵
          PID:1720
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 5CD731F58E1BDCDD56DFD4F1F3F496DB
        2⤵
          PID:2916
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000494" "0000000000000490"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Windows\Installer\MSIEC73.tmp

        Filesize

        124KB

        MD5

        57e4ce0234325fcc001f2e465d14751c

        SHA1

        6767375014b90a73b53a7851e43b6fa8fddeda25

        SHA256

        20507f00ba2b9da6ea725d676243b45da92f99fd9d6e3ab4d1c861ba31484ec8

        SHA512

        33db14230d8c0ad89fd2dbc70c40a7391f506120d309027ee00c934734c9a6784958e265b74aff689393b5d627ad056a91475c84b05cf4f77e80c97e5abbcebf

      • memory/2504-13-0x0000000140000000-0x0000000140005000-memory.dmp

        Filesize

        20KB

      • memory/2504-15-0x0000000140000000-0x0000000140005000-memory.dmp

        Filesize

        20KB

      • memory/2504-29-0x0000000140000000-0x0000000140005000-memory.dmp

        Filesize

        20KB

      • memory/2504-30-0x0000000140000000-0x0000000140005000-memory.dmp

        Filesize

        20KB

      • memory/2888-16-0x0000000140000000-0x0000000140004248-memory.dmp

        Filesize

        16KB