Analysis

  • max time kernel
    88s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 04:59

General

  • Target

    94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi

  • Size

    1.5MB

  • MD5

    9c8696dbb48add540a75737327c537d2

  • SHA1

    78b4eb7d363e017eb06e03408d7952bbb843f9a9

  • SHA256

    94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a

  • SHA512

    6ee26ecedd0386eca113e61086f6623b36ca093d24e41d90cf45412072d94d91dddb39c86ce726c3514da3d0221d3cf03455b00cc5d0987ca63d45c12225cf4a

  • SSDEEP

    49152:yErvYpW8zBQSc0ZnSKeZKumZr7Amyq3TGtezO:RYQ0ZncK/AEs

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1872
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 470EB73D076EC9B6ED34BC297D6674E0 C
      2⤵
      • Loads dropped DLL
      PID:4208
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2124
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 01F074FDC9745797A8F2A15136CB59B2
        2⤵
        • Loads dropped DLL
        PID:5092
      • C:\Windows\Installer\MSI7F64.tmp
        "C:\Windows\Installer\MSI7F64.tmp" /DontWait C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Local\Putty/setordinal.dll,bhuf
        2⤵
        • Executes dropped EXE
        PID:3708
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2576
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Putty/setordinal.dll,bhuf
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Windows\System32\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_765773b8.dll", bhuf
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:5104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e577deb.rbs

      Filesize

      1KB

      MD5

      e610c3b3ea0fbb358b684d9634dc3b8c

      SHA1

      9c7b2ee2de7b1ef30bb72f1b162ccb8f53172ae3

      SHA256

      ce3a36b7f12e56482633270eadcf0f29e97340e7509cfd9cd0a97dd6e83b942f

      SHA512

      59b5fecca067fc399762f38ef26d90f6e5542c27aaf96785216cca1f5b20c6466dea201cba918639bc474a67ae7c0162157c9e84ef8e2a902212e46ef7b05c89

    • C:\Users\Admin\AppData\Local\Putty\setordinal.dll

      Filesize

      809KB

      MD5

      4b8ecaac3e8a17382932e3daa29dc688

      SHA1

      3ed854b6fda284fdad105cb158949edd9276cd67

      SHA256

      61925bfd71b4d2be670b0bd373b33645d6af062e5d41cb2b6f6c984acbd69de3

      SHA512

      de0459c85786c97ff1b5b0051139fb30fb56cfba45b56384adf8d813faadda0fde80fe9c5fb99aba356d8f0e43f61a8b1bdc232cf12d5f3ba4c99403d9c7a8e1

    • C:\Users\Admin\AppData\Local\Temp\MSI4C2C.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSI7E38.tmp

      Filesize

      384KB

      MD5

      691334e4071e9a07554c04f8efd8c9f2

      SHA1

      f7904dec0c31d94ef6370503c062458a0afad5bb

      SHA256

      6629b517ae6dc1fd406889db00cafc6b060513defbfc6620ff7781e7a668ebb8

      SHA512

      8eba08bef0e24e532b5b866677bb2447c543b4fd70e1dcc968c3e176fb7fde7b0a335567fbfdde47639a0e17b396c5cd11eb4793b6f41340668f6946c33c4d51

    • C:\Windows\Installer\MSI7EB6.tmp

      Filesize

      302KB

      MD5

      aded98c0bac3fc5f13b6594cb994d992

      SHA1

      d0ef9c42a4fcda02c0853662fd0f8b509fe6916c

      SHA256

      1fa420dd1230a332317712bc5d527183e727a70e352a503f9ef0dc6fb6c5fb43

      SHA512

      83e60549108da7e4b136adaabaa29c1ecfa04d5d765e2c21f7bc6ddf63bf835ea2f2666e69cd4a49fb8370946c3feacb25be141dcc19efac1c9f455214c8834d

    • C:\Windows\Installer\MSI7F64.tmp

      Filesize

      46KB

      MD5

      930ad88afc6659e00f4d190d23ae623d

      SHA1

      fe423b990ecd72454222ea25ceb50d177147b3f0

      SHA256

      2580cf122256e686ffc5da81b98b63bbc4d44ccd87fb81d7b60c90574b84779b

      SHA512

      505be3cd9747652a4f37ba2fdea6c93da62d571b065daf23653dd0e5054eb9bc8d77aeed65423d9aa5d99b09c3eb5a56294dce7bfa6732cab523372cc0cc3edc

    • C:\Windows\Installer\MSI7F64.tmp

      Filesize

      37KB

      MD5

      f8ba5c38ead9abc96e62250d60629914

      SHA1

      20b09af89d9bb40424665465dc4b489880112541

      SHA256

      bab43f505747f1e17f6e6010ad64694aa50376ba3b16c91bf87647d23146988a

      SHA512

      bb5430463dc8a08a6eac6ffde91d5a333bb1a87b9088a955cd5c5e1683ce53f4e902be05bc4ae249f214048637ab685b5476ee843c0cf3a07577d5d29af3bbca

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      693KB

      MD5

      054595b41814a0c8504a5689cd2aefa0

      SHA1

      2c58d49f8b0c1b0c6da8a9db6c060b2e1792b1ec

      SHA256

      18ffb3b6d4b2ce4072443506ed9b98566f914a0835e51f1ab7edd59201509437

      SHA512

      cb33ec9be0db47e745aec62b5b0512c2e40c818d2c359a966cbc2d1bca8e5070d730ae89278c534a39f9e3c38a53fffe5df78faa133f066487707b46a96347a1

    • \??\Volume{14f6f45c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{cfdade96-b6be-4379-a717-a5fd3c0baef1}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      8f3c2eb98215190f380cbe63b4a0a100

      SHA1

      1a44d5631722268cc411a60d4131fb97838b534f

      SHA256

      89fcf0ad13b96c6a315c0a2abb7ec08330d49f795fe4e492ce32cb65b47dc764

      SHA512

      e60ca2520a784e018689173221ff840aeac92e96c65a566378ea827aa99a4c8f236b3c1b2e261c06dbfd223e60f2ea7c1d6f4d2a61dc1cae465d77d3c21f007f

    • memory/3428-66-0x000001D6923B0000-0x000001D6923C3000-memory.dmp

      Filesize

      76KB

    • memory/3428-71-0x000001D6923B0000-0x000001D6923C3000-memory.dmp

      Filesize

      76KB

    • memory/3428-68-0x0000000180000000-0x00000001800D0000-memory.dmp

      Filesize

      832KB

    • memory/3428-60-0x000001D692390000-0x000001D6923A4000-memory.dmp

      Filesize

      80KB

    • memory/3428-64-0x000001D6923B0000-0x000001D6923C3000-memory.dmp

      Filesize

      76KB

    • memory/3428-65-0x000001D692370000-0x000001D692381000-memory.dmp

      Filesize

      68KB

    • memory/5104-76-0x00000253F2A90000-0x00000253F2AA3000-memory.dmp

      Filesize

      76KB

    • memory/5104-78-0x00000253F2A90000-0x00000253F2AA3000-memory.dmp

      Filesize

      76KB

    • memory/5104-77-0x00000253F2A90000-0x00000253F2AA3000-memory.dmp

      Filesize

      76KB