Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 18:54

General

  • Target

    Русификатор от Tender.exe

  • Size

    3.5MB

  • MD5

    be2056b6335f11fb674001812a31d6da

  • SHA1

    850ad38764d8c5c704d71e07cffa226ee09b72c4

  • SHA256

    d77467b2bb59904f96076c3ac47a0a897f22d44be0525675115b650ef7cdc673

  • SHA512

    28bae0fb87d7a644e2d6c364f33e2a4d557935c4855e1e420c4cb93f28aeb005eb98c954d14d5b486c818f023f43ed7056e28975d892d16da853bd1c44010486

  • SSDEEP

    98304:u35E+vGaiDnXGtwcmoQvoTn0iNYxbx0AUYnkPOY03BJ:8vGacofn0jbGYnkWxJ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Русификатор от Tender.exe
    "C:\Users\Admin\AppData\Local\Temp\Русификатор от Tender.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\wTender_Inc\Русификатор 1.6.9\install\Руссификатор.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Русификатор от Tender.exe" SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1708110352 "
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:1628
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 15BAAD222424DD6E170576F8295117FB C
      2⤵
      • Loads dropped DLL
      PID:3060
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 331B9FFC0A52C7D1A4C0D9DC997BD728 C
      2⤵
      • Loads dropped DLL
      PID:2932
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2668
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x504
      1⤵
        PID:1872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        87fe796138e87bcde070f4a577aaa787

        SHA1

        10df47eeccfbf41376fbb889a6891d2ca3425882

        SHA256

        27815c5d7df5b3d406e3a7fdcaf5214b9ce2bdcfe5aa44d15274c78a528b9fc2

        SHA512

        2aff9243d270bc5d6a1910d6be4aa8f1f126aa7f2e11841105bd310f60b69f3a4c1141a372b19317c9d69167339cb612dc322777c1fd72d97be958db83709e97

      • C:\Users\Admin\AppData\Local\Temp\Cab6653.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\MSI6B6C.tmp

        Filesize

        378KB

        MD5

        0981d5c068a9c33f4e8110f81ffbb92e

        SHA1

        badb871adf6f24aba6923b9b21b211cea2aeca77

        SHA256

        b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

        SHA512

        59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

      • C:\Users\Admin\AppData\Local\Temp\MSI71AC.tmp

        Filesize

        204KB

        MD5

        1cffeb7376746298f7c0056ebb618c8c

        SHA1

        cd8a1409760eab9e725c93ce3b49562b8b65ec70

        SHA256

        96200a9a1147fb034b6ad2c0fc7da6b229cc9f427035d5d5570da62cdab33872

        SHA512

        aae8099b9710c09b2787189c418addae734114a432dd6346c7c2cdd67c20775465f5c73cb111a78a9a1a306d7edaed627a4063b9b78ca8e5d2d7bac6e3b1d711

      • C:\Users\Admin\AppData\Local\Temp\Tar66A4.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Roaming\wTender_Inc\Русификатор 1.6.9\install\Руссификатор.msi

        Filesize

        1.3MB

        MD5

        c26f816f234ec572e66d5c66f0e4d929

        SHA1

        950ff71c3bff98d320f5dc92946e5aa0b3f7809c

        SHA256

        0150673d9215a0c2009e06d853e76a7d51cf4ae630d375ef3b19ed70a6f528fb

        SHA512

        5d09acddbc148fccc0bbbc5299efe89f5ac55eea5f7db6cef9a536b08de89556dea68b3fb3a3cad91f24b908a29403c809ee565629b1445893194506928bf9ee

      • memory/2208-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2208-97-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB