Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 03:39

General

  • Target

    7b6a6b8f6576ab126abd9b7fe0c47f10276308b048c9fc14cdc8cc02341e23b5.msi

  • Size

    1.5MB

  • MD5

    6add9a144bdae4d75929552ef1468096

  • SHA1

    06651081372a54c5353a318c693163936234a0de

  • SHA256

    7b6a6b8f6576ab126abd9b7fe0c47f10276308b048c9fc14cdc8cc02341e23b5

  • SHA512

    60c436b09a5f22646daffc265bcb463c2c5fe38bad60b24ee951a4f540f6d8b1f5092ab72ef63844342f56aa9c2e61621392519fc461dc5b66150c14273040bc

  • SSDEEP

    24576:9f4GgXTU0yONfALfT9Qw4trPoMhlBb7/nSej8AxLWBRqJPim4z5Qnx:p4G8UVLbqhlBb7/nSej8AJWBRqVCz+

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 26 IoCs
  • Loads dropped DLL 25 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7b6a6b8f6576ab126abd9b7fe0c47f10276308b048c9fc14cdc8cc02341e23b5.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1992
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 85E1D99686C756179F435746F05F0CDE U
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      PID:2160
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D0C92E05F5DB59AE81031249535EDF52
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3033.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259403938 1 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2928
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3333.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259404608 10 tiho_exe.cs!CustomActions.DownloadAndExecute
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:1572
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI47DC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259409866 15 WixSharp!WixSharp.ManagedProjectActions.CancelRequestHandler
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2044
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2268
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D8" "0000000000000540"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f762d1d.rbs

      Filesize

      7KB

      MD5

      6cfe607b53d683a322893e064ddb12a2

      SHA1

      441dde584e7519d31ed4bb18b6cf7329ec9b0381

      SHA256

      1709428498fdf61905f797597a4f342cec234ee406706bf07e1e92602b82ed50

      SHA512

      42e7265525f0e200c85bdaf2d03448fe9bc3ba5f679a071659427e8d0cd48b2b4e568690892eb71fe82472c73b97c4f1050d84a6e9f9d9e1ce3646f57cef6222

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763

      Filesize

      1KB

      MD5

      866912c070f1ecacacc2d5bca55ba129

      SHA1

      b7ab3308d1ea4477ba1480125a6fbda936490cbb

      SHA256

      85666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69

      SHA512

      f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763

      Filesize

      326B

      MD5

      bdc24d1dded67cbb5878cff4dcef7b35

      SHA1

      1496cdfd55e2ebb2eb4f527b903c0363f0d2661b

      SHA256

      28d599e56819f3a4f5d9a6b7449913d126862c581bb7892868cc3cc43b8c0aeb

      SHA512

      2201b4eb04e965de6df13d04beb7c67ccc353b3df629d3ef0df6da35ce5bcb86566f3209ca0b4b8c9733f0375362938a6b7301c37092a39dee76494fd6697875

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fce35e77e011cdd25d4d924200c37bad

      SHA1

      7da59d0ec0ee0499f7018ecee13cb12ee540113d

      SHA256

      b39ab42c3e8af97ad51cafd0eb0525c7eb57c4702e1e79d5f4dba973a5f957dd

      SHA512

      91baa0e1994d8c108464450daf0acd8008540c063c05ab8a7b860b06e63eb4febd535ea3b9fc8f42677315a92e2e5366d61753e738e126f9648f0a6f0e39b009

    • C:\Users\Admin\AppData\Local\Temp\CabBF4.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\MSI20961\WixSharp.UI.CA.dll

      Filesize

      443KB

      MD5

      a57be6fed6a194b4f4a87d2209a921bd

      SHA1

      bc3d8fa993246f7b18d563f7d1fa395dafc06a7f

      SHA256

      ae06a01b6dcbc40ef0c4ca5a0e91ffb6cdd7eeab12f5b916ba9ab17163a1eb67

      SHA512

      7a7eee00440ac7ad57180c1fb9284eb039e69fe5a2e715056e3a171c0ed6bc03c063541ee079d45d5e49b85c43fbe1be7cfd9b461009de2529ebdb1aa3c8a5cf

    • C:\Users\Admin\AppData\Local\Temp\TarC07.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\Installer\MSI3033.tmp

      Filesize

      436KB

      MD5

      ab51d8017b719df5121771e0f696dcbb

      SHA1

      22b3e194cc593d4a7e8734e616089ec88069a2c0

      SHA256

      4834ffffe903d6a803fcfd3c39742f98de84077366b56a1e3e6594e44bbd7147

      SHA512

      01d98a9f714eefb754f6049767e9b150d067c16bc352e6921899b34bf4e1cf6007c308a7de1ed55d96c9cccdc3a6bfead718152be8055425e93653bc41649905

    • C:\Windows\Installer\MSI3033.tmp-\CustomAction.config

      Filesize

      980B

      MD5

      c9c40af1656f8531eaa647caceb1e436

      SHA1

      907837497508de13d5a7e60697fc9d050e327e19

      SHA256

      1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

      SHA512

      0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

    • \Users\Admin\AppData\Local\Temp\MSI20961\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      179KB

      MD5

      1a5caea6734fdd07caa514c3f3fb75da

      SHA1

      f070ac0d91bd337d7952abd1ddf19a737b94510c

      SHA256

      cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

      SHA512

      a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

    • \Users\Admin\AppData\Local\Temp\MSI20961\WixSharp.UI.dll

      Filesize

      239KB

      MD5

      2ca4255418970b0f02f4195190913197

      SHA1

      ba48f26fc7a05f5955c750d893c52903971579ae

      SHA256

      5bf6bc1eec23c4434c37e32707b138946106b8e702f98e1f9cae5e249da83863

      SHA512

      e6abeb4ea2786e759d489b7961ca5721cdedfa3325d53ee0c4405570ac8d7d16ad9fa4c1e4be66911502ef776a20929747cecdcbdeff5030fd437fa2bf692f3d

    • \Users\Admin\AppData\Local\Temp\MSI20961\WixSharp.dll

      Filesize

      425KB

      MD5

      ea800f52639d12279a3e602e43a07636

      SHA1

      e997386cc618aed516169111ba3ca7ceae91783d

      SHA256

      7eea616ea886145913c13d239f3e0ead58ace3a226e5aa330e67bbdd16673510

      SHA512

      33d46c6980743eb319b74bf89c300c5b886a960c222efcb2e66339b4eb7467cbf6546deef28a34ab09c4ed2c170efe76f38e4bc724603485e5e776d8e0457ccf

    • \Windows\Installer\MSI3033.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      172KB

      MD5

      4e04a4cb2cf220aecc23ea1884c74693

      SHA1

      a828c986d737f89ee1d9b50e63c540d48096957f

      SHA256

      cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a

      SHA512

      c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4

    • \Windows\Installer\MSI3333.tmp

      Filesize

      443KB

      MD5

      189f6236795ff5a13fd3a9ba08030292

      SHA1

      bcb92fdcd7aeee7dfb562cebb1cf28bbbcb03fbc

      SHA256

      708c055630968a5decdfc7cdecfc7decb6f1529bde5aa1f1de26072abb320457

      SHA512

      89014d64b1c94ee1d8b69ecc148bd969acb23301c56260d24201898759a1e3aac6cb36c6d1fa5f92eee47c6e17ef74f4601682db6641e1915f0df2a22425c950

    • \Windows\Installer\MSI3333.tmp-\tiho_exe.cs.dll

      Filesize

      13KB

      MD5

      9542bb54e37b997444fde3175cc120ab

      SHA1

      b8175b987ec0592e3ac9eeeb427cc851f11ecaa2

      SHA256

      da039effdcf0ea7f18c5e09a9173a3ee2797d86323b951b84e7b969afc3672d9

      SHA512

      9758b5bb085011eca246a996e453d91af75f672fd6382ffe57cbf3cd0997900da3e6aaeb6e446793b79fddf7f27a30ae1377011222f9d72edc5afffd6c42c02e

    • memory/1572-336-0x0000000002150000-0x000000000215A000-memory.dmp

      Filesize

      40KB

    • memory/1572-332-0x0000000004820000-0x0000000004860000-memory.dmp

      Filesize

      256KB

    • memory/1572-330-0x0000000002240000-0x000000000226E000-memory.dmp

      Filesize

      184KB

    • memory/1572-331-0x0000000074250000-0x000000007493E000-memory.dmp

      Filesize

      6.9MB

    • memory/1572-346-0x0000000074250000-0x000000007493E000-memory.dmp

      Filesize

      6.9MB

    • memory/2044-375-0x0000000074250000-0x000000007493E000-memory.dmp

      Filesize

      6.9MB

    • memory/2160-144-0x00000000026D0000-0x0000000002740000-memory.dmp

      Filesize

      448KB

    • memory/2160-135-0x0000000000A40000-0x0000000000A6E000-memory.dmp

      Filesize

      184KB

    • memory/2160-136-0x0000000004B60000-0x0000000004BA0000-memory.dmp

      Filesize

      256KB

    • memory/2160-361-0x0000000004B60000-0x0000000004BA0000-memory.dmp

      Filesize

      256KB

    • memory/2160-140-0x00000000025F0000-0x0000000002632000-memory.dmp

      Filesize

      264KB

    • memory/2928-304-0x0000000004920000-0x0000000004960000-memory.dmp

      Filesize

      256KB

    • memory/2928-298-0x00000000004F0000-0x000000000051E000-memory.dmp

      Filesize

      184KB

    • memory/2928-312-0x0000000074250000-0x000000007493E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-303-0x0000000074250000-0x000000007493E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-302-0x00000000023B0000-0x0000000002420000-memory.dmp

      Filesize

      448KB