Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2024, 02:31

General

  • Target

    9f8f58faadcda3b49e371c1ae353b30b3713652b0ad8d05b57383142757a74d0.msi

  • Size

    2.0MB

  • MD5

    ebae9b70769458cf723022ec89b95c32

  • SHA1

    3d3135b87fe274988b86f50d24bde82cc08556bf

  • SHA256

    9f8f58faadcda3b49e371c1ae353b30b3713652b0ad8d05b57383142757a74d0

  • SHA512

    3550c281fc8dcd8078caf6c0cef847280d6ec78216b0e018b01942e82c79499538f3a0553409e3c716edf584ff5c359ce991440bab14d4794f6ae3393788a102

  • SSDEEP

    49152:J3osY5A6b4ms+4UhbrMizYiRpb2mN3rm999OhjY:hY5A6bDhbrfzYiRNdm+

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9f8f58faadcda3b49e371c1ae353b30b3713652b0ad8d05b57383142757a74d0.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3020
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A703C00E125681DCADD042330324AD29
      2⤵
      • Adds Run key to start application
      • Blocklisted process makes network request
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\ProgramData\SOn2Tr6L.lXh\SOn2Tr6L.lXh.exe
        "C:\ProgramData\SOn2Tr6L.lXh\SOn2Tr6L.lXh.exe"
        3⤵
        • Adds Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1716
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2648
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C0" "00000000000004D4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f769bf5.rbs

          Filesize

          1KB

          MD5

          29966232e15ac0c90da4545a04817177

          SHA1

          44c4b1bdb482a9db4455a9d715a4c0bab587da1f

          SHA256

          b3240300c1bd271ad830883695395de4e6e9e56ad68f9dc98f246eeaa7b6b511

          SHA512

          bb4bcf344155222c8d84ec18f47a09ccc9a7eb7edbecae7464db73ed801a92271ec39ac3e3fa8be38854f1b062843aac455b448eb61a1e66d724e4cc4bf06a57

        • C:\ProgramData\SOn2Tr6L.lXh\LOG\SOn2Tr6L.lXh.exe.DEBUG.log

          Filesize

          1KB

          MD5

          01ee309b62baf70d9d54522a64017df8

          SHA1

          2559d8f5053f3c553024d651941821d1a7e52579

          SHA256

          158c127c4128e199621a2ee6e6ea0a4e742c4a3b0edc8937ba88e7ae7c51bcba

          SHA512

          1aae0771e4ba7286d219f3985acb4689c16e823081387b765e4b537d89fdbefd81de56db8cc4517de93b9268d121168479215bfa1d22ab4c7468aadd2205dca0

        • C:\ProgramData\SOn2Tr6L.lXh\SOn2Tr6L.lXh.exe

          Filesize

          97KB

          MD5

          a61faca7411cebd947b4f1e00dba6d08

          SHA1

          fc1b4587990a792c32b113451197354f942b82d5

          SHA256

          db57fbf86c8306809673be5850779b2dcda94bd8c36047840e27175cd30c257a

          SHA512

          463e7da3b042adfcc4fc7bd5a8bf8df44375ec8adc4320dbfffeeb98e6a33c2337991d8e644eabb98c5a87a1e13a3636e9f03e4cad2b72ef23d7c0f5676bcc2b

        • C:\ProgramData\SOn2Tr6L.lXh\python311.dll

          Filesize

          23.4MB

          MD5

          491876d387b49a407685797a3968605c

          SHA1

          ff967b0a7c546ccd9fcd4e9e59af60852cfa0508

          SHA256

          362074c6dc3cf48c378ccb8106313f01acbcb0dbbfa35f3ca8c596df1c981aa8

          SHA512

          a35e9465410cbcfe8e396e97f12b470ed48f28c05b2e6f94fad78fb19fa372e9c007ef60d1aef9acf2deddf3ec4e0e455a26ee75bfd8c06088f548b874bab089

        • C:\Users\Admin\AppData\Local\Temp\MSI639a6.LOG

          Filesize

          21KB

          MD5

          0cdc5adec8ced1f26460edc224469d8b

          SHA1

          58fb2b0f646e281905e0cb67523a2901b7a31651

          SHA256

          812a06516774b8dd643b797e9cb4e804671db7d88a8d62f1b32e03b5356cff07

          SHA512

          f82373d1790c51b81f5c2be2bad44295b0870451aa3fc7c6ddb66caf0c6ea6992aacf7ac105ab4fd588d2ad0d6243c4548e0faafa5bc4070dd81a4fe00d1ab01

        • C:\Users\Admin\Pictures\msedge_elf.dll

          Filesize

          1.3MB

          MD5

          8ae4a2d24f53985e238309b0fa081449

          SHA1

          42bde0530c733c8a5d162249c18388a404c7e6df

          SHA256

          2de3942e7690adafe16c6ae5692d9793466d50a4a41ccc66acdaf51573584357

          SHA512

          124f3242539d0bfbfae6e8ebcfc409bbc0f55e88756813ab858ad807a8aec3383ead7e30559a76973cf008dbc59a594b8712a56dcbc5716eb013bb125b3d427b

        • C:\Windows\Installer\MSI9C7E.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • \ProgramData\SOn2Tr6L.lXh\python311.dll

          Filesize

          9.0MB

          MD5

          14802f9452dec76605650898b3b9fce7

          SHA1

          b65590a4f8f2e2dd74f542dd9eaa0d5c98b190c1

          SHA256

          e0b9337df82dd58dfece65ded776464e177419e9e0762eaff3a8c999a5670507

          SHA512

          88a62884db52fc8a9e68b7612a6121816112fa284ff92f4f6b4b53de71b0dbe8c27bc568dad80e9ee40bbdf4555a6343804034f3d052671976f2e0a72210e74f

        • \ProgramData\SOn2Tr6L.lXh\vcruntime140.dll

          Filesize

          88KB

          MD5

          17f01742d17d9ffa7d8b3500978fc842

          SHA1

          2da2ff031da84ac8c2d063a964450642e849144d

          SHA256

          70dd90f6ee01854cecf18b1b6d1dfbf30d33c5170ba07ad8b64721f0bdcc235e

          SHA512

          c4e617cd808e48cc803343616853adf32b7f2e694b5827392219c69145a43969384d2fc67fa6fa0f5af1ca449eb4932004fbcdd394a5ba092212412b347586f0

        • \Users\Admin\Pictures\msedge_elf.dll

          Filesize

          960KB

          MD5

          ed71aca3d115bd9a568826f3c2bbf833

          SHA1

          0580a0b679cd2440f35b37744c1168f657079f48

          SHA256

          1e75d65f163c0236db1c1fa34895196841c347f856b2e32da032975b30b53dd6

          SHA512

          43c2fa8efcef0e0283cf322525218a63a3212e5687dceeb3c7c63b66eb7e5922e68c83c19360316539cd71eb6015eba150dc940b4af31607e0eec9317659432c

        • memory/1716-108-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1716-122-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1716-157-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/1716-133-0x0000000000A50000-0x0000000002FFE000-memory.dmp

          Filesize

          37.7MB

        • memory/1716-132-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/1716-130-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/1716-127-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1716-125-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1716-120-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1716-117-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1716-115-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1716-112-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1716-110-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1716-101-0x0000000000A50000-0x0000000002FFE000-memory.dmp

          Filesize

          37.7MB

        • memory/1716-107-0x0000000000160000-0x0000000000161000-memory.dmp

          Filesize

          4KB

        • memory/1716-96-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/1716-98-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/1716-100-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/1716-102-0x0000000000160000-0x0000000000161000-memory.dmp

          Filesize

          4KB

        • memory/1716-104-0x0000000077B10000-0x0000000077B11000-memory.dmp

          Filesize

          4KB

        • memory/1716-105-0x0000000000160000-0x0000000000161000-memory.dmp

          Filesize

          4KB

        • memory/2876-55-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-54-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-27-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-31-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-30-0x0000000000160000-0x0000000000164000-memory.dmp

          Filesize

          16KB

        • memory/2876-32-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-26-0x0000000000570000-0x00000000005EF000-memory.dmp

          Filesize

          508KB

        • memory/2876-73-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-29-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-33-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-40-0x0000000000210000-0x0000000000215000-memory.dmp

          Filesize

          20KB

        • memory/2876-38-0x0000000000570000-0x00000000005EF000-memory.dmp

          Filesize

          508KB

        • memory/2876-37-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-36-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-25-0x00000000746F0000-0x00000000749CE000-memory.dmp

          Filesize

          2.9MB

        • memory/2876-34-0x0000000000210000-0x0000000000215000-memory.dmp

          Filesize

          20KB