Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-es
  • resource tags

    arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    27-03-2024 18:57

General

  • Target

    Visualizar-PDF.38105.msi

  • Size

    732KB

  • MD5

    bf440e49375e237d109f66a7cee79fc1

  • SHA1

    32ee9706c1d532867af3ded30dfd67aea596028c

  • SHA256

    4e085dd4d721815f4757f125761fddbf42d7d672380eb6627efd138c21146e42

  • SHA512

    88d503d2dc8cd9970eeb489e89b772c8a56abe831c6aebae1b39824e22b913bc61ec42c3715b60ee3ec51afdeb809ba039fc5a59a85343c328d9d9f06b50baaf

  • SSDEEP

    12288:UvXCtQ6QsN5lNOsw6vAUnBU7qax0EzIVYgvfVYsAgkWZT:UmQxsNcswvEU7J8VlvfVYsAgvZT

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Visualizar-PDF.38105.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2252
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CBA278189B7155E0EDF0359BBD75185
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f768d17.rbs

    Filesize

    8KB

    MD5

    ebd3bcd8899b05060dca3dbe7200fbb3

    SHA1

    4e90f8222352b702274a8cc1b90bc773138e1522

    SHA256

    367168309c5bf97005bac401008d2b61704722a91b0f1e1fd87555af52333e04

    SHA512

    49e47c2311d00c32b4203155bd0057c7fa6038ab9864e15d95754b4c8b11ec811de7ebde6bc9a313f26ec499ea75c593d276f94f8e6fa945c63727f5676a497f

  • C:\Windows\Installer\MSI8D71.tmp

    Filesize

    393KB

    MD5

    3d24a2af1fb93f9960a17d6394484802

    SHA1

    ee74a6ceea0853c47e12802961a7a8869f7f0d69

    SHA256

    8d23754e6b8bb933d79861540b50deca42e33ac4c3a6669c99fb368913b66d88

    SHA512

    f6a19d00896a63debb9ee7cdd71a92c0a3089b6f4c44976b9c30d97fcbaacd74a8d56150be518314fac74dd3ebea2001dc3859b0f3e4e467a01721b29f6227ba

  • C:\Windows\Installer\MSI90FB.tmp

    Filesize

    320KB

    MD5

    16203547b643cecb28b7294574dd56a8

    SHA1

    2c0e5cb16eb1228655f585bddae9bea45ac145aa

    SHA256

    3c5d0d154383fc71c78dcf0e6220b7e6388d8c50e9135227933ea5016e51c18f

    SHA512

    4b8d4cefd8ad821038267b18ab6f08238061b145f3bb6db8f7bd866266189f4f4333bfb61c5e0bd2d1a93fa6e05534e0b3339a37ad68e80eb01d8cc140d854a5

  • \Windows\Installer\MSI90FB.tmp

    Filesize

    128KB

    MD5

    2ca416d2c77464e249ab5fb10a300612

    SHA1

    d5a3dbaf21b593d46981f5bdf5db52d79ab41d31

    SHA256

    6ccee7d499ce5ac751d5be9dfe3774139b8add74ebe65904a922c612bd7fe04a

    SHA512

    cc612eec446219f36ac640ed0a958f07c2618666ba2e572323c68cb79819f6f01578dfff7b4400dfba89bbabd724bc2f205a05f0b7bfc90f579be09100a14d53

  • memory/2704-14-0x0000000000540000-0x0000000000542000-memory.dmp

    Filesize

    8KB