Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    27/03/2024, 18:57

General

  • Target

    Visualizar-PDF.38105.msi

  • Size

    732KB

  • MD5

    bf440e49375e237d109f66a7cee79fc1

  • SHA1

    32ee9706c1d532867af3ded30dfd67aea596028c

  • SHA256

    4e085dd4d721815f4757f125761fddbf42d7d672380eb6627efd138c21146e42

  • SHA512

    88d503d2dc8cd9970eeb489e89b772c8a56abe831c6aebae1b39824e22b913bc61ec42c3715b60ee3ec51afdeb809ba039fc5a59a85343c328d9d9f06b50baaf

  • SSDEEP

    12288:UvXCtQ6QsN5lNOsw6vAUnBU7qax0EzIVYgvfVYsAgkWZT:UmQxsNcswvEU7J8VlvfVYsAgvZT

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Visualizar-PDF.38105.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4660
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C0EB06F9EAD5B633CE2ECBC18C0B3CF7
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e575ebd.rbs

          Filesize

          9KB

          MD5

          93f74b110b761cfff4249193673ebbea

          SHA1

          7173337365e8c1139f380ed9b77b1ea914d707ab

          SHA256

          78061c914efd71cce30e4fda3bfffa71300709ab40d0285ff5c5a3074580ddd4

          SHA512

          6bb89e2f148c385a4934016d5f5018b7b40e5f5fae7309c57b5dc1a9f149d6f03d26a6a69f4e8df16f76cbc446702eb8afb6c2222059552b15082a9df0d557ed

        • C:\Windows\Installer\MSI5F08.tmp

          Filesize

          393KB

          MD5

          3d24a2af1fb93f9960a17d6394484802

          SHA1

          ee74a6ceea0853c47e12802961a7a8869f7f0d69

          SHA256

          8d23754e6b8bb933d79861540b50deca42e33ac4c3a6669c99fb368913b66d88

          SHA512

          f6a19d00896a63debb9ee7cdd71a92c0a3089b6f4c44976b9c30d97fcbaacd74a8d56150be518314fac74dd3ebea2001dc3859b0f3e4e467a01721b29f6227ba