Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2024 09:08

General

  • Target

    SecureClientInstaller.exe

  • Size

    15.8MB

  • MD5

    d3b4eacce35fb5b50b0f45f35119508c

  • SHA1

    18ae2430f7ea7ae5e92e95ca251711a59738f31f

  • SHA256

    edaa4e44df8652613f83cab2b7790f3a8c0086fee134747747afc139e5481ad4

  • SHA512

    877829fc113b126094a96170a860cfbd2e54b7b1a4fecf7d21f1722922ae0183ffc7bf154b7fc6afdc6d3dc2cf4e619c72fdbb16c0444b52486042e6f1781235

  • SSDEEP

    393216:j3JQVz1M/0XRlPzAuIhlQd5A1eT67vXUFjyO/Nk:gC0Pbxc/eTAUlymC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecureClientInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\SecureClientInstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\is-EJ3A5.tmp\SecureClientInstaller.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-EJ3A5.tmp\SecureClientInstaller.tmp" /SL5="$70120,15648808,1044992,C:\Users\Admin\AppData\Local\Temp\SecureClientInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-6UA5M.tmp\temp_script.ps1"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Cisco\Cisco Secure Client\UI\csc_ui.exe

    Filesize

    2.9MB

    MD5

    24de4ed3ff1fa997f867b591be4e001d

    SHA1

    744d45ebd394880598b597d882ae2b634b9261fb

    SHA256

    7c4330c4bd0c6890c7efc49af493056b92332c65be2bf885cd2a599369ba5349

    SHA512

    8a32756cffcd10d6df5f0b6da917a203115431fe101b2b7746b1d8e76956b12f6af5ce89bce29bc505558943f4d661d45e2630b4b5790625b968549146ebec88

  • C:\Program Files (x86)\Cisco\Cisco Secure Client\UI\l10n\es-es\LC_MESSAGES\is-MAODO.tmp

    Filesize

    346KB

    MD5

    9d4300c87c9e378a13efa9999d305929

    SHA1

    0a7bb44a99208085296e782fd2e7b22170e7d03a

    SHA256

    d92d3e91f1b4036435cc6e39e2ce048de7153a54577695313aca1119df70de82

    SHA512

    297d7848fb011d8e79a7ee1b48d42227fc8582848b9232f4ed155b5fa1476c25654885fbd39e0207dd86f619bfc0fde41a0d448365e5b1d57d7c359b7eae3b1f

  • C:\Users\Admin\AppData\Local\Temp\is-6UA5M.tmp\temp_script.ps1

    Filesize

    387B

    MD5

    a7237f7ca48e6413578563aacfa87c1e

    SHA1

    d773719ee8396df94c800f18fdf50d6167d3c6e1

    SHA256

    62771326f8610358752b689db082a94e536423655846774cdcac067fcf2534cf

    SHA512

    f1ceb76211ebb3cd12dd954d8b2f755f3ca1f9f1bf2116bc76229930a402c3d6c6f25ab3ea4c364d48edcf9a5c96e24b0e480314f48381e529dc70e3106a658a

  • C:\Users\Admin\AppData\Local\Temp\is-EJ3A5.tmp\SecureClientInstaller.tmp

    Filesize

    3.2MB

    MD5

    7da27e20661e025f701f1f64927c70f8

    SHA1

    4d01eaaa7251e382c2b71f12af826c2575196188

    SHA256

    9742767b2de0c8c1305a2c3f712c76043ce6bba3f31beae7419fd64913abc3e5

    SHA512

    7e57d809f70844b67b0ee67ba0f2cca5ef5ee30680a9f7fd7d55a61f2cee1bfe61dbe490699955d5d94110e43bfc3f053d7ef3569788be17345d4ff4cb086019

  • \Users\Admin\AppData\Local\Temp\is-EJ3A5.tmp\SecureClientInstaller.tmp

    Filesize

    365KB

    MD5

    bc397d9cb2507f8b115f49fb3c2b44bc

    SHA1

    a1baa679d7521567bce4d1116550515af1cc387b

    SHA256

    409209fe98b66aee9d89236ef9e84d77906f4cbc2e7e6e936b7ed43fb3f081e6

    SHA512

    815db0130bb95f6c1d9898d49b48073ec162737befde1d94e722b9738a4b6a2655385ab008f4f3bffe6a5e3f6fdbd1b16b0247e93fb2135d18f4cd1754977439

  • memory/2008-546-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2008-110-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2008-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2172-529-0x0000000000400000-0x0000000000748000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2172-545-0x0000000000400000-0x0000000000748000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-543-0x0000000000400000-0x0000000000748000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-541-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2436-534-0x0000000073B60000-0x000000007410B000-memory.dmp

    Filesize

    5.7MB

  • memory/2436-540-0x0000000073B60000-0x000000007410B000-memory.dmp

    Filesize

    5.7MB

  • memory/2436-538-0x0000000002790000-0x00000000027D0000-memory.dmp

    Filesize

    256KB

  • memory/2436-537-0x0000000002790000-0x00000000027D0000-memory.dmp

    Filesize

    256KB

  • memory/2436-536-0x0000000002790000-0x00000000027D0000-memory.dmp

    Filesize

    256KB

  • memory/2436-535-0x0000000073B60000-0x000000007410B000-memory.dmp

    Filesize

    5.7MB