Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 22:04

General

  • Target

    1365039baed4ec04983d16a583a332b818b2af9977807e5481310528897b02b3.exe

  • Size

    2.2MB

  • MD5

    144bfc7f77a9b0b57d39e75ffda71ae1

  • SHA1

    77ca0a359058ccabe720d310ee729ecd3e66561f

  • SHA256

    1365039baed4ec04983d16a583a332b818b2af9977807e5481310528897b02b3

  • SHA512

    6a4a82e59b21ede7ae722aef50ceecf264cadffe4bc61d9f94d88c96c8e1d76b86b16cdd93e9440dd1f3c905cb2a0915b8d851b73dfcbeaab6756a3d2bf1c9d0

  • SSDEEP

    49152:19UJj87k/a4nQkh6ZISIyR7fJATyIeOgWfPfyDLmd/DIuJxThJqEB6ZmKYGCsWH5:m8D4nQkhSRtATyIe+fPf6Lmd/DI0xT5N

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1365039baed4ec04983d16a583a332b818b2af9977807e5481310528897b02b3.exe
    "C:\Users\Admin\AppData\Local\Temp\1365039baed4ec04983d16a583a332b818b2af9977807e5481310528897b02b3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\Msiexec.exe
      Msiexec /i "C:\Users\Admin\AppData\Local\Temp\ProductInstaller\Web Agent_C64.msi" /q REBOOT="ReallySuppress"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CBA174296037643315BA4A7B2DED029
      2⤵
      • Loads dropped DLL
      PID:1144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    8b04ac80767607e557b4bec1f99a5a0d

    SHA1

    b4a1d79ec966633ebf317ae9b1d8d20f2540d909

    SHA256

    ebd34a6bf3be75ccaab52b3dc1d98ac07b45de99bbfd7983b1b16f2d1e6ed9a6

    SHA512

    79c6b8e6dd45aee3b5b513501ef5a6cffab4f65e8c2110310972f41abc28a50055512fabeaf6314545434b45348c70744cf36d1bcae217686c862ed68bb2fe47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d77c9d7654d180cb9c12f02ff6c8981c

    SHA1

    ee1196f6052a17e500d10d378810cd6798c69bfe

    SHA256

    fda33caee6470521fba0d257ed3142bd78104992164b835937a91a4727f2f069

    SHA512

    9e4bc696189f9785961f9daa242d47596a46dbd898de9dd53d74fce37ebddd761af2af413008b6d9118c059acd1f0b48233fb813eac99e12fe9b7763cf984b9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc0972841efa791717456a43061cac34

    SHA1

    6b2f88bc15369ac9d1781225699a64fd1b671759

    SHA256

    15fd83cc1a08e363b43175d250a592f9e55779b256dc9d8188340101becf6cd2

    SHA512

    4e6fa1fe3ff0ce76e112881fc1cc876e43d1d772423f5f88f79cbf9a1b5f55aec7b1373774f5b4e715df1ab37c945591bbd6fc9dff99daf979450736ddb90648

  • C:\Users\Admin\AppData\Local\Temp\MSI657e0.LOG

    Filesize

    1KB

    MD5

    d831cc30be32d4f80a2052963dfc77ba

    SHA1

    1a31b52f332d9981460ba7d73d262fc62db22dfa

    SHA256

    9527d4e788f0d4e2d16fa367d8a74c83844406bbb1b7eee17eb59a03290549ec

    SHA512

    a0dc09adf09789d0a885b3ad92e7709da668473d2f205e16d1fc7070d7742399c5d2afe77f58be5bdbf5f86b2adcba634489175da1242320600304e9e3f8155b

  • C:\Users\Admin\AppData\Local\Temp\ProductInstaller\Web Agent_C64.msi

    Filesize

    8.3MB

    MD5

    57884e21683be7e663f23b16b19f702a

    SHA1

    1db4a2174a11d1474583cfd9a3e9991d3a4bc39c

    SHA256

    d52b08103a29dcdb4e65e32507ae35bd5505ce7953b20bdb3bfa49185fc3fa80

    SHA512

    ac38d48e4ec659ca24491385de6c509dca50a075243308d94b4b05bbd988d5e1954e136052b78ba0f6d292ebf87850f55ec2895da83f2bc74d8c26f44373d649

  • C:\Users\Admin\AppData\Local\Temp\Tar3200.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Windows\Installer\MSI5A21.tmp

    Filesize

    57KB

    MD5

    d480853146cffda8e468cc4d2751b405

    SHA1

    e0b9de6eb4e0f5a92411dfe12a2e498a39eb102b

    SHA256

    e1076225eafe4cca82c39a4a7db820e0fd44dd293c9847564346e4bb047214b3

    SHA512

    c22fe3996ea0eeaed9dc4f90e107a5e4b9c5e56fe1bf33b09db2bdc6ae52fc57fee70ca7d4b02d8f446257b2c46c5927a1961146588b7dbc0af4e6104a481f2f

  • C:\Windows\Installer\MSI5BF6.tmp

    Filesize

    138KB

    MD5

    b96cc173298220d17aa0932bf3047727

    SHA1

    38b81f2f69916d52d5d8c95185150c20586fe0ea

    SHA256

    69bdcb8dbad5145459bc64ee749e84d9e92171aeff5eea37f2145319c99bdf3e

    SHA512

    7357ea0a95b77c2bb51283e7859b2ac000804bed4aeedeea22b7e6b261a7fece110c13f244bc3458ddaaa6d9f94ebb0098ffb37c7b5d733db49aea17e04040ca

  • C:\Windows\Installer\MSI5C45.tmp

    Filesize

    1.1MB

    MD5

    9396a1f02189f0bf3dd56f92283ce5d6

    SHA1

    1ff6e8ce485a3b5eeacb89a5722587a56240e4a7

    SHA256

    0ae8d17046dfc3c41a55ec8dc80929cc38ea366e7e94f0b0a00c73515b984a85

    SHA512

    7398268870de492152856c6c28f0f799b8527de45e90939e16df25f8686dace2800d1beeb54232e24a7bae4ad663d76f49063779318746fd94ed10e5599f56be