Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 09:28

General

  • Target

    Free-Business-Partner-Contract-Template.msi

  • Size

    109.5MB

  • MD5

    44d70c2dd1cdcfc30df95a6b676dc326

  • SHA1

    93846f239ecf71c1a8e067f880070a814868060b

  • SHA256

    0adfbce8a09d9f977e5fe90ccefc9612d1d742d980fe8dc889e10a5778592e4d

  • SHA512

    108cd1b9cb1fd387d20a06edc0be0e3e00ffc3b2dfe4d5dd636cd642072fa740311824dbdd1b403d8b650fc57d450dbae324ef2e22bed67f5467b6b4095aa80d

  • SSDEEP

    98304:TYsfUbJeGKExXADDHY2P9m6E1tsg/qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqm:TfUdD3xwXHY206y4LY

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Free-Business-Partner-Contract-Template.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\MSI9CD5.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSI9CD5.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\Temp\{3D89F149-52A7-41E4-A2CC-6AF36752BB57}\.cr\MSI9CD5.tmp
        "C:\Windows\Temp\{3D89F149-52A7-41E4-A2CC-6AF36752BB57}\.cr\MSI9CD5.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSI9CD5.tmp" -burn.filehandle.attached=180 -burn.filehandle.self=188
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        PID:2612
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5753C7A5E1AE5900DAA4C1851C1503D0 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9FBC.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi9F6B.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr9F6C.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr9F7C.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        PID:324
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B1D763227142F9325D7E3CDC38472027 C
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e894d8369da14d61276d333b97fc2914

    SHA1

    b3cda3b628959eca737b5dc673d7b053a02f7e25

    SHA256

    3313e25a86181026ce9a8eac842cc2ee1598e98a9531c8471835a67139542c5d

    SHA512

    53caff7783ab808b3d738dc28eb72a512c1e28675e1dd53ea44940e389d992b7081130ee447a1fa31d5a8a53032b938fac605f27080794c1be7952503be0ba70

  • C:\Users\Admin\AppData\Local\Temp\Cab913A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\MSI9CD5.tmp

    Filesize

    1.4MB

    MD5

    044a5d8e2f1356de889aedb11fdcc679

    SHA1

    4e8416eb12d209509d49998ebe714612709eb4d6

    SHA256

    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

    SHA512

    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

  • C:\Users\Admin\AppData\Local\Temp\MSI9CE5.tmp

    Filesize

    570KB

    MD5

    c26c68e4a79fd2629714b17514411c40

    SHA1

    00138d8edea0918c4476da303415be399cf704c6

    SHA256

    55434961c0b4bed88ae6bfe6e0e61a3a3dcc392858f0e53c6c14c272200203ed

    SHA512

    6fc8028e6e52b6c9e74ac3ea6d19ed750047d46b7e4021d46e581b58367ffc11fb13b696dfa30a15305e94098a7fd12051ee37d32df91ef2ae1e2d9c642b02ea

  • C:\Users\Admin\AppData\Local\Temp\MSIB5C4.tmp

    Filesize

    392KB

    MD5

    07ce413b1af6342187514871dc112c74

    SHA1

    8008f8bfeae99918b6323a3d1270dea63b3a8394

    SHA256

    0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

    SHA512

    27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

  • C:\Users\Admin\AppData\Local\Temp\Tar914C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar933A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\pss9FBC.ps1

    Filesize

    5KB

    MD5

    0c95bc11cfca37f84a19de0529377e13

    SHA1

    41f409dbbab04ef35c4f6489af6f85fceb9c501a

    SHA256

    88748aae11029228d84aef0855f4bc084dfd70450db1f7029746d8bc85182f93

    SHA512

    8a52f3c40440e3129a367609ee4b6e9e98aa62edec48592be03bad1aadcd389e2e58e095f4ea3d6f9cb458aa7101fcb5afdff66658885bfa0634c74c086db568

  • C:\Users\Admin\AppData\Local\Temp\scr9F6C.ps1

    Filesize

    118KB

    MD5

    dac33a6ccbcb047e268c2b4d8683d458

    SHA1

    0975b054358bd83656011e3f9e1e7790b5f26c07

    SHA256

    c05e705645b1e77256f93b4ae93a12a3adbd7433f7b8f1c68fa84ea1c0838a77

    SHA512

    1c1692ee65c6bcb86d0093040adbb935522a875a32207b345f9375f6c40bc90225963302cf157921d9d4b60f54776f3b2c52bc63bbdd911bd438a832248484fe

  • C:\Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\BootstrapperCore.config

    Filesize

    752B

    MD5

    efe91fd0b4eb17cc897621c133c53ade

    SHA1

    c28fa3c594cc6d2ce8fad00f2d1d2c09b220ce74

    SHA256

    77d45ae9bda3349bbcbf2069503835c3bbb37fed0c1e2311b4c3e3bb26640940

    SHA512

    034043d96e709795852918fdac7606918453df59660a01af25dbbc844c98c7ec28bb7f0a1764d2148c83ec6b0e94e8e8317e9610f1c9bb1fe055b65fcace0549

  • \Users\Admin\AppData\Local\Temp\MSIB4D9.tmp

    Filesize

    18KB

    MD5

    55bd68162716cc435eb221b048567e73

    SHA1

    3e9ef3823a6ecb7ca7942a332e400ec3adb8c2bb

    SHA256

    76bb62394bef8acf9021f8e94219430515cb2734805e29684044a0a4a802469c

    SHA512

    f371443c8577cf55dd4e76c4fb5d90dff4bcc3e839b7c31183d5db0d4586d105237a8d3a34ed68b0bf64c90dfd99fe64ceac57b91a0ac7835d34ad574f4ccc87

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\BootstrapperCore.dll

    Filesize

    80KB

    MD5

    c4f7146ddc56763ccdb1cb3c09478708

    SHA1

    bca088ab33cfb69adeae11a272e9c8a83f39a8c9

    SHA256

    886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

    SHA512

    df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\GalaSoft.MvvmLight.WPF4.dll

    Filesize

    27KB

    MD5

    1e40431b501d55fe8ba59cabb3ce5c17

    SHA1

    b8aef0f6829345d844960c3eaf96c41f76142f6c

    SHA256

    92ef1bdf8c8140e34e5ae1eb8d9b7afba9921e5ada6317c6cdd0da2712f7e000

    SHA512

    2ab5d887e717add46959a7193cbf1dbf73f2792130025e5712ae76058ce5923be8afdf3ed8d11ea6859b13126f88bb9e1099741c799ca90e3f7713955dd9638d

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\NitroBA.dll

    Filesize

    363KB

    MD5

    6726d4b46346ef40dd3ea4376ae7d259

    SHA1

    ffdaa10e1e3d1c7d7411f799a0889ce66014bc29

    SHA256

    3e96b189fa7a160396742cdc93564dfce3ad3993a3e21118cf9114c8cb45e963

    SHA512

    cd2a68f1ce4bc161b26466fa8f472803d7a10b339dff6c599e64863236ef59d9a0ed1b2f4168f8557b35d81d92edccdfd9d313096a88415838b6351af1ae249a

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\PageTransitions.dll

    Filesize

    16KB

    MD5

    ad69d408b05b98180b25d23b0a790f01

    SHA1

    5fdbdae2979685db500d2b031e2a430ce16e592e

    SHA256

    14090b63240c63bfe118a24b6f0112095f331ac46819f6f4ab62d8e9bbe4c646

    SHA512

    12323f7190fd785277965996cffe141a5b2d5b11679961db6aa6744b8157df7f9bd7b5b935d3ca2a7e0be7ca5f0f60fd8885b94ae7cd70aea1572e90a2599eac

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\mbahost.dll

    Filesize

    111KB

    MD5

    d7c697ceb6f40ce91dabfcbe8df08e22

    SHA1

    49cd0213a1655dcdb493668083ab2d7f55135381

    SHA256

    b925d9d3e1e2c49bf05a1b0713e2750ee6e0c43c7adc9d3c3a1b9fb8c557c3df

    SHA512

    22ca87979ca68f10b5fda64c27913d0f2a12c359b04e4a6caa3645303fbd47cd598c805fd9a43c8f3e0934e9d2db85f7a4e1eff26cb33d233efc05ee2613cfc1

  • \Windows\Temp\{C9281D26-8391-4D80-BA87-61C1F3F7F3F2}\.ba\metrics.dll

    Filesize

    541KB

    MD5

    aed8280e90f672f631d2aedebd6452bf

    SHA1

    390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

    SHA256

    a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

    SHA512

    23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

  • memory/324-275-0x00000000710F0000-0x000000007169B000-memory.dmp

    Filesize

    5.7MB

  • memory/324-276-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/324-270-0x00000000710F0000-0x000000007169B000-memory.dmp

    Filesize

    5.7MB

  • memory/324-281-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/324-348-0x00000000710F0000-0x000000007169B000-memory.dmp

    Filesize

    5.7MB

  • memory/324-282-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2612-263-0x0000000000770000-0x0000000000788000-memory.dmp

    Filesize

    96KB

  • memory/2612-256-0x0000000072CF0000-0x00000000733DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2612-283-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-293-0x0000000072CF0000-0x00000000733DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2612-294-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-266-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-305-0x00000000024A0000-0x00000000024AA000-memory.dmp

    Filesize

    40KB

  • memory/2612-304-0x00000000024A0000-0x00000000024AA000-memory.dmp

    Filesize

    40KB

  • memory/2612-259-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-257-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-280-0x00000000021B0000-0x00000000021BE000-memory.dmp

    Filesize

    56KB

  • memory/2612-292-0x00000000022C0000-0x00000000022CA000-memory.dmp

    Filesize

    40KB

  • memory/2612-274-0x0000000002220000-0x0000000002282000-memory.dmp

    Filesize

    392KB

  • memory/2612-363-0x00000000068E0000-0x00000000069E0000-memory.dmp

    Filesize

    1024KB

  • memory/2612-364-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-365-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-366-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-367-0x0000000003170000-0x00000000031B0000-memory.dmp

    Filesize

    256KB

  • memory/2612-368-0x00000000024A0000-0x00000000024AA000-memory.dmp

    Filesize

    40KB

  • memory/2612-369-0x00000000024A0000-0x00000000024AA000-memory.dmp

    Filesize

    40KB

  • memory/2612-370-0x00000000068E0000-0x00000000069E0000-memory.dmp

    Filesize

    1024KB