Analysis

  • max time kernel
    60s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 03:54

General

  • Target

    setup (1).msi

  • Size

    3.9MB

  • MD5

    0b5c99abb6f3aa3c49a0e5bf9e3602f6

  • SHA1

    ab6291c5521a6a7490f18a160c375bbce3f7e09c

  • SHA256

    93be55a715bde8b8912d2cdc9674045933b8a7db10903e8ac187775eeac0ca79

  • SHA512

    a2e7f0aacc04e087614f2c56d3fbc76a6a3eca9284c6edd228750017e9572aa8723da96a10475677a8548c70bcbcb6a0a2ef928e362fe35c7a54d3919112c806

  • SSDEEP

    49152:Svefc/f9r84jEHYDgS5u7vPycFTzn795k0zjjZdlPjgzixI+vGYRnAWNCWw50Qbf:VVHYDgrLyclt0iuWYyyI4

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 21 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 59 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\setup (1).msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1292
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2595BC82D6BA0CB9E7B7EE8945D3669C
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3880
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e5740b5.rbs

    Filesize

    11KB

    MD5

    19b7d8e40de8805b154412bf3348f919

    SHA1

    979099f7b5d08e44f4774f062798f33ae36514f5

    SHA256

    2bc9a4561d9facd9e09e5679eae6eb3fea979fa8095067ef45f18b4ef608a8a6

    SHA512

    eb91241158f86568de6d4837404a7921d21d501219ba0c3ae6f93af830d585a424b40c6c43ec7f0ca72e638d986f24f815acdd56c7781a2e4c9dfde6cff380e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

    Filesize

    1KB

    MD5

    50b34530093382b333e5b67ab7ffe753

    SHA1

    b53faea7841c1ca1fa3e31f74c0b91a882fdbd08

    SHA256

    5ea80738b2b1a500d8a0da66e944f61cc43a4fd6139cbed47da5eb865e5fe776

    SHA512

    c70586a727aea922d666b3793933e7301003bf5e774568d66401babdbab130914d4fa0f69a7d15e555a5cd2bacf375954bb7b3725bc6c7ebab197c1a440d07cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B03113490075047F519A3F760F0FF379_95980E5E8BBE730A69D3C1EABF291983

    Filesize

    2KB

    MD5

    bad695590f7a01ac743148708e8ea834

    SHA1

    52f36b2e7faf879d72b05565b2dba01863d61a4f

    SHA256

    996355e26ada66c639a28d680b3bf6c172d50505088bca0fe1c2093a6eda7797

    SHA512

    cc442700f6713f7e1cb41aad9f6c75ca76fd2722d1027059f4b6e0db72f1d45647b7ac93215061a513676af2f5f1db8d5e09e4d93afcbcbb7b992ddafb46b28e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

    Filesize

    412B

    MD5

    d8bb564632eb36a6af7602499e7b7b53

    SHA1

    1482260028d7457d3422754e9ee412edfbb73572

    SHA256

    b60d4833b372f02c06cb12558e31394c9890bfe2fce89ba462b328d9507a3fc5

    SHA512

    666ac4e52df37708260656f2847ff64309d0fa1d5d2debca12783540e4f9b44529cb0fbd54c1280c22571dcc8a5b6b6919ccb00a254e2b57738809d924b25459

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B03113490075047F519A3F760F0FF379_95980E5E8BBE730A69D3C1EABF291983

    Filesize

    428B

    MD5

    46a4ada54183a0eeffc062e4028c7c0e

    SHA1

    0f6b52cb01848461066dd2475bde3c91c9d5bdcf

    SHA256

    131ae0bdcd634493474a0b840c7964a580668e21356e44d6550e1a2bc4aff881

    SHA512

    32ce405258b755f1b251479f946bd75eacda986aa32c9b0ed5cbf42d2b43ecb83ab65650c8ecd570e750a188a4e48d510b2025567817706bdfb26f2dfeec290e

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\65b2e2115bc9fc7472607c90\1.0.0\tracking.ini

    Filesize

    84B

    MD5

    63c67d9fefec772a324c8f44de892ce8

    SHA1

    3d40271774b5ccaf83287fb769433e6ab9aecdcd

    SHA256

    643dd30a388b4dbc2f888d9dc10c827012bdf3fbc9e8746c365369adc8af55eb

    SHA512

    95e324b39b984ba2b280fffea386dbc6a7cc21899090302a58bc20540475eaa4ba8d15db8925ad3e94939dead5e3352d874ca4644e23148af4bf2cebbf9bc65f

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\65b2e2115bc9fc7472607c90\1.0.0\tracking.ini

    Filesize

    84B

    MD5

    1a22c2392791f6b6927d50595dee4abb

    SHA1

    2a5b7c4b090bbca65379aad0f0309dc72644df96

    SHA256

    c588ad38a2bcbb9f85d16fa3de6e5e8daadb5cbe96a924fd7fa02aa45b9a115d

    SHA512

    7f1d5c147dcb62670ef5716eda6130f8fb291fafa9e66f5d21e21709f2f970c7618ed22cffec8e8dfde894694cc4cc462681bced94e39820f375f86eebf2d594

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\65b2e2115bc9fc7472607c90\1.0.0\{84A7240D-7970-4D2A-8B71-25F4A9FF5C02}.session

    Filesize

    32KB

    MD5

    3fc3e21c5d6bb32ce1058e6f0c8a4049

    SHA1

    a9cc735bee401914b3921eca51f6f18e1fce2cb3

    SHA256

    8cd9b9fbb59f9c4b482a8e6cadc24e6f3e5387096aeaa2690d9a4c4be3122020

    SHA512

    583d4ae312ddc568ab6d7d63956a90c077369205278655d4f134ee02a7461bb6435eeb655b2ec8c9b46897d0ac7a2ce5ae17b2155c10401ff26fe23aaa45bdc0

  • C:\Windows\Installer\MSI415E.tmp

    Filesize

    1.1MB

    MD5

    c6b7f525bebdce408cae137e6c82fa4c

    SHA1

    6b13d7b7e66c2c32815b98e33c95937f559e2cac

    SHA256

    e0ea63e00f640c74ddd0b51a46d4d0601acdebdc8b97957fed727f332a96dc90

    SHA512

    f1e330aad8bc2de79fbe7e7452148714d3f823450c5de039ccbc3690f523c55b240dca4e8d9a9ac83e7afcea6462950b4bc2cbcf52b4c959b9047660a6872a4f

  • C:\Windows\Installer\MSI421B.tmp

    Filesize

    738KB

    MD5

    8d84543f774c6b280b32b24265e272e8

    SHA1

    cd3a0dbc06b9b4945f3a5d3b40972a0b5f66044b

    SHA256

    32b60176177d943df28f931828717f4b52b1434b8c0cd3ca8cc8a424b016b092

    SHA512

    247c5c3c4765e61b4d4b7514886e9eccb45746593b21a8dc8f718a224a1a0bc813fe227030738c3035cb9a9017ba53d7feff07cccb11407e9b22678af0c42056

  • C:\Windows\Installer\MSI42AB.tmp

    Filesize

    1.1MB

    MD5

    9ac5da40be505273f6f1b48ce6d159be

    SHA1

    47d3fbb35dd5df773bb9cb523eaf063c40f52241

    SHA256

    6547bac5e0f08595325b769a6605a6c27b1eb2620a31dc9ecc4185b64882e837

    SHA512

    8826dc286b48b4008eff8e38f3ffe4519601f702bd9a6b71731e2ce929789f9ec92f4997fcd28930b91132df5053ffa4f276b5dcb2f8589b93befb805b4bad3b

  • memory/3872-213-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-214-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-215-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-225-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-224-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-223-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-222-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-221-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-220-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB

  • memory/3872-219-0x0000019EF8AC0000-0x0000019EF8AC1000-memory.dmp

    Filesize

    4KB