Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    08-05-2024 19:34

General

  • Target

    0dae1e15c6646388022b6e2cc42f68b8bfde13788c058da910b6964702d0f49e.msi

  • Size

    20.0MB

  • MD5

    03766b0b5b499a0b74b00e30ef8ddfc9

  • SHA1

    c228b53117e28553e5eb392d932c2d0873cb8252

  • SHA256

    0dae1e15c6646388022b6e2cc42f68b8bfde13788c058da910b6964702d0f49e

  • SHA512

    a970821edc247afcc96671cd25e2eb3c2accfa949c9bf6a2826134cebc3fe83658e46cb066a595f19581be9ba537f398f2e944d4dccce26b9e7555d3a3f67a28

  • SSDEEP

    196608:Ya++UP3yS4F0PIHrKjvOSEyOd37sc0/r/dolYrZjO:Ya+uJBOjvwZ8/r/7Zq

Malware Config

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\0dae1e15c6646388022b6e2cc42f68b8bfde13788c058da910b6964702d0f49e.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4768
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9977E133C4F0290B49CBDFFBE46E967F
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\qutj2yhf\fghn.exe
        "C:\qutj2yhf\fghn.exe"
        3⤵
        • Adds Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5144
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ipconfig /renew
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4744
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            5⤵
            • Gathers network information
            PID:3512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI3F89.tmp

    Filesize

    554KB

    MD5

    3b171ce087bb799aafcbbd93bab27f71

    SHA1

    7bd69efbc7797bdff5510830ca2cc817c8b86d08

    SHA256

    bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4

    SHA512

    7700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38

  • C:\Windows\Installer\MSI426D.tmp

    Filesize

    18.8MB

    MD5

    8cc479cfdbbc3aac07a49d58a47ced81

    SHA1

    b0153242fa9f8b5646eb0d77fca62d338908fc2b

    SHA256

    22ea13c175a4bb34b6095150a0ba93a6b640ca3b4b0d5f52f35338359ac25f05

    SHA512

    bf8c54b99cb6237aadcf19f1a35cbe222ee6419194e7ba83673fee6557a92da29b8c10c09c4f9399c52378fcebb546b4782c216a8c9c0757d3b5ad216f0e0cde

  • C:\qutj2yhf\fghn.exe

    Filesize

    5.7MB

    MD5

    b43c99c9e4b57ea9fef141ac306e59fe

    SHA1

    b4f15a82fd94043f94267fe8948a2d402176f731

    SHA256

    437d592cec3a0085b89f21ba1bcf41f6d62c9ce7cca7fe2452eebb567ffb9d06

    SHA512

    7c1d39fa3f0c58939000722fc2a6a3155e12444e1986317775158019b6915225255b86c7f16d5afaf10223e8ab0f9b3c9357eda19e7f5f716ee14f3da5e6e1c9

  • C:\qutj2yhf\tont.dll

    Filesize

    1.5MB

    MD5

    9982dd5b2f0c21404a2025db4900966e

    SHA1

    43484b55d1ba57fc05234aa8c05c0d4adb78239c

    SHA256

    e0e888371dfe14b8e2e8115bab277d1f17bffbff2a83fe6e259edf7e05cc6267

    SHA512

    0c89a65b4e3fdd0dfc1a1dbd4bca458cd386e1d42e78baa19d8860bb49a9164607475db9a455e42fd58008e0a5c9bbeaa40cdd1ba868bbd696873cfbe3ed311e

  • memory/924-26-0x0000000072CC0000-0x0000000074043000-memory.dmp

    Filesize

    19.5MB

  • memory/5144-70-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-78-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-66-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-69-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-68-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-71-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-72-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-64-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-73-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-75-0x0000000000400000-0x0000000000AC9000-memory.dmp

    Filesize

    6.8MB

  • memory/5144-76-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-67-0x0000000007530000-0x00000000076B4000-memory.dmp

    Filesize

    1.5MB

  • memory/5144-80-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-83-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-85-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-88-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-90-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-92-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-94-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-96-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-98-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB

  • memory/5144-100-0x0000000003A60000-0x0000000004A68000-memory.dmp

    Filesize

    16.0MB