Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 16:02

General

  • Target

    3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi

  • Size

    4.9MB

  • MD5

    76cb7942862b8e5ac5c86c7cbab709bd

  • SHA1

    0c0631dc78a8add250dd225f67a918f3f9c71524

  • SHA256

    3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70

  • SHA512

    b9ca576c949f79f123b6cf0d9d3469f47c88ee6f53c9f6e97643fc529ee5a360c95172457b4b2eddb0836baf68d88ffd9a958f8a3cbcca270bcfeb519dc22752

  • SSDEEP

    98304:wyclEycl/Y5AbXwNSOgbPJ84mkWQBlVbZ0L8xKpIx0Ttq6zVommY:wyIEyINXwNUJdV9jxK1tqOeQ

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3708
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2B20C42500028064F8228B297FEDB321
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Users\Admin\ZfAdmin84\
        3⤵
          PID:2248
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C mkdir C:\Users\Admin\ZfAdmin84\ZfAdmin84
          3⤵
            PID:1884
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:8
            • C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe
              C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4696
              • C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                "C:\Program Files (x86)\Internet Explorer\ieinstal.exe"
                5⤵
                • Checks BIOS information in registry
                • Loads dropped DLL
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 700
                5⤵
                • Program crash
                PID:2328
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C start /MIN reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ZfAdmin84 /t reg_sz /d "C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3388
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ZfAdmin84 /t reg_sz /d "C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe"
              4⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2520
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4696 -ip 4696
        1⤵
          PID:3608
        • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
          "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
          1⤵
            PID:4228
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3820 CREDAT:17410 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4324

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\suggestions[1].en-US

                  Filesize

                  17KB

                  MD5

                  5a34cb996293fde2cb7a4ac89587393a

                  SHA1

                  3c96c993500690d1a77873cd62bc639b3a10653f

                  SHA256

                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                  SHA512

                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                • C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.dmp

                  Filesize

                  2.2MB

                  MD5

                  457317d99e4920a96d62adebe5499884

                  SHA1

                  e42ca0fd9e342e4b471695244ee80786986d674c

                  SHA256

                  1d2e66f0a8ca2556eb85b3a8d0043d1a8478f8ca6de1b0bd09eab8826a38402c

                  SHA512

                  38eb3aca7069ae784c3c8df4e86c55c9e3e84503c0120ff47437f496e7675f0b8ce3659671fe1227c4c046323d623e0591843a0c6700f76b89b21f13d3e72aa5

                • C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.exe

                  Filesize

                  881KB

                  MD5

                  af7c3cfa8662bd7eed9ff0fe83c3756d

                  SHA1

                  47ad0bb3adb2c184c10d0f6f9abb90eb7f6ff3ea

                  SHA256

                  573edfe32df21d9fac6f7948899d4dabfc6f82f0895a82566787f3bc7ad83ab4

                  SHA512

                  ac3eb29a0442d90bada22045249f96115cef35ceb3b8150752a1da3b781e86d5bd4dc06d77708f61d77e25584369658599ebb89090a56063609c340716888be0

                • C:\Users\Admin\ZfAdmin84\ZfAdmin84\ZfAdmin84.zip

                  Filesize

                  6.8MB

                  MD5

                  7f46e18551ebdd8aaf8ec95ce3bcd18a

                  SHA1

                  1d94325a74ebb383668c32f7da4fe0b617fbe5ea

                  SHA256

                  e43cd40a34aae5573f01d0091ce80bcefd33d2d1a139827ec426b185cf79bb18

                  SHA512

                  83a11298551dfc3a211598a6455effe99b39e95ee76d968f77776f3ba7ac139d0b63913b595eeb6247cc2bf9f2913c2be5ebb513f982d8abac53909923b43dba

                • C:\Users\Admin\ZfAdmin84\ZfAdmin84\msedge_elf.dll

                  Filesize

                  4.3MB

                  MD5

                  73fed86340e83c3b4cd7d656afb3c7d3

                  SHA1

                  d8712d6b0d1887999e487ad1672a1af240f1e730

                  SHA256

                  23843b4520a66cef870603a3b5e1781b19a6661a2edb8d9e45653c10d4b1c2c3

                  SHA512

                  96d74ded90782b9ec07cc2b1042d13395bec57df36820bcdfcfb8aa027ce98a8d8f0c559360d722cba9daabfec67dcd778717d0e3ac4b5d2f7cfeda4e4749a25

                • C:\Windows\Installer\MSIE318.tmp

                  Filesize

                  738KB

                  MD5

                  8e65fea37f700d948d1b67afd43b97fc

                  SHA1

                  823d2b30ec0372e0dc36f7983ad2de1ceda4036c

                  SHA256

                  20c648a2a4313b1b20da50a9b788d8a1b9637e154adae4541b65badaa40266c9

                  SHA512

                  07faf03685fde9c71f6bc4b3caecfe4d3c707a8bec5bce1a544f59c1f853edde8f37c019c16bffd3e8fbe5c72c0666ffe0e2dffd878744da64f47e52c7625084

                • memory/4696-111-0x0000000071D40000-0x00000000721B3000-memory.dmp

                  Filesize

                  4.4MB