Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
18-05-2024 20:32
Behavioral task
behavioral1
Sample
a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi
Resource
win10v2004-20240426-es
General
-
Target
a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi
-
Size
22.9MB
-
MD5
1a526ef8e0d93204cf570fe413be69cf
-
SHA1
4eac6841481e6b35f48c38bb8cf64ebb3878fc04
-
SHA256
a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8
-
SHA512
5ebf90213460c9b92401da2d7765af19305e977d8ea6a10e3c7b435a73a010f2e0fa418a932ab7f5dc0aaa025123a1bfc5a8105edb42b5ec424690585026c85e
-
SSDEEP
393216:xopaHTAZuGS1jOXNl/BXbcl0Xrz8o04Z:7LmBV04Z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\sgcdg7lrs = "C:\\v0tm009i\\YSBBC.exe" YSBBC.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 856 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI3355.tmp msiexec.exe File opened for modification C:\Windows\Installer\f762eed.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2F79.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3110.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3315.tmp msiexec.exe File opened for modification C:\Windows\Installer\f762ef0.ipi msiexec.exe File created C:\Windows\Installer\f762eed.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI318E.tmp msiexec.exe File created C:\Windows\Installer\f762ef0.ipi msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 YSBBC.exe -
Loads dropped DLL 7 IoCs
pid Process 856 MsiExec.exe 856 MsiExec.exe 856 MsiExec.exe 856 MsiExec.exe 856 MsiExec.exe 856 MsiExec.exe 2704 YSBBC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1112 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1852 msiexec.exe 1852 msiexec.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 YSBBC.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2340 msiexec.exe Token: SeIncreaseQuotaPrivilege 2340 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeSecurityPrivilege 1852 msiexec.exe Token: SeCreateTokenPrivilege 2340 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2340 msiexec.exe Token: SeLockMemoryPrivilege 2340 msiexec.exe Token: SeIncreaseQuotaPrivilege 2340 msiexec.exe Token: SeMachineAccountPrivilege 2340 msiexec.exe Token: SeTcbPrivilege 2340 msiexec.exe Token: SeSecurityPrivilege 2340 msiexec.exe Token: SeTakeOwnershipPrivilege 2340 msiexec.exe Token: SeLoadDriverPrivilege 2340 msiexec.exe Token: SeSystemProfilePrivilege 2340 msiexec.exe Token: SeSystemtimePrivilege 2340 msiexec.exe Token: SeProfSingleProcessPrivilege 2340 msiexec.exe Token: SeIncBasePriorityPrivilege 2340 msiexec.exe Token: SeCreatePagefilePrivilege 2340 msiexec.exe Token: SeCreatePermanentPrivilege 2340 msiexec.exe Token: SeBackupPrivilege 2340 msiexec.exe Token: SeRestorePrivilege 2340 msiexec.exe Token: SeShutdownPrivilege 2340 msiexec.exe Token: SeDebugPrivilege 2340 msiexec.exe Token: SeAuditPrivilege 2340 msiexec.exe Token: SeSystemEnvironmentPrivilege 2340 msiexec.exe Token: SeChangeNotifyPrivilege 2340 msiexec.exe Token: SeRemoteShutdownPrivilege 2340 msiexec.exe Token: SeUndockPrivilege 2340 msiexec.exe Token: SeSyncAgentPrivilege 2340 msiexec.exe Token: SeEnableDelegationPrivilege 2340 msiexec.exe Token: SeManageVolumePrivilege 2340 msiexec.exe Token: SeImpersonatePrivilege 2340 msiexec.exe Token: SeCreateGlobalPrivilege 2340 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe Token: SeRestorePrivilege 1852 msiexec.exe Token: SeTakeOwnershipPrivilege 1852 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2340 msiexec.exe 2340 msiexec.exe 2704 YSBBC.exe 2704 YSBBC.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2704 YSBBC.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 856 MsiExec.exe 856 MsiExec.exe 856 MsiExec.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe 2704 YSBBC.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 1852 wrote to memory of 856 1852 msiexec.exe 29 PID 856 wrote to memory of 2704 856 MsiExec.exe 32 PID 856 wrote to memory of 2704 856 MsiExec.exe 32 PID 856 wrote to memory of 2704 856 MsiExec.exe 32 PID 856 wrote to memory of 2704 856 MsiExec.exe 32 PID 2704 wrote to memory of 1636 2704 YSBBC.exe 34 PID 2704 wrote to memory of 1636 2704 YSBBC.exe 34 PID 2704 wrote to memory of 1636 2704 YSBBC.exe 34 PID 2704 wrote to memory of 1636 2704 YSBBC.exe 34 PID 1636 wrote to memory of 1112 1636 cmd.exe 36 PID 1636 wrote to memory of 1112 1636 cmd.exe 36 PID 1636 wrote to memory of 1112 1636 cmd.exe 36 PID 1636 wrote to memory of 1112 1636 cmd.exe 36
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2340
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 85E1D924C2FC9627174799C9DBE115D72⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\v0tm009i\YSBBC.exe"C:\v0tm009i\YSBBC.exe"3⤵
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /renew4⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- Gathers network information
PID:1112
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
21.8MB
MD56aef22a7a79011375c339df8e1dfb7e2
SHA140bb0afaf2c9e249632c938c1c4cf67691dbd5af
SHA2563c1db818b1d35baa6aa32d24012c41dd2f0ad45a300713366fd4a850695123a9
SHA5122ab05a71c23cbcb23b823b80edfafd3f326ede8c08ef87244d385706733ccf2fe8b70822e67d6fc5c5c83274910a2738647e169aa16ff61394b209af591c011d
-
Filesize
5.7MB
MD5b43c99c9e4b57ea9fef141ac306e59fe
SHA1b4f15a82fd94043f94267fe8948a2d402176f731
SHA256437d592cec3a0085b89f21ba1bcf41f6d62c9ce7cca7fe2452eebb567ffb9d06
SHA5127c1d39fa3f0c58939000722fc2a6a3155e12444e1986317775158019b6915225255b86c7f16d5afaf10223e8ab0f9b3c9357eda19e7f5f716ee14f3da5e6e1c9
-
Filesize
1.5MB
MD59982dd5b2f0c21404a2025db4900966e
SHA143484b55d1ba57fc05234aa8c05c0d4adb78239c
SHA256e0e888371dfe14b8e2e8115bab277d1f17bffbff2a83fe6e259edf7e05cc6267
SHA5120c89a65b4e3fdd0dfc1a1dbd4bca458cd386e1d42e78baa19d8860bb49a9164607475db9a455e42fd58008e0a5c9bbeaa40cdd1ba868bbd696873cfbe3ed311e