Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-es
  • resource tags

    arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    18-05-2024 20:32

General

  • Target

    a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi

  • Size

    22.9MB

  • MD5

    1a526ef8e0d93204cf570fe413be69cf

  • SHA1

    4eac6841481e6b35f48c38bb8cf64ebb3878fc04

  • SHA256

    a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8

  • SHA512

    5ebf90213460c9b92401da2d7765af19305e977d8ea6a10e3c7b435a73a010f2e0fa418a932ab7f5dc0aaa025123a1bfc5a8105edb42b5ec424690585026c85e

  • SSDEEP

    393216:xopaHTAZuGS1jOXNl/BXbcl0Xrz8o04Z:7LmBV04Z

Malware Config

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2340
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 85E1D924C2FC9627174799C9DBE115D7
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\v0tm009i\YSBBC.exe
        "C:\v0tm009i\YSBBC.exe"
        3⤵
        • Adds Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ipconfig /renew
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            5⤵
            • Gathers network information
            PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI2F79.tmp

    Filesize

    554KB

    MD5

    3b171ce087bb799aafcbbd93bab27f71

    SHA1

    7bd69efbc7797bdff5510830ca2cc817c8b86d08

    SHA256

    bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4

    SHA512

    7700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38

  • C:\Windows\Installer\MSI3355.tmp

    Filesize

    21.8MB

    MD5

    6aef22a7a79011375c339df8e1dfb7e2

    SHA1

    40bb0afaf2c9e249632c938c1c4cf67691dbd5af

    SHA256

    3c1db818b1d35baa6aa32d24012c41dd2f0ad45a300713366fd4a850695123a9

    SHA512

    2ab05a71c23cbcb23b823b80edfafd3f326ede8c08ef87244d385706733ccf2fe8b70822e67d6fc5c5c83274910a2738647e169aa16ff61394b209af591c011d

  • C:\v0tm009i\YSBBC.exe

    Filesize

    5.7MB

    MD5

    b43c99c9e4b57ea9fef141ac306e59fe

    SHA1

    b4f15a82fd94043f94267fe8948a2d402176f731

    SHA256

    437d592cec3a0085b89f21ba1bcf41f6d62c9ce7cca7fe2452eebb567ffb9d06

    SHA512

    7c1d39fa3f0c58939000722fc2a6a3155e12444e1986317775158019b6915225255b86c7f16d5afaf10223e8ab0f9b3c9357eda19e7f5f716ee14f3da5e6e1c9

  • C:\v0tm009i\tont.dll

    Filesize

    1.5MB

    MD5

    9982dd5b2f0c21404a2025db4900966e

    SHA1

    43484b55d1ba57fc05234aa8c05c0d4adb78239c

    SHA256

    e0e888371dfe14b8e2e8115bab277d1f17bffbff2a83fe6e259edf7e05cc6267

    SHA512

    0c89a65b4e3fdd0dfc1a1dbd4bca458cd386e1d42e78baa19d8860bb49a9164607475db9a455e42fd58008e0a5c9bbeaa40cdd1ba868bbd696873cfbe3ed311e

  • memory/856-21-0x00000000726A0000-0x0000000073D12000-memory.dmp

    Filesize

    22.4MB

  • memory/856-39-0x00000000726A0000-0x0000000073D12000-memory.dmp

    Filesize

    22.4MB

  • memory/2704-81-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-85-0x0000000000400000-0x0000000000AC9000-memory.dmp

    Filesize

    6.8MB

  • memory/2704-70-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-82-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-83-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-80-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-64-0x0000000004A60000-0x0000000004A61000-memory.dmp

    Filesize

    4KB

  • memory/2704-73-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-72-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-71-0x00000000056D0000-0x0000000005854000-memory.dmp

    Filesize

    1.5MB

  • memory/2704-86-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-88-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-91-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-93-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-95-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-97-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-99-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB

  • memory/2704-101-0x00000000727B0000-0x0000000073D1B000-memory.dmp

    Filesize

    21.4MB