Analysis

  • max time kernel
    139s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    18-05-2024 20:32

General

  • Target

    a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi

  • Size

    22.9MB

  • MD5

    1a526ef8e0d93204cf570fe413be69cf

  • SHA1

    4eac6841481e6b35f48c38bb8cf64ebb3878fc04

  • SHA256

    a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8

  • SHA512

    5ebf90213460c9b92401da2d7765af19305e977d8ea6a10e3c7b435a73a010f2e0fa418a932ab7f5dc0aaa025123a1bfc5a8105edb42b5ec424690585026c85e

  • SSDEEP

    393216:xopaHTAZuGS1jOXNl/BXbcl0Xrz8o04Z:7LmBV04Z

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\a1b3c334db545aaf83e573c915d23e4eefae734970ad6895a67a7b97279c24f8.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5088
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2CD15073FA1FFC2618F27A40B0B658B9
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:4008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 1264
        3⤵
        • Program crash
        PID:1636
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4008 -ip 4008
    1⤵
      PID:2120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSI5C78.tmp

      Filesize

      554KB

      MD5

      3b171ce087bb799aafcbbd93bab27f71

      SHA1

      7bd69efbc7797bdff5510830ca2cc817c8b86d08

      SHA256

      bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4

      SHA512

      7700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38

    • C:\Windows\Installer\MSI5EFD.tmp

      Filesize

      21.8MB

      MD5

      6aef22a7a79011375c339df8e1dfb7e2

      SHA1

      40bb0afaf2c9e249632c938c1c4cf67691dbd5af

      SHA256

      3c1db818b1d35baa6aa32d24012c41dd2f0ad45a300713366fd4a850695123a9

      SHA512

      2ab05a71c23cbcb23b823b80edfafd3f326ede8c08ef87244d385706733ccf2fe8b70822e67d6fc5c5c83274910a2738647e169aa16ff61394b209af591c011d