Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 12:50

General

  • Target

    SZSJFC-LYGGCEAETGRK2024OGXZ.msi

  • Size

    21.6MB

  • MD5

    86d7e56b57cb3a329273c61c0a3f4b1f

  • SHA1

    125c0ef312b657fba1562eb5d15168d3f9297f7e

  • SHA256

    fd24e279901c43d2f105e65f7834d5e8c31b5811a600dc621322201b81d2e06e

  • SHA512

    860231937aba8b59d8f8e120fdc376c834667331a74aa788da268d486bc4de6b82095a21f8803b05d005f3bb537d9496e6925a27dcef366efe5050883700a9fc

  • SSDEEP

    196608:y9MZTzhJa7S+XeAxsopO5epA38FhlIrHttuAkEQob:y6ZTVtAykO5yA3GhlIrNcEjb

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SZSJFC-LYGGCEAETGRK2024OGXZ.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2268
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 78525EB4A5E7D5A487D5B85ABDC4D1D0
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e573849.rbs

    Filesize

    581B

    MD5

    a837260198bd0703b28b2dacf5bed4b5

    SHA1

    137c4e2eeb6c6072fcf3f820c296f77a5d5ac1ce

    SHA256

    638b217720c7fb90a85554c66783d1b75f4ef19bc83d7b5669b01d1b43ce3eb9

    SHA512

    7a3e66e5d6de6b5c09f9d77e215b63a4cc80ac30250dab5e63ab1382cc9fd0904f82a15b3835658a08bf22e023c8379100153e3d01861c1a4c1f30828b7dacdb

  • C:\Windows\Installer\MSI38B3.tmp

    Filesize

    554KB

    MD5

    3b171ce087bb799aafcbbd93bab27f71

    SHA1

    7bd69efbc7797bdff5510830ca2cc817c8b86d08

    SHA256

    bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4

    SHA512

    7700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38

  • C:\Windows\Installer\MSI3B39.tmp

    Filesize

    20.4MB

    MD5

    7b84d437f625427767037f40d61ea4eb

    SHA1

    2998a3ea50486395dbc3d6adb72549ca2b7ecaab

    SHA256

    ca4eb72b1ae58c8e32070ff91377f9404d3d2ec6fb86c110092cf6ecd4699120

    SHA512

    4f1deb38b639c287799b5a4ee53934a1edd81f892c6c76b17a9a6ab0929db9ce139933774deba5757de282b860a81250e5917e86bdb9ded95929847779db7b55

  • memory/3052-26-0x0000000072ED0000-0x00000000743E5000-memory.dmp

    Filesize

    21.1MB