Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 15:47

General

  • Target

    factura546532.msi_factura546532.msi_77938.msi

  • Size

    27.3MB

  • MD5

    d5853c4d813b09d80738c808e91675e8

  • SHA1

    648867888645fb9c50d2d98ea15f214878e56b46

  • SHA256

    8a7559fdc195c6a6bc0ba79ff154c17ca2c8cabbd7f6f5275895caa516448393

  • SHA512

    eaed46e72d4fcfad12d10a8d034dfbf0e048792cc0b4aaa317267f9200f06407de8cf83296c520be0603f7b7df0916b597393873d1653922e1e17fcba7f86cc9

  • SSDEEP

    393216:Utwqv0kSEeEqwODp2QLALCKip6SGM4srjbPl5RhpvH3LHZEBFis:Q+x2Sxzn9PHPbZEus

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Loads dropped DLL 7 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\factura546532.msi_factura546532.msi_77938.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2324
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5C9F91E924FC0E43257417811C03A35F
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2308

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Installer\MSI1A09.tmp

          Filesize

          867KB

          MD5

          19969c19c98a3459ebeb8f6d31ef4bb6

          SHA1

          899ee8eff774c5440a2b906e05d11258e0d81707

          SHA256

          8cea66c4bd7b03666a88e80791edb015df847381702a356eae0c2f8b6dd08e71

          SHA512

          c3776a4a564c2f9aa0fd89e39ea93e0508029677e5945c99daf74977026255b01630e9cb0c3513b136b2902a19c3aea506364bb1a2858ca73695021a0749ada4

        • C:\Windows\Installer\MSI1CDE.tmp

          Filesize

          24.5MB

          MD5

          9d51a5943e208abd91ffbd53b45fae82

          SHA1

          0d7f07df15f78070f4744880fa2654f26135b906

          SHA256

          f3e25ef103db5d307e3fdb36d9f08246e1d4f3a8418f1f519ffbceb6dd1e8870

          SHA512

          c6b3f7a0c1b51630ca5188a1b17327e629f65f2531709a9efb4224c1742843bb87bc40776cc0af38c7a70588525cd3d98b2a9646afc1cef464b7a94824688320

        • \Windows\Installer\MSI1870.tmp

          Filesize

          738KB

          MD5

          b158d8d605571ea47a238df5ab43dfaa

          SHA1

          bb91ae1f2f7142b9099e3cc285f4f5b84de568e4

          SHA256

          ca763693cc25d316f14a9ebad80ebf00590329550c45adb7e5205486533c2504

          SHA512

          56aef59c198acf2fcd0d95ea6e32ce1c706e5098a0800feff13ddb427bfb4d538de1c415a5cb5496b09a5825155e3abb1c13c8c37dc31549604bd4d63cb70591

        • memory/2308-48-0x0000000000200000-0x0000000000201000-memory.dmp

          Filesize

          4KB

        • memory/2308-46-0x0000000000200000-0x0000000000201000-memory.dmp

          Filesize

          4KB

        • memory/2308-44-0x0000000000200000-0x0000000000201000-memory.dmp

          Filesize

          4KB

        • memory/2308-49-0x0000000071CB0000-0x000000007353F000-memory.dmp

          Filesize

          24.6MB