Analysis

  • max time kernel
    126s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 21:28

General

  • Target

    9c74d2.msi

  • Size

    856KB

  • MD5

    7df20d9d562dd9cac2d6cdc5fa7208f7

  • SHA1

    49d3188918876c11a83631058dcd5e46890e499c

  • SHA256

    52a756d1a43ddfb7eda39715a2cfa37bb474a1f24556b0d905fc73ca93122fdc

  • SHA512

    78c9a31e58e6191785d1a73852b2e1d681778baa9052a81026b40bbb5d1fa8b9130e1fbbfab51560f17e69bc186ed68e63ac37588feccea7059ffa6f20c24600

  • SSDEEP

    12288:T7xeimPfdJ+oZqU8VKIvZUlkj/cBhZeK4lu/XdmYwk:vxeNPLNHWvZgkjcDefMFmi

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Loads dropped DLL 3 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9c74d2.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 47F8F8E043D9AE5A4AB4649834B2392C C
      2⤵
      • Loads dropped DLL
      PID:4760
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E146B0F8CB803B3B80CA2D56540D1DA0
      2⤵
      • Loads dropped DLL
      PID:3136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e599b9b.rbs

    Filesize

    8KB

    MD5

    6dbaad1ccd7e5bee07d362c41be71794

    SHA1

    6c731cf84610fa261dd375cf147e939a85fa95cd

    SHA256

    fc82f00de39c8e6b2fd39d805002fd7e59b4295bfacc7b33ec36706150743d7a

    SHA512

    c240a1f5ec9952c784f9914648a99f157364dc1781ac83d968c5352f61f218ada2a112d22eee5e7a96112f3d0268ef2204075f74e3e084e0d26b1083d9376418

  • C:\Users\Admin\AppData\Local\Temp\MSI2D93.tmp

    Filesize

    244KB

    MD5

    60e8c139e673b9eb49dc83718278bc88

    SHA1

    00a3a9cd6d3a9f52628ea09c2e645fe56ee7cd56

    SHA256

    b181b6b4d69a53143a97a306919ba1adbc0b036a48b6d1d41ae7a01e8ef286cb

    SHA512

    ac7cb86dbf3b86f00da7b8a246a6c7ef65a6f1c8705ea07f9b90e494b6239fb9626b55ee872a9b7f16575a60c82e767af228b8f018d4d7b9f783efaccca2b103

  • C:\Users\Admin\AppData\Local\Temp\MSI94D5.tmp

    Filesize

    142KB

    MD5

    2c2251fddbe9ebc6ed99ee27372babbf

    SHA1

    d2a6e7dc123e5e7561cb940bfe3bcd312f644ccf

    SHA256

    1cf779325e52a44b0e23edc1d1416da0e6be09d739c6d9c70b9d05f14585b502

    SHA512

    d3632c363296b772c0771cf126798148d1efe03caee52d025b85902484af19f4ad0973ee0907d0512c565aa7ab6b07a32b5879b6ecd79c8bc3502235d7ac84b6

  • C:\Windows\Installer\e599b9a.msi

    Filesize

    856KB

    MD5

    7df20d9d562dd9cac2d6cdc5fa7208f7

    SHA1

    49d3188918876c11a83631058dcd5e46890e499c

    SHA256

    52a756d1a43ddfb7eda39715a2cfa37bb474a1f24556b0d905fc73ca93122fdc

    SHA512

    78c9a31e58e6191785d1a73852b2e1d681778baa9052a81026b40bbb5d1fa8b9130e1fbbfab51560f17e69bc186ed68e63ac37588feccea7059ffa6f20c24600