Analysis

  • max time kernel
    7s
  • max time network
    11s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/07/2024, 18:47

General

  • Target

    RDPWInst-v1.6.2.msi

  • Size

    640KB

  • MD5

    92cbbe2d06d03c156c83ae1a02ab30e3

  • SHA1

    7d14f457f193d75dd7f52becdee5cf25b948573b

  • SHA256

    9899ffecf141ab4535ec702facbf2b4233903b428b862f3a87e635d09c6244de

  • SHA512

    b7eafccee7ab76411209f20cf370de53b0c83fc700047b2de66b26e540a07797b8f7eb1513bcceaa4cee4c8c0b2382788a154003236980f125c281cc7479bb4a

  • SSDEEP

    12288:GnAYhZFoqIVAV0yjNZzucNNZLVk/dJJibRoQu9kzWEYCdrflYemcS1/U:UASZFKAVbBZzu0Ni49oQu9DuZYebSS

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RDPWInst-v1.6.2.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:424
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\ProgramData\Package Cache\{37ea5771-3352-4a52-9fac-9297331daebd}\RDPWInst.exe
      "C:\ProgramData\Package Cache\{37ea5771-3352-4a52-9fac-9297331daebd}\RDPWInst.exe" -i -o
      2⤵
      • Server Software Component: Terminal Services DLL
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Windows\system32\netsh.exe
        netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:2016
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -s TermService
    1⤵
      PID:4100
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:4980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5794ee.rbs

      Filesize

      8KB

      MD5

      fef72579ca42112b3aed2ac1992814e3

      SHA1

      423ca57a525069c7c426832f59bf80032dbdc048

      SHA256

      43bc3cf4fccfd4bf70d2b5f0c7c6358f7333d0b2360b7015a07be97f9516d0ea

      SHA512

      87132ba99be9535d6e689c17c63e6da3efb8895d59cf4f2d6d1fe5974f11cc5a6a9d831fb1784d20dcdb4fbb059daa33a1b5464fb5719a72ef3fe79a4748a5d6

    • C:\ProgramData\Package Cache\{37ea5771-3352-4a52-9fac-9297331daebd}\RDPWInst.exe

      Filesize

      1.4MB

      MD5

      3288c284561055044c489567fd630ac2

      SHA1

      11ffeabbe42159e1365aa82463d8690c845ce7b7

      SHA256

      ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753

      SHA512

      c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02

    • C:\Windows\Installer\e5794ed.msi

      Filesize

      640KB

      MD5

      92cbbe2d06d03c156c83ae1a02ab30e3

      SHA1

      7d14f457f193d75dd7f52becdee5cf25b948573b

      SHA256

      9899ffecf141ab4535ec702facbf2b4233903b428b862f3a87e635d09c6244de

      SHA512

      b7eafccee7ab76411209f20cf370de53b0c83fc700047b2de66b26e540a07797b8f7eb1513bcceaa4cee4c8c0b2382788a154003236980f125c281cc7479bb4a

    • \??\c:\program files\rdp wrapper\rdpwrap.dll

      Filesize

      114KB

      MD5

      461ade40b800ae80a40985594e1ac236

      SHA1

      b3892eef846c044a2b0785d54a432b3e93a968c8

      SHA256

      798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

      SHA512

      421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

    • \??\c:\program files\rdp wrapper\rdpwrap.ini

      Filesize

      128KB

      MD5

      dddd741ab677bdac8dcd4fa0dda05da2

      SHA1

      69d328c70046029a1866fd440c3e4a63563200f9

      SHA256

      7d5655d5ec4defc2051aa5f582fac1031b142040c8eea840ff88887fe27b7668

      SHA512

      6106252c718f7ca0486070c6f6c476bd47e6ae6a799cffd3fb437a5ce2b2a904e9cbe17342351353c594d7a8ae0ef0327752ff977dee1e69f0be7dc8e55cf4ec

    • memory/4952-30-0x0000000000400000-0x000000000056F000-memory.dmp

      Filesize

      1.4MB