Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 20:18

General

  • Target

    setup.exe

  • Size

    10.9MB

  • MD5

    00bac975e69efdbf633cd695e0a6fbad

  • SHA1

    205dee4a96e634e2bfe366202f9e4cdec4fea3ce

  • SHA256

    1881cb7555c814f83e50d4b2fdb3fb66a0cc3e0776aa67a01b8ff7f6544625ea

  • SHA512

    d829d87917185d2f276aa32f05d561d61907a716bd1d330b967b78f8aa3adeb8ca6e9fdab5eed5cd13e8ebcdfc9e314084fff9db779638d3567aa17bdb9b14ee

  • SSDEEP

    196608:HM4aNk4LDK+g25YC+QmnkleS9rJB4IQn9ZlVen0BL5GuDlR/GLpyEDp:74q+7Y3uRJBnQn9A0lR/6y8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Windows\Downloaded Installations\{580F0402-A163-4EFF-8CB9-DA1A423B158F}\AnyOffice.NetЭͬ°ì¹«ÏµÍ³ 2009(4.2.4.0) Õýʽ°æ.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="setup.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2788
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B63CC7C9512EDC57CFE17131B352DCF1 C
      2⤵
      • Loads dropped DLL
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_is97E2.tmp

    Filesize

    1KB

    MD5

    b42c510fde70e376ae0b726e352a1f27

    SHA1

    0d41e951ca4a4e1ac0aa3ae4376e535b93eee4c0

    SHA256

    d709661b752eee06b6233fa7a373002af9230aa2acd44b277ef4bd2a709bf005

    SHA512

    9c9c34dd887bcbc2723e086d6c7108c0899e78c125a60d7718bcf913868e5283f4a296daf9284136505a40b3b1fb10576c7f8e4a60727e3e1ba5794bfb57b9a6

  • C:\Users\Admin\AppData\Local\Temp\{BEDB4302-3D4E-4950-B390-62412439F0E6}\0x0804.ini

    Filesize

    6KB

    MD5

    d79173462cb9377187d61ec9caf58344

    SHA1

    ed853089c38246eb3c8d06004b4ef0dc4c0d4a91

    SHA256

    e99a2f085d31fa583a54804f5784ac6ca3e1fbb505c8a26251532c7287ea2cd4

    SHA512

    c0a182eddf7972c7824b3dbf0502056a025c831c392c945780626968e458cf55a6db893a108a70a676fbaa5fdae6d27577bcc2377ffd8462532ac24f410d453a

  • C:\Users\Admin\AppData\Local\Temp\{BEDB4302-3D4E-4950-B390-62412439F0E6}\Setup.INI

    Filesize

    2KB

    MD5

    10a484fe7b0b5d8783ca5e740fc23c5f

    SHA1

    2acaf478b8d46a8b7dd4fb7f32f2cc069d6bed32

    SHA256

    e1002b859cf2b6c48a62efc361e3e62ed4687f0ed94b5ba686cb6dd745cea234

    SHA512

    dd5ee5fa54a17784e15846222b467d27b9f6fcb0da74ad7eef7e40e47c9f1ce9734bcc091a24524b9c3fd67cb5114af1d288b147f306829a9e2627c7b4e9d0c6

  • C:\Windows\Downloaded Installations\{580F0402-A163-4EFF-8CB9-DA1A423B158F}\AnyOffice.NetЭͬ°ì¹«ÏµÍ³ 2009(4.2.4.0) Õýʽ°æ.msi

    Filesize

    10.0MB

    MD5

    87268f320809ce21570e7fb0f13f7297

    SHA1

    e9a2c938007633d97a09628bad10aa0da4e2ed5a

    SHA256

    896f6f849abcc1b945b9676ae17c075394a62e9117a15db7a4bc4040802a1ed3

    SHA512

    116421f9d311c37e287994243d005b96aca29d92449c597a1504e40d4f69b751d862f030bc61a7d6ff98b0ac0b44dda51edbe81762c54bf6a32dceb80e677735

  • \Users\Admin\AppData\Local\Temp\MSIAC75.tmp

    Filesize

    513KB

    MD5

    ab8e6b4dc17767b1882bd5924b314179

    SHA1

    f0e5faeaf693c2e52bad68bba5449949bb7348e1

    SHA256

    37b4f14665862b6d1283abf4fbdfcaa8fd6b88f30cf23f9753e068f6344075c6

    SHA512

    0bbe09d6d9535004d88ecfa429e3a1e731eb71cac064eb863b43d9cf937a6b5355df0ed99023f961ff6ea984217a55530440bb1058e25980db8f64ff3152224b