Analysis

  • max time kernel
    422s
  • max time network
    1146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 20:44

General

  • Target

    hamachi.msi

  • Size

    13.7MB

  • MD5

    909db4061c32f798e94d746717782444

  • SHA1

    10f5ffff17d2dd4476686a941a7bcc5f9b83b1b8

  • SHA256

    6ee98db32852a2ff31a969d918bb7c730950bb15f24ea1baf996697cebc8b9fa

  • SHA512

    44e7f97b27aef2e4cb62a6a0ebab5033b99e1ec940f231eda416f3b68d83df81d10950a8ced2ca528024adecd1dea7e1d4427e78b111edbc0124d7ffd6c1232d

  • SSDEEP

    196608:cp/8gF8Li2aauOgsgJ9RSfD3G43O+WFoy1jNDVxJBQHhIO4E46uVwOXsHoHybhLf:O/382agT9RK73O+kN3JSHuy46inqUMC

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\hamachi.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4416
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 27CE3E353EF6DEB849FD4DC8D52A6BF9 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1784

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\HamachiSetup.log

          Filesize

          387B

          MD5

          364f992b68489ed6c3cb16ccaafe3fe9

          SHA1

          fe329ff3041d4448fa30cdafeb097d7d81d8cf98

          SHA256

          0fc2abd6d8bf89132484242fe3f38eef20c7ffa9fe1923607cae1c8180ff6d53

          SHA512

          156439accb55c574c8edb59117907d6dc6b90b46008521501fe575064a6be5ef08fde229fe8611644ffa30294a474d9a1ee0bc6d992c87673980127ed1e07c00

        • C:\Users\Admin\AppData\Local\Temp\HamachiSetup.log

          Filesize

          584B

          MD5

          5bdabf2649d35aa94a2a32a1e9322412

          SHA1

          6569a9a3cfe1bb2c0fa4174ae078115cd3cb3284

          SHA256

          6c586e8a574607c8f3e5e194cbd36923dce108ba95224649ac8aace78c47c968

          SHA512

          1959b475303602de5f07b775426e7dbed88731fa63d592715a3e5e0b8d832a3af191ca1a5450f7329627fbaea185df373a6d40e7eb43c8e8a8a572ccf8f2d607

        • C:\Users\Admin\AppData\Local\Temp\MSIC0CF.tmp

          Filesize

          2.3MB

          MD5

          3bc82080d6356dae779eed5135fabf66

          SHA1

          022c84f9cc59ec45315d78979497cd061658aba3

          SHA256

          b076c9b888b130fb2fb5a74542c9a73322e78ed1f3f8476be7a8209a20e56f7b

          SHA512

          041cd3945a22dcec792f45abc7f95b9fb7e68254948f0bfeb49de6b3501a0e13525454aa222dc4b903b3c9bafd4e0ffc2e5a99bd140238e845d3fcb7c496afbd