Analysis

  • max time kernel
    14s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 12:48

Errors

Reason
Machine shutdown

General

  • Target

    FaturaVivo.pdf96.msi

  • Size

    4.6MB

  • MD5

    4d5f7f3d73e21811b607b14070935390

  • SHA1

    f8d216641c89ca58df0f5ed0b8543f68f02ef1c9

  • SHA256

    cd0d64c504bcb77944ea917ec72d8fd95d2c3c6a073f0b19b2e7beedfa0b85e4

  • SHA512

    c0e25f68dc681835021e6238c08ed33430275a520df68d4a831d2788d22a514d44c2803b581ad720ecf1f948318ea9898c63c596de57ff5a18ade73992df59a9

  • SSDEEP

    98304:IY5AqbFUXb52TaeHbV7FVAs/i24NaHdAeah32ILTauGLCY4YUR5IhciUHc4kJT:NxUXb5saeHbVBVAsOaHdSQ2BfYY5Kcif

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\FaturaVivo.pdf96.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C129E9568971318C0ED9225738995CCE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C start /MIN reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "AdminvJhbX©" /t reg_sz /d "\"C:\AdminvJhbX©\cWHGr©.exe\"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\SysWOW64\reg.exe
          reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "AdminvJhbX©" /t reg_sz /d "\"C:\AdminvJhbX©\cWHGr©.exe\"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1528
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C start /MIN shutdown -r -f -t 00
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown -r -f -t 00
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:888
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1720
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1500

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ADMINV~1\ADMINV~1.ZIP

        Filesize

        14.5MB

        MD5

        a3a91dbee0686872da99c9b5af8c92ce

        SHA1

        5a9e830e9da11c0ce0e7b9227ee12333f89b4015

        SHA256

        3d4ba4825beb10790650c8badb9d6e4c7eabbf5252e5731fb63a737a20c2e99c

        SHA512

        dfd1d0c8a32786de636a4dd663d85fadccf02a468bafcadfc85c3687281a89b7bdb7cab860cf73aa3cee6b255d72c63de9aaac617c66f0dbcbe3b32bc06b3059

      • C:\Config.Msi\f76f24f.rbs

        Filesize

        1KB

        MD5

        ba58e76f1427a42936a15c557db74157

        SHA1

        eb1bb8d4a2695408c22920d048ddbae761e2f438

        SHA256

        df05de96ea1232aa10c24bcbabf9f64a6d06b44a8b5ad3027a956592d92433fc

        SHA512

        fa156d37a2b8b47943cf43110f877ba97c84a174c0477b21d158c8ff2b3ecb7e9c0a282372ae59be225a9bdea2233720b4ab694e39cf49420d341bfaa2f4dfd1

      • C:\Users\Admin\AppData\Local\Temp\MSI6f1be.LOG

        Filesize

        20KB

        MD5

        faa97ebb26b210be97de3c847af1071e

        SHA1

        18ac39661770be9adb0cd132bd32be04108e8ca7

        SHA256

        4129d45ce7ef6d02399ff900cbe0bdcdf1dca2add386625b8d5822255ef4667a

        SHA512

        1faaee0636cde02a4ba1cdeb9face6a3d40d7f64e6ae87f71c3831b0fde220233260de2f8a8792948ac5398c8e40bf8953c0e0eefab8b9f6200a609867a6cec0

      • \Windows\Installer\MSIF27A.tmp

        Filesize

        91KB

        MD5

        5c5bef05b6f3806106f8f3ce13401cc1

        SHA1

        6005fbe17f6e917ac45317552409d7a60976db14

        SHA256

        f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

        SHA512

        97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

      • memory/2360-27-0x0000000000600000-0x0000000000602000-memory.dmp

        Filesize

        8KB