Analysis

  • max time kernel
    103s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 20:43

General

  • Target

    ȸx86.msi

  • Size

    7.1MB

  • MD5

    fe4fa2e0f683686dcff7eda9c8f6dc43

  • SHA1

    64825f0711796a3d62fb67bf1c6d7ac7bee35c98

  • SHA256

    5a02f6700eb4cfc9c24f60068f92e71e9b465694657f297a9de03e02af244dcb

  • SHA512

    dc799a506e2b5bca479494bd2da7b56c6a792fd1ad362c2b9474241a4a4a65d5ff85bd23b5368f3c56d726d1ff2cc780c96c0d6ea8d2fca8650616e97bca5b68

  • SSDEEP

    98304:FN6wTl5/8PH85NfHTVEr4nowc/cn3bfl+oX3GdvLbfVjJQKI5LBEdVRM70h4Tq6M:L6Jq92c3goXqvfVJctmdVgVZ

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ȸx86.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1936
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2CFA700895101DE90BA07C595D8162C7 C
      2⤵
      • Drops file in Windows directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIA5D5.tmp

    Filesize

    557KB

    MD5

    e1423fc5ddaedc0152a09f4796243e31

    SHA1

    c92cec1fb6093d6922fe64719e583048fca12153

    SHA256

    3042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de

    SHA512

    fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39

  • C:\Users\Admin\AppData\Local\Temp\MSIA8C8.tmp

    Filesize

    703KB

    MD5

    59f4b7e8b960987b68b311660c99957a

    SHA1

    3ba452e27d4bf53e72bf28cde68240290e72e46f

    SHA256

    3b43d469e1f3656f948eabbd9e1ed99570a7962118fcfc9ccaa309eb657502bf

    SHA512

    64bd1ddbc90dfae6a7b34b67eaa32a0fd03e5ccff7e25f997dfb488f56b7ab2c7fab867915d05ba40f215216f87942d035e740edd64db7cb6df049a589dde27b

  • C:\Users\Admin\AppData\Local\Temp\MSIA907.tmp

    Filesize

    1.0MB

    MD5

    5566149fc623f29d55ca72018369c780

    SHA1

    8ae947ab0ae9182f1c09bd266ff360c0e8b88326

    SHA256

    a8c8ff2a0e754059b1f44ef69df492ef3cd582f3750f8c374037c9621069c608

    SHA512

    f9f49c930c3ead40f208482ab6f70a21a8495fd1c50b56a3f689eb53e8e7b8ca9a642bae2199fc80b6099bd3fdd3c4cfcd0d3a8cada47ebf23c7fcef87064cb5