Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 21:24

General

  • Target

    VTRL_2.1.8_x64_en-US.msi

  • Size

    3.3MB

  • MD5

    782cc6839587559457932619a853681f

  • SHA1

    3be67bb5c011d4cc9d893a21021751b8c29ff012

  • SHA256

    7ad28e6c71df60dc5c8271e23370a7f8090c09a989286944d0e40ff2cad31ba9

  • SHA512

    4dc4c17457410ba9addb222763b683a3de1663bb4d640a06c373b20717f0c7ac934e7f48fb426a7b14a3fce68bd292ac38e1d391727f6132b48e3a736a65b794

  • SSDEEP

    98304:rTowL4svUiw2pwngDZMZntWJtvUmpv8m:nzL4ow2KnPZ0vU

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\VTRL_2.1.8_x64_en-US.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2732
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads