Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2024 14:13

General

  • Target

    Installer-master-BlackMythWukong.msi

  • Size

    43.8MB

  • MD5

    4cbea3318f7107adb73e10fd8de96abf

  • SHA1

    c6db50f856e92e5b0fa2f4b3855cbd58aa408fc1

  • SHA256

    395c44cce9624a5750c97c313b5ede45ea36dd623bc71f7d1bf2e4964492dcd4

  • SHA512

    724291101a4859c8e700ff762e48f6e2ded60fed23bfd64be7c438552c885b22d35b693ec03c2d234afe60d9defdc39ada77fedd9d3c881710935aa4e4f9b931

  • SSDEEP

    786432:H8JJ5v6bZ0no3r27KIvSOcaVWfoyI4aEK0Gpqq++mFIjqEKrdLi9VMkryQs:HC5i10noy7KS/RVLCqpP++mF+gLBf

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 17 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Installer-master-BlackMythWukong.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1252
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C129A81CA73205D054895F5E034DB18C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1612
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1064
      • C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\files\visapro.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\files\visapro.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2936
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2588
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\files"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2556
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2080
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000003BC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e9e4.rbs

    Filesize

    8KB

    MD5

    452c1f53ecde79ccf03ad09ebcf92fc9

    SHA1

    9845815e5f8df353e880ea10acc62a22efbb811f

    SHA256

    ab81391c4b06f86325cc288e1a986034c7f08dea5a259b2550ae669bef348ef7

    SHA512

    9448f206baef22ec6956dffdddc78c8688e37926ade325c49ae4c720ba31cc828f0b43a52d7ab1caa12b08a67df639aa3dc15dbfca191a666bf0f6d9cecd2428

  • C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\files.cab

    Filesize

    43.4MB

    MD5

    9f1ce12a6a16d2755d486fdbd2c0f506

    SHA1

    8082354009566d640b028f1266e0e3bfd2fc333d

    SHA256

    0bd8fb2d6b28c93dcf4c3badffae9041287221a2db276ff872a78221ac1e0f31

    SHA512

    bd8d0308e4504c92f9e59f46bafe90ff278218ad858736e32ade76c9d48ff9db83572d972dbd7f269a2d11913c2b2c0e2b6a2c7f37dc5f27d7be45dc323cdbfb

  • C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\files\visapro.exe

    Filesize

    49.6MB

    MD5

    53a23a0592e5aab08e0fa996497337f4

    SHA1

    7c843871ef5debb284915c6c7628d96563e3693e

    SHA256

    d3f7809ae8ccc194787198cc370952ab22a9b74bcae1e249f840c18798205bc1

    SHA512

    d21aaae60d62b2c9a1bf52fa4464cefc777ca81e9122aca8989afcf0676f81e39af8f3df405c4cc3b8c68f8a1bcb94adcb60a718f80d63084bb79323f775d321

  • C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\msiwrapper.ini

    Filesize

    1KB

    MD5

    48563eee266da713171ed9b384d23211

    SHA1

    5c2dfffd7413cf90582c7a33930adb621f0a07e4

    SHA256

    03b448c11e26cfbf230a095b788c8e93ef38ba96db921cd7395c8d39e037f90a

    SHA512

    f2f246ca9a3a100098901f76e03f74684706f1bf84e6c663ecc869a87b5831976f36ae0e1deb916d864fea95b0d69cad7190e018a3f23f70f2cff0ea3029262b

  • C:\Users\Admin\AppData\Local\Temp\MW-a66ce737-a906-4f30-ad2e-33b989347a54\msiwrapper.ini

    Filesize

    1KB

    MD5

    d5d742be27a45074a5cb75a6c0b1e23a

    SHA1

    6cdd29242df6fdab251a188b88a5d373ef66d0ef

    SHA256

    08d7a882afad69390092b6d7e3bef0970c4a365442ad34393f885d275fdcbd49

    SHA512

    448108a96cbd123368cadfd48f44e1f4a67dc76e73268695e1aa758cf7a57bdd35345d781a1f987e54206da61e7447e05b9af5afd3431e38365a0e61d6ae646d

  • C:\Windows\Installer\MSIEB0A.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108