Analysis

  • max time kernel
    414s
  • max time network
    428s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 13:39

General

  • Target

    FortiClientVPNOnlineInstaller.exe

  • Size

    2.7MB

  • MD5

    11bfc265fc53ac4756e4ef2759ca10eb

  • SHA1

    e3d2bf11618c39dfd036bb33ea96aa5f989fed25

  • SHA256

    2e520faa2b71ba56643153b77c2908c0d6da34a2f6f9abaa7cbadab9278dc99e

  • SHA512

    6b1e802f82002c5f8162a48440e09631da12fbfa283fc03bbf405938406955581764cda3ae57021d9e1b821a128b227e77b38dd6994a655f438ac5081f5ae689

  • SSDEEP

    49152:nZ2d2wu+8ewJobcRgEekPZ99ztx5IX0hL5m6bgy:nZ2dnu+AMW9x2O

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortiClientVPNOnlineInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\FortiClientVPNOnlineInstaller.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\FortiClientVPN.exe
      C:\Users\Admin\AppData\Local\Temp\FortiClientVPN.exe
      2⤵
      • Enumerates connected drives
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2732
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 465BA26A774E60DA411D44CC7CEE2837 C
      2⤵
      • Loads dropped DLL
      PID:3664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    c9ef399a388c657e9b1ab92ca79b8472

    SHA1

    9685b1d73630979b498397f5ef8048b7c7c5aec4

    SHA256

    1210fe5cc6b44380ab8817cfb692534895ed3074757fc0c76bc9fe3d1143f6df

    SHA512

    314640863e559cb468d0dc332ea51ece035bf717f395d79d3be09690c88b5535c9071597338a3b119b31355a1228a60a6b465772a3d162658cca89031fca56ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_052D619A1738623B01B6A412349193C8

    Filesize

    727B

    MD5

    2249ec2bd0fe7a24408f7ebaadcdac9b

    SHA1

    adc9e5157c7c65cd2b061b1fefed1ce16a9eb1db

    SHA256

    bd805f7d4c3c9a1eea8c3b5313de6761f612c0bbaa70077ddb8431bdf2be0fb9

    SHA512

    b0d5257a326eeaa2329ce56935c7b50cfb2c616d5a6fbf3d6bd253f1c52896b0a5aa09c2e01e10b93abd61fa50845d8044db1ad18684f4bf6fa01f338ec0d790

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1

    Filesize

    1KB

    MD5

    d91299e84355cd8d5a86795a0118b6e9

    SHA1

    7b0f360b775f76c94a12ca48445aa2d2a875701c

    SHA256

    46011ede1c147eb2bc731a539b7c047b7ee93e48b9d3c3ba710ce132bbdfac6b

    SHA512

    6d11d03f2df2d931fac9f47ceda70d81d51a9116c1ef362d67b7874f91bf20915006f7af8ecebaea59d2dc144536b25ea091cc33c04c9a3808eefdc69c90e816

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    c210f6689aca680446c0d8ecdef2e46b

    SHA1

    66cba496d984f92fed05f77101c45734f193e211

    SHA256

    8f8540c24fcc6ddfddbcabf8f028f8052addf41601d5226ffe378a6e7d4caf5d

    SHA512

    9c62a6b2a129a50e2094566d88acd7c25ee29600ed1596e6972f684edd48d11366605dca0d90133d489b51eb38bbb6c1a5ad68d0ec9f81c8d23055d03e9540b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    c011802ccabb2e3c0a6dba774ade3313

    SHA1

    4e263d8ef55b784121cfd2c146e14dd31e304b2a

    SHA256

    b38a5a14e5ff337dc1b08ba8f1a1a099845d3a607b521d60d3a91e6521e697aa

    SHA512

    ab15fdd5735a9b80fc5009ff3a0591d4b287eec7b2930d7323aacb37d64504d8c59e0d2eabe662814b0b52d30d058d7db4d6433eddbcae33c2d2bc45b0f1901c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_052D619A1738623B01B6A412349193C8

    Filesize

    412B

    MD5

    a727d470b92ab638bb65b918cbe974dd

    SHA1

    d978be2a86f4bf291914109daecbb72b04eba60a

    SHA256

    081eede4a3e2ae085c2c977f5440bd4e22c88675cc92639ce81d745fa51743da

    SHA512

    17f37040cd340fb41490d660c6c3e40752b41e0102cd712d63d86890912c69956da7d996cade6740c0813a4e319c0c90e67bbcba07a5819dad586316fa28346c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1

    Filesize

    308B

    MD5

    f2eecbf42e8523e13df396bb200867ee

    SHA1

    f7b9ee1ea922b14e8724b9a6106fc403caf4f25e

    SHA256

    2dba227e8bf43882c11162790e36a9b3f843ba9e7905d68e944cfe6005d41fd0

    SHA512

    4d1de5ab8425ba864b1ba7f0ab072ac76714c7212694f6d368b82dd303e7973f47023fd18b3ae7974c0d8a0bf83e4eb0433f31798a2f322737973e4e0c1437c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    363e55a59224c1b553879964ae64d933

    SHA1

    70c0ec4c34fe230ee4ad9ac34b5b6c54889e0fbf

    SHA256

    505e04bf5932345f7dfc4d3d5409de89e44833d22631a818f8dd25f1c7032bbd

    SHA512

    1194871c74111a7132f189eac5f8f12caa86a240d69863bf295c0588150a9f831db08c3ba8d68b42cd873db59a652a0345bef88b3928fc786b1e3ddda6beba67

  • C:\Users\Admin\AppData\Local\Temp\FortiClient00000.log

    Filesize

    1KB

    MD5

    4a52ffb01d7e38d8a008aab27917accb

    SHA1

    1f0c4320ca9cac8d0a04d14e3bb11e6aa409911b

    SHA256

    bb0fc2c35c5f6d0bb0a143d90ef1cc7396106880bc112d70f9197bb75598eb5b

    SHA512

    7de36a07b392a9dd4ccc0a2636340c8db1c8b9c0c58c8353cac144ada013676555a009a901033dbe624b7fbdf30ea89e292c9669ecb7408c51350d4035c1b33d

  • C:\Users\Admin\AppData\Local\Temp\FortiClient00000.log

    Filesize

    4KB

    MD5

    ae03780d044582fe01ebbfe40ea99f9e

    SHA1

    ff427643d37dcdfad79f511fb60497f3c6433389

    SHA256

    0e156d635efb1d513c82078e1328e10ee7a0f883e578a2a862a49144245c672e

    SHA512

    9b58099af4251cf84832ff2ae2ea5f603d1581b6b78619583a30616ca916f4fabafea81a9bd2a7ac432535b99f636ce28229c283dc7b5405f305bc6f19ca077f

  • C:\Users\Admin\AppData\Local\Temp\MSI2404.tmp

    Filesize

    7.7MB

    MD5

    32efbffda3376ee49d78baff6bce3cc5

    SHA1

    fb1195e34a9034309d8bf4608b65e205cac0b930

    SHA256

    f64e2cad4cdcc53694ca3dbd78b941039064d31ea5892d4ded3a533f0fed627a

    SHA512

    af22120bb60d0e2394c83059b5d2e68afb40c0fd02e613515257bc80dd3cf55c6792df5325cb87ad2046724b24303e6c9e1a3c9eb2219bd776826e03bc738920