Analysis

  • max time kernel
    88s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 17:43

General

  • Target

    SPSS_Statistics_22_win64.exe

  • Size

    774.5MB

  • MD5

    490f47f1e1a20469e499c7a75aac4385

  • SHA1

    4ef5857000f97a07fb55788bec72d673963b462f

  • SHA256

    c4c57358c968e86c8978b2759353bf28e042faa54b3065c7f016c1dc39760b77

  • SHA512

    7cfb5907a44d137bfd61f14747b0e17538e046efa95a50ab1aef9aa62bfcd6aa969251f371efbba6f27ddabad3786ddb9ee6be5d2bba524cb8e8d0260b6fcf8f

  • SSDEEP

    25165824:vK2SQZxrKJGAar0ak3Fb8+oXmvBVY4s45hF:vwQkGAaIt3FbNo25Vv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SPSS_Statistics_22_win64.exe
    "C:\Users\Admin\AppData\Local\Temp\SPSS_Statistics_22_win64.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\system32\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{85D441EC-B8B3-4B4A-BB6F-0035B93FA6DB}\IBM SPSS Statistics 22.msi" /L*v "C:\Users\Admin\AppData\Local\Temp\SPSSStatistics22Log.txt" TRANSFORMS="C:\Users\Admin\AppData\Local\Temp\{85D441EC-B8B3-4B4A-BB6F-0035B93FA6DB}\1033.MST" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="SPSS_Statistics_22_win64.exe"
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2268
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9924C96E5738E96CD4D0DFA4204E861C C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{41E6AC13-33B2-42D8-95B3-C4D549D6877C}
        3⤵
        • Executes dropped EXE
        PID:708
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{33FD3865-9C8C-4E6C-A15F-6A4337972FF3}
        3⤵
        • Executes dropped EXE
        PID:2376
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2EDAEEFC-6D60-448B-8133-6DD172F7E814}
        3⤵
        • Executes dropped EXE
        PID:928
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A2FE7911-4DB1-48E4-B62C-5C7FEDF98767}
        3⤵
        • Executes dropped EXE
        PID:1360
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A5702A1F-B1C2-49F0-9DD1-4C385C9A59C0}
        3⤵
        • Executes dropped EXE
        PID:628
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C73AEE40-81A3-4BCA-BEDB-5C9D1CF87689}
        3⤵
        • Executes dropped EXE
        PID:1512
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A38F63BC-674D-4BF7-B219-4D144143AD46}
        3⤵
        • Executes dropped EXE
        PID:1864
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0B8F4D32-677A-4133-A943-C7B6EFC72096}
        3⤵
        • Executes dropped EXE
        PID:1304
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BFD34A8E-9BBF-4DFC-9435-831A7C39CB15}
        3⤵
        • Executes dropped EXE
        PID:696
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DC590487-4682-4F0A-A054-46C5C75E8C03}
        3⤵
        • Executes dropped EXE
        PID:1740
      • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7E2DEF65-3ABF-44AF-83A5-BB6BCCFDA848}
        3⤵
        • Executes dropped EXE
        PID:1616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\iss7C15.tmp

          Filesize

          2.7MB

          MD5

          e325810bf8d5333164f5c402a76bd3f9

          SHA1

          ed21e8e309b43d8a99fb667f3f84f279587279ed

          SHA256

          76d45a66d467e6ddb26b75f1f2b79ad686d52a1719c67add1a14edc59f74e0b6

          SHA512

          96db019600ba47a85dbcb5033bd21393085a3f9b5c0d5d2f9727a385f544200517efd1eb6677e73218f8cc8a3d11c3b0208644ceb38cf7f3bdd6dfb13862640a

        • C:\Users\Admin\AppData\Local\Temp\{5AB36BDE-D0F5-4F02-AA5E-C3877C16287A}\IsConfig.ini

          Filesize

          345B

          MD5

          b0fd7ac8d23e17b5dd21a6ec8d4113ef

          SHA1

          5ee09fea2db993d99c150a23c61eb4ef6ba28c3f

          SHA256

          7c9e66d9283033b18db8923b71cfa9efced159b1ad5c79b208ee114d9a130ff1

          SHA512

          aa7984a293b5d044f6ecf94be01a83496a011a6e607429eb061021359a9f9127a3d1c147f98178404676888a6f650f843e780129161b36d43af2b722c4ada5fe

        • C:\Users\Admin\AppData\Local\Temp\{85D441EC-B8B3-4B4A-BB6F-0035B93FA6DB}\0x0409.ini

          Filesize

          21KB

          MD5

          be345d0260ae12c5f2f337b17e07c217

          SHA1

          0976ba0982fe34f1c35a0974f6178e15c238ed7b

          SHA256

          e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3

          SHA512

          77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff

        • C:\Users\Admin\AppData\Local\Temp\{85D441EC-B8B3-4B4A-BB6F-0035B93FA6DB}\1033.MST

          Filesize

          3KB

          MD5

          8ffb7d50a4c9ff13498c08a66d608094

          SHA1

          4578306b1ac13dc6fbfaa43850a0dc20b51987fe

          SHA256

          98d5a36f08ded6e9aec329562f10256059d75f449385cc3f1b4afbd5c1f85156

          SHA512

          7456e55bebe84fa942961b53c0f8c2b138d0a3731b229ec9a7c9e82566fb17282e22b2f95f741a38903bbf86de29ea7cba33da5f823644726376744c2c464699

        • C:\Users\Admin\AppData\Local\Temp\{85D441EC-B8B3-4B4A-BB6F-0035B93FA6DB}\_ISMSIDEL.INI

          Filesize

          5KB

          MD5

          2e8d3873e0f0a53c3a5ab0d86fd2550d

          SHA1

          143dc677b5530d86eec0f096aa820276be535cf9

          SHA256

          ce5f38dce357bc421c361f89017415f6b014901cbbc0827bfd8e8962a0897605

          SHA512

          f8bbb88615e5afeb632128ecc94f63221f582f8e3ba7b805838da64dcb27a73d1544029c5d43d2856c722f197d27dea6a2d00863d8222e03d329d9d4afd91063

        • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISRT.dll

          Filesize

          260KB

          MD5

          a93f625ef42b54c2b0f4d38201e67606

          SHA1

          cbfebc1f736ccfc65562ede79a5ae1a8afb116a1

          SHA256

          e91a865c3d60d9d0bce5d5a0a2f551c5e032d5bc13bc40f85091ce46d38064e0

          SHA512

          805f0d535022de3d03aa191239fd90c54f2f6745bf02e0ce9cbe59ea34eecac7f9ebb600864c7cbcad5d011fa61bdb5b65889136617edc44178f87bd3970b198

        • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\String1033.txt

          Filesize

          220KB

          MD5

          874ee2fcea8114381ec2fc6ea972dbd2

          SHA1

          b15223f6ba07e99523e8dfeec57bf66ceeff435e

          SHA256

          6aa3a7d05cf78dc692dc20911b8021c15b2721f0e0efa99388d0a90279ec5972

          SHA512

          f9da8dd7bfc0ab81d8867c387fa2c42b91ff668c29cf766c28a3b85fb77af0129605702a39a2daf48e2f5bb0b11ea9ca2e3d7da9913d27a9cac2dbbfcfe85981

        • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\_isres_0x0409.dll

          Filesize

          540KB

          MD5

          d6bbf7ff6984213c7f1f0f8f07c51e6a

          SHA1

          cfe933fc3b634f7333adec7ec124c14e9d19ac21

          SHA256

          6366e18a8cbf609c9573f341004e5c2725c23a12973affa90ee7bcc7934ae1b2

          SHA512

          a1364c96848f54b241c8e92ed1887ca599255c8046e31af11cd4b0b23d97c00243808dff9086a536c0084d6815223685283844a9e27f2c20c4d3b85a794a9e9d

        • C:\Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\setup.inx

          Filesize

          564KB

          MD5

          12a5e14af9d82a0d17dad188b734c6b1

          SHA1

          84582ee82f6e5969c73d0f78bc0793fcb9484486

          SHA256

          a3938b3bd79181998f83a7d8dd2575658917aa3588891adcbea3e0537163cbee

          SHA512

          a44b3871475e7056937c87c05791f0bb31168bf37ec0a71c89a0d62834f2710b87fe2dad9c40e36bf02044c2451b4222463f8c0605db894ab3726abd59ed43ab

        • C:\Users\Admin\AppData\Local\Temp\~66CE.tmp

          Filesize

          5KB

          MD5

          e03faa5832136f75db7eee1e37bb4992

          SHA1

          9c03cb40987a4a3957df172bbd04cf62db58a338

          SHA256

          31bf90b66236030c49da44f51edcf1d096c17d33247d16a0f2798b671fdda6a5

          SHA512

          ac2f9499073a242afd368fde8eed36a3d984182d0739f8d095673da5e41293a3470b988ff8fb649b0afd11c187a757fd73b21b1ce02a9280b09bf5de41881bdb

        • \Users\Admin\AppData\Local\Temp\{D406F70D-16B2-4759-9A82-AB9058306478}\ISBEW64.exe

          Filesize

          146KB

          MD5

          c3b2acc07bb0610405fc786e3432bef9

          SHA1

          333d5f2b55bd00ad4311ba104af7db984f953924

          SHA256

          9acc6cb5d01a4e4dbc92c8774c6999fab5f0e49f097e83098ba740842f5a2894

          SHA512

          2438e5dd11c8322101d9dc2d0f89ed0b1fc3cb5a65f644a1cf07f4c5a7f353c648e715fb910e09a444b623b3384eecd628e312608bcec63aa3b0107630df32bd

        • memory/3064-202-0x0000000010000000-0x00000000101B5000-memory.dmp

          Filesize

          1.7MB

        • memory/3064-223-0x0000000003500000-0x00000000035A7000-memory.dmp

          Filesize

          668KB

        • memory/3064-226-0x0000000003750000-0x00000000037D9000-memory.dmp

          Filesize

          548KB

        • memory/3064-242-0x0000000010000000-0x00000000101B5000-memory.dmp

          Filesize

          1.7MB