Analysis

  • max time kernel
    32s
  • max time network
    39s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/09/2024, 22:52

General

  • Target

    TopazVideoAI.msi

  • Size

    2.5MB

  • MD5

    c737f14930618830d30b3ec4ecdc80a8

  • SHA1

    783997c5e0552ff2fa8105ede8ce07078009637a

  • SHA256

    3fbee427cd1a6374da88d8652cf1783fbcf7c95e68a6f168916f4cae56a1be57

  • SHA512

    3e3c62ac8f2484a6cc739aff807b0c73b57258a668572d65e3c82da0b5080152ff65c1eddebdf602780effdcd63910167ca6d6a8fb71f1082b9919b798d41c65

  • SSDEEP

    24576:BfHWvZgkjVtyOTgStboymBwBFuoShl+P4cL96bborCBEFPxmm/AgX:dWvZgkjPyOTFmBoFuoHP9rJNx94

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 15 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TopazVideoAI.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:768
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 216AE48E261ACF04A03BD2D37AE8DA68 C
      2⤵
      • Loads dropped DLL
      PID:2172
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ED0DE50D1A09F7B69CBA1367A4DE0BD2 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3344
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 9EB2641BC663AF81C8CB8330ED20AF92
      2⤵
      • Loads dropped DLL
      PID:1788
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A7CE757295A1B56D8522705C9CAE348F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MSIAD86.tmp

          Filesize

          1.0MB

          MD5

          4c93d7484fb89dfc73bb8d40efebc44e

          SHA1

          b3b1ce8895894a7c870143743e46f6de279b08b8

          SHA256

          53dc7f6827a81d52adf4e935391a0c3c9079d1e615c5e2447df9a62e3d3d66b5

          SHA512

          b364dcc261208ee244f0f0054e894258959b08423723218e5646f9c978d731a2ca9875724671720b70ac0c71fcba709cd052d3f19d017b18b740cdc97a62e15e

        • C:\Users\Admin\AppData\Local\Temp\MSIC99A.tmp

          Filesize

          132KB

          MD5

          cfbb8568bd3711a97e6124c56fcfa8d9

          SHA1

          d7a098ae58bdd5e93a3c1b04b3d69a14234d5e57

          SHA256

          7f47d98ab25cfea9b3a2e898c3376cc9ba1cd893b4948b0c27caa530fd0e34cc

          SHA512

          860cbf3286ac4915580cefaf56a9c3d48938eb08e3f31b7f024c4339c037d7c8bdf16e766d08106505ba535be4922a87dc46bd029aae99a64ea2fc02cf3aec04

        • C:\Windows\Installer\MSIE3BC.tmp

          Filesize

          234KB

          MD5

          8edc1557e9fc7f25f89ad384d01bcec4

          SHA1

          98e64d7f92b8254fe3f258e3238b9e0f033b5a9c

          SHA256

          78860e15e474cc2af7ad6e499a8971b6b8197afb8e49a1b9eaaa392e4378f3a5

          SHA512

          d26c9dce3c3d17583ffb5dbcd3989f93b096a7f64a37a2701a474c1bf4b8c8b1e922c352d33f24e411f1c793e1b4af11a3aec1de489087d481b1b636df2050cd