Resubmissions

30/09/2024, 20:16

240930-y2bt7axdme 8

30/09/2024, 20:14

240930-yzywyaxdje 8

30/09/2024, 20:06

240930-yvhzxsshmn 6

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 20:16

General

  • Target

    UpdateTool.msi

  • Size

    173.6MB

  • MD5

    90c290ef28ab6f163a446969090f2daf

  • SHA1

    c98b1d586dbb4be7781799a5f414292f11b8326d

  • SHA256

    667c036ba1c67b0e6377a23deca78f35220ff15ec278e34fffa521f779b1ddb4

  • SHA512

    5615cf7e26f9f762e3853b49b42a327dffdb9f601178bb7d743ab362277d0c850fcbbf40b7c759d7a41f9436dc7e16138a91729fb7ec13d199bffc05b0bb660d

  • SSDEEP

    3145728:QP7AKGpPJJgLBZV7MVRy7mURaD8RhDFoqoCPO5R3CvKCNaInqqD7vZbUD02ilsjr:mAKgPLgLBZVR3RBlatCPO2H/5b2iqjr

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C7C063A524AA4052DFC0D4BB24435349
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    1KB

    MD5

    e11e31581aae545302f6176a117b4d95

    SHA1

    743af0529bd032a0f44a83cdd4baa97b7c2ec49a

    SHA256

    2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

    SHA512

    c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    312B

    MD5

    e0aaf5689ab2d40115bd3781d8efab8f

    SHA1

    a163fb60a43d8496d1d9f9f1727fc6af32d3717c

    SHA256

    637ea29770943bb9302cdd2b5a51def4096d12872e68db514ddbed0faa9c41b5

    SHA512

    0ec5d598e4ca29c6764b8f13b6028f718987e36d3b2312d0ee96645621e179bfb28caee83ba8db85887cd986c23b2fe392e0585ecbde420b1630651c2d0c2bbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab483dfc5bc4fddba3e82d6f76b263ed

    SHA1

    e75ce73c32a929b23219b3b3c6c4b209c0c14c02

    SHA256

    ec2781a1305b0375bfc3e74af8d2b24f4cc223df71c39312affad4ba2a0ad97a

    SHA512

    e8e01396615f3c9915f128c8a2573aa1fb713c47c3d18171e5e056cb723eadb8cae24b8be654b68b41f0d46187f2a5984585cc7912985925c82e66d6a4f026f9

  • C:\Users\Admin\AppData\Local\Temp\CabCD5F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA9B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE53D.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Windows\Installer\MSIE667.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891