Resubmissions

30/09/2024, 20:16

240930-y2bt7axdme 8

30/09/2024, 20:14

240930-yzywyaxdje 8

30/09/2024, 20:06

240930-yvhzxsshmn 6

Analysis

  • max time kernel
    11s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 20:14

General

  • Target

    UpdateTool.msi

  • Size

    173.6MB

  • MD5

    90c290ef28ab6f163a446969090f2daf

  • SHA1

    c98b1d586dbb4be7781799a5f414292f11b8326d

  • SHA256

    667c036ba1c67b0e6377a23deca78f35220ff15ec278e34fffa521f779b1ddb4

  • SHA512

    5615cf7e26f9f762e3853b49b42a327dffdb9f601178bb7d743ab362277d0c850fcbbf40b7c759d7a41f9436dc7e16138a91729fb7ec13d199bffc05b0bb660d

  • SSDEEP

    3145728:QP7AKGpPJJgLBZV7MVRy7mURaD8RhDFoqoCPO5R3CvKCNaInqqD7vZbUD02ilsjr:mAKgPLgLBZVR3RBlatCPO2H/5b2iqjr

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2372
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D0D9A3D4515EA4CFADAAD0F5128EDB43
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    1KB

    MD5

    e11e31581aae545302f6176a117b4d95

    SHA1

    743af0529bd032a0f44a83cdd4baa97b7c2ec49a

    SHA256

    2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

    SHA512

    c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    312B

    MD5

    873385e59523761140cebc8d96d0c3b1

    SHA1

    531abf1d41a491cf5f686170ce590f973f202055

    SHA256

    28dfd842a01b1f8b53da132226ba8d5a88f1b339c2758b202e14530534066471

    SHA512

    122740a3b40724b4102011a69b1035202aa60ac03722a3fb539a12e92d1bddd62fb74081097aece6e47a36efe402f2546c1568106f4eaf0a119dfdccec4e4bdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06934f50f4cd29abe015937832cf30ca

    SHA1

    d1b3208ac470506ae92d9d1ca08aa4d23735e803

    SHA256

    7e2df0f8493fafbbec6a0187047d9455a6ef7133fa95086c87425d56654f8a12

    SHA512

    f169aea3e05314fdc6986a915e3af7b8f997c58ae9883ddfcbcdc61d34ae956237a521a3044c972ff92788e24e2eae916489dc4603d1f93350b01783aab7f8ef

  • C:\Users\Admin\AppData\Local\Temp\Cab6C3D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D58.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI76C2.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Windows\Installer\MSI782B.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891