Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 12:34

General

  • Target

    8934b0d98f8c56d6f1dc2f1b94d0b4ecffaac5e14bd5e45c453b82a04426e041.msi

  • Size

    2.5MB

  • MD5

    144b437195e16049c93dca1738fa35fa

  • SHA1

    0f7fa6a6c85e95a1a7d5a495752635f5ca102634

  • SHA256

    8934b0d98f8c56d6f1dc2f1b94d0b4ecffaac5e14bd5e45c453b82a04426e041

  • SHA512

    58da9569a681bda05c0c1585e432ee06b2cafa88f800a70ebb32ff678d178f61c79d9bc41c787f4dbab23b206fba8d341285cf0b7f90fceec9038191c0779430

  • SSDEEP

    49152:45hFc/f9r84jEHYDgE5e7vmP5Ferq7I5RJK5k1Qkd6JSHxO:sVHYDgpCxFeVSOxO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\8934b0d98f8c56d6f1dc2f1b94d0b4ecffaac5e14bd5e45c453b82a04426e041.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2816
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F35E271522243276B6C1A853B2B631D9 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1196
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DC27BBCFFCA50981A64E1CF491C024DD
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:612
    • C:\Windows\Installer\MSIE5EB.tmp
      "C:\Windows\Installer\MSIE5EB.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\op\\GUP.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:932
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2420
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C8" "00000000000005F0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2388
    • C:\Users\Admin\AppData\Roaming\op\GUP.exe
      "C:\Users\Admin\AppData\Roaming\op\GUP.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 136
        2⤵
        • Loads dropped DLL
        • Program crash
        PID:1924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f77d951.rbs

      Filesize

      1KB

      MD5

      ecc02bdb085d36621eda5a17dc74af53

      SHA1

      b7ca3300e946318be66c1e009f50db794dd49bd4

      SHA256

      af20f1caf560194d8f8f6efc3a8d1b7106efe99775378025c3fd9bd9608180e2

      SHA512

      cecf4d275750d05dc61533ca8f9b2dbea198811bf7c9ab0f2e3497c2d3fe5151ca4e9a7b4053f4f29883c1304956e4745e3b2d077729aad1094209be22432d1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

      Filesize

      1KB

      MD5

      e94fb54871208c00df70f708ac47085b

      SHA1

      4efc31460c619ecae59c1bce2c008036d94c84b8

      SHA256

      7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

      SHA512

      2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ae85b623004a0248a7f6bb639b4ee8e

      SHA1

      2721296842a4a27bd1832b8ef8ec84c5cec4eccd

      SHA256

      a2781c3682d6693f682d4c0c869dee7db4db4baaa4f95ef1e1f645f6d90b1b96

      SHA512

      65c725ae3eb8178c487ab4675714fcd74cb1a1dbe17b619135add93a2affeea368d7175a24fe9d3cb5266524091390dcc80598389ed4c999fa20e80ae99a5ad1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

      Filesize

      264B

      MD5

      2dddea0a727f7b8dc5b15e96686487fc

      SHA1

      7a4f323b5b48ac4ce4206812b7636b0f890da8e7

      SHA256

      fc5a039eab540f49867097383d994a1e858c15864d9f1cfc2644a92929ce88cc

      SHA512

      bc02ef54d8e40aebe3ec9c26b3ccc4a78c88be4bf916dfe6657e3b6b2ea7a973b1fbe737e05497859dd9f5d00291c67880ecd69f5c0037d21f74e9ff411c246a

    • C:\Users\Admin\AppData\Local\Temp\Cab5F71.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\MSI63AF.tmp

      Filesize

      904KB

      MD5

      421643ee7bb89e6df092bc4b18a40ff8

      SHA1

      e801582a6dd358060a699c9c5cde31cd07ee49ab

      SHA256

      d6b89fd5a95071e7b144d8bedcb09b694e9cd14bfbfafb782b17cf8413eac6da

      SHA512

      d59c4ec7690e535da84f94bef2be7f94d6bfd0b2908fa9a67d0897abe8a2825fd52354c495ea1a7f133f727c2ee356869cc80bacf5557864d535a72d8c396023

    • C:\Users\Admin\AppData\Local\Temp\MSI76893.LOG

      Filesize

      376B

      MD5

      3497fbaa936b2c866ee9f90ccbbcddac

      SHA1

      2bbb035b7aa1f17257474a2d68686c59baf8e4e0

      SHA256

      be34e18ab1a8f734a82ec4b60999935b70aaf4317f485b418c709ff7dcdd6bdb

      SHA512

      4efc3efe287d0863082f2cdd50d98deb558f67abe6f793906b71138b1baad25d1471f11f807e977cb2ae7946fa06c19156f4af67a18c230e29d111f10cae4061

    • C:\Users\Admin\AppData\Local\Temp\Tar5FB2.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Roaming\op\GUP.exe

      Filesize

      617KB

      MD5

      7be4b26502bb2a8ed4982805b590dec5

      SHA1

      afa1ee71fe23c4e7f8fc0195f5fb4a3d968500b6

      SHA256

      97e196b8aa0694ecf37bddab2ade90ffba78251af7e49f6a24adea0a6ee704b3

      SHA512

      013ce05ca4982b8bbafa33b4011b1a2731c605f581223557ef66cf75df96307d5b2444a9ccb28b3ff39e34ad989e2d5b931ab9bfcccd7dd5f63eabdb726ab749

    • C:\Users\Admin\AppData\Roaming\op\gup.xml

      Filesize

      4KB

      MD5

      30823e98edc86ac1c1b71ba49366bb86

      SHA1

      1fbaedf0850c6bb298d81843a174fe2ed0d09388

      SHA256

      f26e3a06fc46eefb24d2d412c5e5ed1bc97ec14e2b7d8670aea0736ce7fb15dd

      SHA512

      6a907ec6e57d4a7ee0eac473df439db48d4c3457d440417a0a1908e1e8fbc7a15955166dc5d4b2c2dc42e92caa73c74c12b7f9b477c9991ee677a93cd3aa45f5

    • C:\Windows\Installer\MSIE5EB.tmp

      Filesize

      406KB

      MD5

      d2f8c062aba50ca096cbd5387a2d0b8b

      SHA1

      04f07790822954d02458d93fba83208ca5223a1a

      SHA256

      ea6094300c250528ffae4e7972d84eb5b45cfbd018133516c166e40e89ed65bf

      SHA512

      f51bf12be51832cd7190c255234c558094c0135e8bf05ffd67c2f4a8b0233161fa71c44e86b107956e4b75f5e2a28da58736da61a71f0c600ec1cf1b4e9e86fa

    • \Users\Admin\AppData\Roaming\op\libcurl.dll

      Filesize

      840KB

      MD5

      9b73c82d8f0e6cae3bce7b2fc98b3383

      SHA1

      24dd9872261cfb6931b2b400fffc9b9bdd4d5455

      SHA256

      795778587d86ee3aa3d2f628e8d3994b8735c5528413b4298afac8b6a683aefb

      SHA512

      5e1aa7783c7bed7b821065cc6a775b98114ea54c840499dc896de27c331375f4b5e5cd1c6550c160b05b6bc64dd4669dcfdcec861de9376d745bc9a3d5e80909

    • memory/932-172-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB