Analysis

  • max time kernel
    96s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20241010-es
  • resource tags

    arch:x64arch:x86image:win7-20241010-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    15-11-2024 18:21

General

  • Target

    InformeInfraccioneCONASET.msi

  • Size

    4.7MB

  • MD5

    82f3f74379c6dbdbca3a64c5717c2faa

  • SHA1

    ba5562e233c1f83d6929db8dd03860a99bf58fa4

  • SHA256

    6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d

  • SHA512

    8bdf61555de4b7e249201462a0f942a1cc671d9bcc514635297e08ce25bcb90de8d0d64fd513da32d4be731e5af6db13d039040a83c8e50c2887009b091e58a1

  • SSDEEP

    98304:wph2BBopK5X4MkjkZMiWFLH/qJ/YOKa4RpnoYbO:eQuKl5kjQMr/qJ/YFaO9DO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 21 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\InformeInfraccioneCONASET.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2564
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 7DD0275EF5B7898C1718F3A1DC204386
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI736D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259486696 1 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2152
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8155.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259490300 15 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:1012
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2812
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E8" "00000000000003C8"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    317a57949cf9ab438b72dc6351326be5

    SHA1

    6ae1b4e04ebc5918628f841ea12d858f306d731f

    SHA256

    9612633f30b56d10ba3c05ef02197266ffca484e8cdd373e87a5e509434c2479

    SHA512

    b282138bc9f1b827116512bd2cfd5d4d7e30962a1fb10088bd2348d36dd54ceac84a32acf6a812bd87313b32e99364db7268c343334d40136887d0f5e183c45c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    727B

    MD5

    0c4707fc50c21a6158897f7bf51dab48

    SHA1

    09e2cdbf14aa7d53d87cddb88c9068f28b350d8b

    SHA256

    12f9300e0bb8820e47b651cc18429d44d45d4386a5a56d533330ef77655aa504

    SHA512

    6db3697095287093575329519024ab98cf8812d9c5c1923664db98ceddd13c11096d067e328b3795a5d4b0ea1a31687c0388620b1d73391fa15edc1522bfbea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    727B

    MD5

    8a1aea51eb477b7a13061790ac667ca9

    SHA1

    3289b357cca5c23365431824aa6c334b0cd70d4a

    SHA256

    9bb4897df29570868854be408d1dc8258d40049184484630bcc3f0c9911458b7

    SHA512

    84c7d1c92e485c863563d6d3059e20a91d52c70948cd84c9b58a6df8dd228855702144f73c32ab75c2dde6962dd55ae356b9de66a1827dcde00ac98564ad9501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    4f410d585cebbbc8b7ece2ed1b42e922

    SHA1

    a96de1b2bd800ee675701b0479bf271756e3762b

    SHA256

    e97ae539398458ecf5bc25ef9ac3eb5dd567f270ba0e09bc72f9314f3e760ae0

    SHA512

    828460679d465796fa7c77a8b08954329afb79a98fa058409ef4f2963e84ed7596b75236b50caf787cc43a4202167344d6503b4a320d36e2717dcf2856bce4c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eec3bfdb0c6084e0cf14828fec6c795

    SHA1

    36d1f59fddf2223bfa3567590b703d8f903f7ccd

    SHA256

    fe3db056b128f6821b7e97a004dde936d20c10cc18d1719734ad7a101fa8b6a8

    SHA512

    76771ad437e956a22ed51ee97f8360a2c9fe5500d05dc6916aa5b736765ee9ee8a6a6a849eb1daac40e55435bc1711f65fe68c07364cfb0fa91cb2384781177c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    416B

    MD5

    fcb0cc04da76df82352fbe6b38c22957

    SHA1

    d769c59a988821e2600fad8384fdc31bf7984d25

    SHA256

    811b2f947644b78dcee86a9b919c25d548ab4770a229b86b0bf298a0d95272cd

    SHA512

    9ffe84376c40b7c99f48198eecb5b363974628a41176164c86240dee39769db232caa73d165c0bfb70ba4a961cf4c68c00da0c82af8752879388895b862ffd2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    408B

    MD5

    d28fba0ead814270b79a2bfb49124598

    SHA1

    803dadb16b3a8c3851f9a2501b061642de6986f5

    SHA256

    2d7b4610e2a1e9932adafdf96ce15741064074043cf956429990d5405c5feacc

    SHA512

    5e1c2194ff1f4de0bda9dc8650c30331beb7e2610b640c6f0b8bd319da4f99f2843af101ff198912266b9aaaccb52c9229e141d3ed3534c88b49d32f699374fa

  • C:\Users\Admin\AppData\Local\Temp\Cab15E3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1895.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI736D.tmp

    Filesize

    549KB

    MD5

    45e153ef2e0aa13c55cd25fafa3bce90

    SHA1

    9805ae1f48e801df6df506f949b723e6553ce2e5

    SHA256

    2104d3c13e6b624a7d628534fcdf900730752f9ff389b0f4fe1de77c33d8d4c1

    SHA512

    87f967910b99a9833a1cb6de12225cf6c7b08239e49059ae5303bfcd1c69bcc691d35ee676a761456ec2a6ded199ac30adc28b933cb8ad0e09c0a99456db3d8a

  • C:\Windows\Installer\MSI80B8.tmp

    Filesize

    390KB

    MD5

    e8dc682f2c486075c6aba658971a62cc

    SHA1

    7cd0a2b5047a4074aa06a6caa3bb69124851e95d

    SHA256

    7aacd4c18710e9bc4ff2034895a0a0c8f80f21809fb177d520e93f7688216e6d

    SHA512

    a0a1f0f418bf2d4ffd079b840aeb0142c7faab7fa72b5e33b1841798569f55a25dfd305abf9c2ca89792f6499f695b69975882697dc53e99d5a975a9fa8c7d75

  • C:\Windows\Installer\SFXCAE0B5A9A7F343881BD16771235F6A2EB6\CustomAction.config

    Filesize

    980B

    MD5

    c9c40af1656f8531eaa647caceb1e436

    SHA1

    907837497508de13d5a7e60697fc9d050e327e19

    SHA256

    1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

    SHA512

    0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

  • C:\Windows\Installer\SFXCAE0B5A9A7F343881BD16771235F6A2EB6\WixSharp.dll

    Filesize

    602KB

    MD5

    ebed2675d27b9383ee8e58bdeddd5da4

    SHA1

    4dc37974db638ec02363c784fa2c178125f4280f

    SHA256

    caa9da1c55e33446eaeb783957e990847369423c7dd652f07a5c93bf1d786a66

    SHA512

    b13538f58b766abd013f73d398eaa4e1adec3fc967415bf7f95198e6f55ac65a12a0c3863708b6fb525ef4a01f0ab88485bb990527bc0e4f5159c8419811dfab

  • C:\Windows\Installer\SFXCAE0B5A9A7F343881BD16771235F6A2EB6\WixToolset.Dtf.WindowsInstaller.dll

    Filesize

    193KB

    MD5

    b82b13d16e7f3d3607026f61b7295224

    SHA1

    d17b76907ea442b6cc5a79361a8fcec91075e20d

    SHA256

    bcc548e72b190d8f39dcb19538444e2576617a21caba6adcb4116511e1d2ddee

    SHA512

    be8c0b8b585fc77693e7481ca5d3f57a8b213c1190782fd4700676af9c0b671523c1a4fa58f15947a14c1ff6d4cda65d7353c6ba848a3a247dfcda864869e93f

  • C:\Windows\System32\DriverStore\FileRepository\volsnap.inf_amd64_neutral_7499a4fac85b39fc\volsnap.PNF

    Filesize

    5KB

    MD5

    5e961b1e105c3b3e61e882a553bf5355

    SHA1

    a5410576b80da1982c64fd9bb81b85f6bc7cd12d

    SHA256

    1b68210cf77bbf95273c182120e0e38bc6750b361a5c2725319afb753dcfc0d1

    SHA512

    943d43bb77968c9d1df98076ec4a344c01596b2ae7771ce37dd10389ff96eadca91412106f404da5b54fb345d6e0e845259c8cec4537ff4d23c46a5a4e8d756a

  • memory/1012-108-0x0000000001EF0000-0x0000000001EFA000-memory.dmp

    Filesize

    40KB

  • memory/2152-79-0x0000000001BD0000-0x0000000001C04000-memory.dmp

    Filesize

    208KB

  • memory/2152-81-0x000000001A930000-0x000000001A9CC000-memory.dmp

    Filesize

    624KB