Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:52

General

  • Target

    tn5250.msi

  • Size

    2.0MB

  • MD5

    df00268606a3e3488d08a5e2cec0c100

  • SHA1

    7f6b44e59134341a7cad154d223a5121de42b5e9

  • SHA256

    8bd1afd65268e5d9e416d830b8d370d8a8956824a8293b3b372d7fa051e982c8

  • SHA512

    9f5cd01d31fcf2616d2384270ccc5d914f071dd7ae5b7ba45a7e605053907db021ba28365e4396aef495373453f2126e884eff6604f5caa93086c994dce4e7ac

  • SSDEEP

    49152:45kVY5AyE3D2aXE739bH/fwmOua7IX9qNGnHt6q+tMp:7Y5AJCWcNbHbOH7ItqN0Htj+

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\tn5250.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1128
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3129348520FCC2DDC0DF51AAA38D8927 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2788
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 96A73649D0D9CB0E07D0C7814D57C0B6
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2052
    • C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\tn5250.exe
      "C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\tn5250.exe" /Zempty
      2⤵
      • Executes dropped EXE
      PID:1992
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2100
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "00000000000003C4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2868
    • C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\tn5250.exe
      "C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\tn5250.exe"
      1⤵
      • Executes dropped EXE
      PID:2268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f773545.rbs

      Filesize

      9KB

      MD5

      fb6bd907e68820fe36789bf3cb2dcab9

      SHA1

      2ee51a44f369123378131d4dbb1129dc9742061e

      SHA256

      3c0fcdda17060774ebd318c0fca697dfd564f10c1ee44deb97cfaa416d3e4468

      SHA512

      8a0461dc876fdf3ab074256f682ac55b8316c1bb3d12abfff50cf58d4cf219ccc23d10e898e70e2531898bf93839bd3197b8b12ec92fb638d47986f72c6046b1

    • C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\ebcdic.037

      Filesize

      1KB

      MD5

      2ca9f116991aeec0ce11adff1de2b9ed

      SHA1

      905a22af314da7d0df6545637d380d2f2d44505c

      SHA256

      574e41811a7aee269b6e1ea19296af65056ffdc6229a52cec380ecc2ef64dd56

      SHA512

      38a6a25ac7eb8d61b3ff05095771b8382c355cb82de1213f86030f683f97d6b4b7e2403deab2c0a3117a9509a445494bb70167add6fd01caa3eb11b53da55be3

    • C:\Program Files (x86)\MochaSoft\Mocha TN5250 for Vista\tn5250.exe

      Filesize

      3.1MB

      MD5

      85834905af2f859fa3c353bc8874553a

      SHA1

      ffe5f2790d1c90124d64b7d3a793a8aa7cf7e67f

      SHA256

      3a49ea560bd9f82d3bdcb4136ea501387f5682b19a54f0d17bb0a01dec5698be

      SHA512

      f48643dda6894674b477fe9dadf22a3894e80b07f656fa9eb52be0caf291a2d932b9886685ec924e262dfc2a2220a7976a64dc228a52a27f059ce98cd2824658

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      471B

      MD5

      4302ac33571a665623f83caa83e9d7b7

      SHA1

      38e4b1f7626af38f558f00b7585a8821a3ef371e

      SHA256

      85d864fdf43320e3535ad37f3d946a3bd648df66622cbbcb079b976abfa7ff41

      SHA512

      cc7530d96b6cf2d390a660fccd64170b6a32fb4ed777f3369ef92180abcaabfd94f74ba0ba8730084510fdeb42ded2a9b799d14c787424d3d11d2f2043642c41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_EC420DCD3BBF75F74A9D9E7363E1AE4E

      Filesize

      727B

      MD5

      4f8791861a7f914ba42a43db2cf3683c

      SHA1

      cfec212ec8dbeed485b4f69913b0fe8ada624478

      SHA256

      5134b71f9c4d800a4c1bb6d3a97bbfba6c91832a87df74f2a8d3d4f07f25052e

      SHA512

      564047e80b872e77a8d59eb942f162fb20abfce7d48ed321d6412d61ff7a874a1e1abb58c49357ed1bb7f28449436732d708dad607a38679361acf5844ef1892

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      c5325af001c52aca934eadbea6e052bf

      SHA1

      6874523550ed5a89d37835fc468701b7f5375d40

      SHA256

      9040f3f40aa15886f4ef60141b67e96542ac690a8fd9c9b4d52bdb0cf1b4c773

      SHA512

      ef90d907375d2dedaa619bff669eb4dc16862a7fb16b4e73cc92b98792e19e6389c500aacb58dfdf4d7f71cf07367d00422f754766c433035e6becc475ed89db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      400B

      MD5

      d149162dd34b07a99e6329b8c2acf5b7

      SHA1

      53871b0162fb23f34cbf4d6ec957a59750e45e87

      SHA256

      e7428f8ef637ed6b580614d1efc44e80157e88dad495fe4400abcb0e8b753b98

      SHA512

      52b8426c8db2c9dc443507d199b7c0e3da7de6e8705324693f50f1f1ef1382358c7fac49327bb05c8cd0436303368a4efb2e62ef1922e7f65897b9eea2905a31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_EC420DCD3BBF75F74A9D9E7363E1AE4E

      Filesize

      404B

      MD5

      3e53fb092300ac69705f4f9c152338e0

      SHA1

      ba8c1b654a490569464694a7f855c95201b79844

      SHA256

      37742009eb0185225d967719c1f12f36df8c5b1ca426ca6052aa94bcfa00d1e8

      SHA512

      e525b8edf2988a6803e03245a08f4522b7414341ba6f5ec1df5c3066cea0fb62f29d6b4d97dff073f751c382eb27bd8ef264aaa40d2b427440ac34edc84a174a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      27619083b5787ccb56884b7e15e689b0

      SHA1

      4cd968c1bf08628002df55d83b6283ea574fc15f

      SHA256

      68576fea38f43855e2bd3d8886804521587c4c9922ab026c559944878e0e2be7

      SHA512

      8c23d81d978111590c3461e048e33bb7509f6e7884a4dd878816f3d9281975d82c6ba4ad419fc87447de294bb8eb064d8389980c9d188a73ace6f1bfcd8066e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      028c6337ca8c836c743142103119a8cb

      SHA1

      3f2aaca2190b38aaf96c250f7b2a0a2daee82e74

      SHA256

      a6173c070bb60088220d4dcaf2ffaf88797b80a9b42def8ee2418ecf51b24c79

      SHA512

      7286dcda5c50eda5f6ce8d915ad5f24c22ffc1d9be8aee516219f140a146774b967c62c5867e17edc87a8f0b8a6d14ddbf90dfffb8ec021ea1541195201b368f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      be172d28e2c839c0d17c278cc19f19f9

      SHA1

      fb6cfcf382d559357b4fe1f8e05327e291ebbbdf

      SHA256

      093ee6c19aab92e094aa00daded6d312cf634ce938e8dbf222e2b0c76eb4149a

      SHA512

      4b5f64e5eece019556448f0232cfa2f5dea1ed6dc74990d3f30839e872fecb1847d06c03d26aa702b576958d852040f6db1d33864b0df4c3eea872096180a253

    • C:\Users\Admin\AppData\Local\MochaSoft\tn5250.exe_Url_d4i3cmv1wc030qyhuqx0eikcebzsvbyp\4.0.0.0\user.config

      Filesize

      806B

      MD5

      053456b8c363d80fe4384c0a8e615bb9

      SHA1

      d594ea6c8f93743446a2109617744433cfe84a67

      SHA256

      15b96a0783f90cff295b0ad8a805663f478be836a9f1cfd5fafc7376c69e2197

      SHA512

      cbc832925066e2a3b2e165fdb12f826b7b32d3665d128f25fb4c030d66690c927bdc2e0a38a1224ec3f019282439b3d599639048cfd90d5ca54e5ba44a291693

    • C:\Users\Admin\AppData\Local\Temp\CabAF16.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\MSIB1C8.tmp

      Filesize

      89KB

      MD5

      b051a3c68dcbf9e5b506aed6b0ef0ca8

      SHA1

      37c4a9c43b6b583b77fa750991a90cf36bcb17be

      SHA256

      91a0d1ba2a6f0c0999b85c1f9abae8487f0274020fbe1cb86c9b4e009861521c

      SHA512

      749450815c37d688935e460a95693245ea4a3cd5176d3eefee0556ca77d73465cb5f7344a2c4637b90c8f379419a1969793f9c106602c2c25bb65a7f6b4a543a

    • C:\Users\Admin\AppData\Local\Temp\TarB10C.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\Installer\f773543.msi

      Filesize

      2.0MB

      MD5

      df00268606a3e3488d08a5e2cec0c100

      SHA1

      7f6b44e59134341a7cad154d223a5121de42b5e9

      SHA256

      8bd1afd65268e5d9e416d830b8d370d8a8956824a8293b3b372d7fa051e982c8

      SHA512

      9f5cd01d31fcf2616d2384270ccc5d914f071dd7ae5b7ba45a7e605053907db021ba28365e4396aef495373453f2126e884eff6604f5caa93086c994dce4e7ac

    • memory/1992-109-0x00000000013D0000-0x00000000016F4000-memory.dmp

      Filesize

      3.1MB

    • memory/2268-131-0x00000000000B0000-0x00000000003D4000-memory.dmp

      Filesize

      3.1MB