Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 18:02

General

  • Target

    WhatsappWeb.msi

  • Size

    4.7MB

  • MD5

    82f3f74379c6dbdbca3a64c5717c2faa

  • SHA1

    ba5562e233c1f83d6929db8dd03860a99bf58fa4

  • SHA256

    6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d

  • SHA512

    8bdf61555de4b7e249201462a0f942a1cc671d9bcc514635297e08ce25bcb90de8d0d64fd513da32d4be731e5af6db13d039040a83c8e50c2887009b091e58a1

  • SSDEEP

    98304:wph2BBopK5X4MkjkZMiWFLH/qJ/YOKa4RpnoYbO:eQuKl5kjQMr/qJ/YFaO9DO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 19 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\WhatsappWeb.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1636
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 89A5FCA424F30EF81C535763C417D0DC
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSID9A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259460722 1 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:348
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI15A8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259462625 15 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2144
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2856
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A4" "00000000000003D4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    4302ac33571a665623f83caa83e9d7b7

    SHA1

    38e4b1f7626af38f558f00b7585a8821a3ef371e

    SHA256

    85d864fdf43320e3535ad37f3d946a3bd648df66622cbbcb079b976abfa7ff41

    SHA512

    cc7530d96b6cf2d390a660fccd64170b6a32fb4ed777f3369ef92180abcaabfd94f74ba0ba8730084510fdeb42ded2a9b799d14c787424d3d11d2f2043642c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    727B

    MD5

    057d0af1f3bb46423b56e4c1c75393bf

    SHA1

    957beaee81115f862143aa455aa31a88223d6320

    SHA256

    6691143f23dd0b020f1b0a1551f5ad14cb0d8d8bb610e1cada0175992e9bb9cc

    SHA512

    fa448dbb849184f1f6765731c948eee3885561f473489cdf41ccaf16b0189fe18321b3e8b92e906fd66d508671ccefd172406ae4723b0c810c9184f709920af5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    727B

    MD5

    29feaa220e7dc2d386fedebeff4cb068

    SHA1

    07d8e8f5c90a7dff1ba61253b8b49ef6188d86a0

    SHA256

    eecb268820b5be9d0cda58bddaa3185561c42a48ff000500c72c86d0caa31ebb

    SHA512

    b4c8ff2535ef5ceb06c9f872524a8b8cc4966960a6b1a94576b0b6912e612f014de053acbf88bbfb07b52eb1148af637b2470523af55143b9e15d93a28009b33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    fe7a03bc5e2f4fc84d482a06c9296c1a

    SHA1

    1f0fea86605f5d2006f588e3b614ea3f132b2626

    SHA256

    e2fda5d4f80fbd34c18ff82d9d0fe79721724c29c10ff07482ca6322f84ec9ab

    SHA512

    5247848a7cdf3c547fec663083f4deae977ab81afb60601facbe4e0e560233c2cf3f31bba5201a6f2687067bcb34d412f371b9691041aac9b9cb7c9d1b1fc622

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72cfee7d98100019c6db7a04c9358853

    SHA1

    19bd2ac4f9c71bb541837e24071d5eafb3a6279a

    SHA256

    40d6f14109130fcd4d386b8947a8139facb45358b23297c4c620a8acf80ebb4a

    SHA512

    28899d23f18ad1e2a01f45a5632e2ffd34731ec4334b333cdc29291a65bef1dea569db7d81d0022601ea659ee6bdfc927c4541bc3b839a7c06a31185d7f16088

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    416B

    MD5

    febe34cdeee74048f40187130342835e

    SHA1

    ec33412eccb0c40c778f444328d55b02e73c2d70

    SHA256

    1cc509dbc9ea74dcba8f2458e121a0c2e5d17a835dfd59628716100f98991095

    SHA512

    17a311cf21228c9e99ad9ae4a722b4191a56b59d358b7861ea5fe35c57cf24f9dd37b77c3405455c5f83192d64231763134b9b33140b178cb140093d018114c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    408B

    MD5

    0dffc1fb3a27e0845e0e27030a69c2e5

    SHA1

    4183f03c2dafe07f00048715b522eded47033a0a

    SHA256

    ed23ba928280645c207b6825c48339bd6a73a28c18154e6247792ae27606e9ae

    SHA512

    6d4d1a719fbc22ef0b41afa3efb8bddc9f9d64f350edb63ba71789aacf9f8ee934ff3b37c00f04edd1cdcf1f14c084bb42cc02c2f9982e130ffd7fcba32f2200

  • C:\Users\Admin\AppData\Local\Temp\CabE2D2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE40D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI1568.tmp

    Filesize

    390KB

    MD5

    e8dc682f2c486075c6aba658971a62cc

    SHA1

    7cd0a2b5047a4074aa06a6caa3bb69124851e95d

    SHA256

    7aacd4c18710e9bc4ff2034895a0a0c8f80f21809fb177d520e93f7688216e6d

    SHA512

    a0a1f0f418bf2d4ffd079b840aeb0142c7faab7fa72b5e33b1841798569f55a25dfd305abf9c2ca89792f6499f695b69975882697dc53e99d5a975a9fa8c7d75

  • C:\Windows\Installer\MSID9A.tmp

    Filesize

    549KB

    MD5

    45e153ef2e0aa13c55cd25fafa3bce90

    SHA1

    9805ae1f48e801df6df506f949b723e6553ce2e5

    SHA256

    2104d3c13e6b624a7d628534fcdf900730752f9ff389b0f4fe1de77c33d8d4c1

    SHA512

    87f967910b99a9833a1cb6de12225cf6c7b08239e49059ae5303bfcd1c69bcc691d35ee676a761456ec2a6ded199ac30adc28b933cb8ad0e09c0a99456db3d8a

  • C:\Windows\Installer\SFXCA9B6BA87C1B49679A59E9EA12F07C978B\CustomAction.config

    Filesize

    980B

    MD5

    c9c40af1656f8531eaa647caceb1e436

    SHA1

    907837497508de13d5a7e60697fc9d050e327e19

    SHA256

    1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

    SHA512

    0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

  • C:\Windows\Installer\SFXCA9B6BA87C1B49679A59E9EA12F07C978B\WixSharp.dll

    Filesize

    602KB

    MD5

    ebed2675d27b9383ee8e58bdeddd5da4

    SHA1

    4dc37974db638ec02363c784fa2c178125f4280f

    SHA256

    caa9da1c55e33446eaeb783957e990847369423c7dd652f07a5c93bf1d786a66

    SHA512

    b13538f58b766abd013f73d398eaa4e1adec3fc967415bf7f95198e6f55ac65a12a0c3863708b6fb525ef4a01f0ab88485bb990527bc0e4f5159c8419811dfab

  • C:\Windows\Installer\SFXCA9B6BA87C1B49679A59E9EA12F07C978B\WixToolset.Dtf.WindowsInstaller.dll

    Filesize

    193KB

    MD5

    b82b13d16e7f3d3607026f61b7295224

    SHA1

    d17b76907ea442b6cc5a79361a8fcec91075e20d

    SHA256

    bcc548e72b190d8f39dcb19538444e2576617a21caba6adcb4116511e1d2ddee

    SHA512

    be8c0b8b585fc77693e7481ca5d3f57a8b213c1190782fd4700676af9c0b671523c1a4fa58f15947a14c1ff6d4cda65d7353c6ba848a3a247dfcda864869e93f

  • memory/348-69-0x0000000001E60000-0x0000000001E94000-memory.dmp

    Filesize

    208KB

  • memory/348-71-0x000000001ABA0000-0x000000001AC3C000-memory.dmp

    Filesize

    624KB

  • memory/2144-98-0x0000000000430000-0x000000000043A000-memory.dmp

    Filesize

    40KB