Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 05:22

General

  • Target

    ArchivoNuevo.msi

  • Size

    4.7MB

  • MD5

    82f3f74379c6dbdbca3a64c5717c2faa

  • SHA1

    ba5562e233c1f83d6929db8dd03860a99bf58fa4

  • SHA256

    6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d

  • SHA512

    8bdf61555de4b7e249201462a0f942a1cc671d9bcc514635297e08ce25bcb90de8d0d64fd513da32d4be731e5af6db13d039040a83c8e50c2887009b091e58a1

  • SSDEEP

    98304:wph2BBopK5X4MkjkZMiWFLH/qJ/YOKa4RpnoYbO:eQuKl5kjQMr/qJ/YFaO9DO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 20 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ArchivoNuevo.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2244
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 858E34DCE9B6D7DF2EDB76B1C41C7143
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA21B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259433094 1 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:844
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIAAA6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259435185 15 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2492
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:320
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000055C" "00000000000003C8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    719182e07998ae9226d45680aa1fe178

    SHA1

    8f8b03c110c129cb3a35841ed959de7a7266ffec

    SHA256

    8f1d64c2c4dbb6ca892083e4b4a8bdb4585597e1269c218340c6b12517bb3dbe

    SHA512

    2df474f0ac4d1ef93b14deda32c5476da130bc41f37c0a5cd0c271c990914613c3c788116a4b87d44876695f71e5a131847fdf96d609364c06cb2f5ed6ce76a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    727B

    MD5

    960818b90ace97aed45bb4b97f88ecb1

    SHA1

    c165689921f33f55e00840a7706237eac2b81198

    SHA256

    ac6905c108d9910dfe342e6430e67da929305be9717cd50e8c6376e58c3e3f85

    SHA512

    5d9138ef49b7ec7347dc571498dfd1d2a792e0567fb610acd5259e8c641f3e20bd5265b876dab7ee209e53cedb2450f847dacfcd12afbeb006f4e88b567f1781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    727B

    MD5

    d35fefa00b97d7cda113a5ceb31d6c9c

    SHA1

    97f3c468b40ab904daddf00b2a84ea4ce7c14a15

    SHA256

    3e2111a1835ed86df0346435b07e86a13b7bfe9e0f9ce0c84acbabfb4f540bf8

    SHA512

    a246769c21cae9c341180c266f7042d5895107ca5fd34add16914d7d2b2d328fb12a0f71f54e8675da15a9392835d0137db64b81853cbfc0950997a2cf34bbb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    22f6c7e048f9706758b8ce774af2e20e

    SHA1

    adb45ee1ad74145ed69ff84767b31a7a3ce0bc82

    SHA256

    f65a12f029109ff719a8e2584a8d693d58745355437462662db340f3dd0b5855

    SHA512

    9052faaa528ed4ecd4272a929866b3210dcd63eba829fdb82362ae1dfabefb996a8d0ea03b2253acee987c8d834d2a605e0cdaeb004ea38d2105334fba3b8bd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e08fbe2f1925d6eef32aa46f5174c89

    SHA1

    daec1e545ed94e5f200f587a638dc3236325b259

    SHA256

    b86b4e3f0fda496b1b3871a30461d1b5ecdb17a8e46fd31674ca8cf4c364460b

    SHA512

    167985c1a3d446188539fc50434361c3e6fc7865c94b9ed2fc75a6026c08e0df7ae574d679605fd5066e554c5f8f396f79982a32e680ffec080ce43fe537fe41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    416B

    MD5

    efce110da5c321aa31f4630da94f347f

    SHA1

    7d3d93fb653b4769ed6eee5a30756626d827c4e0

    SHA256

    79049f145c577340202ae260b1d5f029f4d640a32e1985d1cc759a790271d7eb

    SHA512

    74d2d09d5c2fa1bb92260aadef17bbf38ce4a327542829c28d965b6f4a258523a2b64e8dafe9088e0b933b3b65f65ce2cf86b704d55dfe2b50edf8b63b6cfe0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    408B

    MD5

    4353d8ee551f806cc06df90e93e527e4

    SHA1

    4c76e2a2e6c10f71ad3cfc7fe39e5d93a57db8ba

    SHA256

    74e8212a49f80338fd8f8704d1f19cd578725b02dede70ebd9fee93ba81ea60d

    SHA512

    130c69d9c2498841188e2c8da49fe02485c96e6d648e16a5756094e13952165a0267515b654bed6899eecd87fea17d62964c09a517b6c77138ed339cdbf5cc36

  • C:\Users\Admin\AppData\Local\Temp\Cab6F97.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar712F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIA21B.tmp

    Filesize

    549KB

    MD5

    45e153ef2e0aa13c55cd25fafa3bce90

    SHA1

    9805ae1f48e801df6df506f949b723e6553ce2e5

    SHA256

    2104d3c13e6b624a7d628534fcdf900730752f9ff389b0f4fe1de77c33d8d4c1

    SHA512

    87f967910b99a9833a1cb6de12225cf6c7b08239e49059ae5303bfcd1c69bcc691d35ee676a761456ec2a6ded199ac30adc28b933cb8ad0e09c0a99456db3d8a

  • C:\Windows\Installer\MSIAA28.tmp

    Filesize

    390KB

    MD5

    e8dc682f2c486075c6aba658971a62cc

    SHA1

    7cd0a2b5047a4074aa06a6caa3bb69124851e95d

    SHA256

    7aacd4c18710e9bc4ff2034895a0a0c8f80f21809fb177d520e93f7688216e6d

    SHA512

    a0a1f0f418bf2d4ffd079b840aeb0142c7faab7fa72b5e33b1841798569f55a25dfd305abf9c2ca89792f6499f695b69975882697dc53e99d5a975a9fa8c7d75

  • C:\Windows\Installer\SFXCA277650AA35433EE90A935721A5DF8FFE\CustomAction.config

    Filesize

    980B

    MD5

    c9c40af1656f8531eaa647caceb1e436

    SHA1

    907837497508de13d5a7e60697fc9d050e327e19

    SHA256

    1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

    SHA512

    0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

  • C:\Windows\Installer\SFXCA277650AA35433EE90A935721A5DF8FFE\WixSharp.dll

    Filesize

    602KB

    MD5

    ebed2675d27b9383ee8e58bdeddd5da4

    SHA1

    4dc37974db638ec02363c784fa2c178125f4280f

    SHA256

    caa9da1c55e33446eaeb783957e990847369423c7dd652f07a5c93bf1d786a66

    SHA512

    b13538f58b766abd013f73d398eaa4e1adec3fc967415bf7f95198e6f55ac65a12a0c3863708b6fb525ef4a01f0ab88485bb990527bc0e4f5159c8419811dfab

  • C:\Windows\Installer\SFXCA277650AA35433EE90A935721A5DF8FFE\WixToolset.Dtf.WindowsInstaller.dll

    Filesize

    193KB

    MD5

    b82b13d16e7f3d3607026f61b7295224

    SHA1

    d17b76907ea442b6cc5a79361a8fcec91075e20d

    SHA256

    bcc548e72b190d8f39dcb19538444e2576617a21caba6adcb4116511e1d2ddee

    SHA512

    be8c0b8b585fc77693e7481ca5d3f57a8b213c1190782fd4700676af9c0b671523c1a4fa58f15947a14c1ff6d4cda65d7353c6ba848a3a247dfcda864869e93f

  • memory/844-69-0x0000000001F70000-0x0000000001FA4000-memory.dmp

    Filesize

    208KB

  • memory/844-71-0x0000000002070000-0x000000000210C000-memory.dmp

    Filesize

    624KB

  • memory/2492-98-0x0000000001E50000-0x0000000001E5A000-memory.dmp

    Filesize

    40KB