Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:34

General

  • Target

    6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d.msi

  • Size

    4.7MB

  • MD5

    82f3f74379c6dbdbca3a64c5717c2faa

  • SHA1

    ba5562e233c1f83d6929db8dd03860a99bf58fa4

  • SHA256

    6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d

  • SHA512

    8bdf61555de4b7e249201462a0f942a1cc671d9bcc514635297e08ce25bcb90de8d0d64fd513da32d4be731e5af6db13d039040a83c8e50c2887009b091e58a1

  • SSDEEP

    98304:wph2BBopK5X4MkjkZMiWFLH/qJ/YOKa4RpnoYbO:eQuKl5kjQMr/qJ/YFaO9DO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 20 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\6696d790ee119b0de93919050a642d3dca502a2ae1864700b6b06fa2b955ec9d.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2364
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 7DFC471203D0F891DEA42056B7B686D4
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIC8BD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259443125 1 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:1756
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSICD81.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259444139 15 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:2408
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2248
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005BC" "0000000000000570"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    719182e07998ae9226d45680aa1fe178

    SHA1

    8f8b03c110c129cb3a35841ed959de7a7266ffec

    SHA256

    8f1d64c2c4dbb6ca892083e4b4a8bdb4585597e1269c218340c6b12517bb3dbe

    SHA512

    2df474f0ac4d1ef93b14deda32c5476da130bc41f37c0a5cd0c271c990914613c3c788116a4b87d44876695f71e5a131847fdf96d609364c06cb2f5ed6ce76a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    727B

    MD5

    960818b90ace97aed45bb4b97f88ecb1

    SHA1

    c165689921f33f55e00840a7706237eac2b81198

    SHA256

    ac6905c108d9910dfe342e6430e67da929305be9717cd50e8c6376e58c3e3f85

    SHA512

    5d9138ef49b7ec7347dc571498dfd1d2a792e0567fb610acd5259e8c641f3e20bd5265b876dab7ee209e53cedb2450f847dacfcd12afbeb006f4e88b567f1781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    727B

    MD5

    6f1110d00d087c05c5c3d3f6ba59a05e

    SHA1

    80d2642da0bb8fd62c7fc9b3cf6b9ec185fe7197

    SHA256

    dbd3f2be36b774724465293d871a29bd93e53da8fabbad60e0c69611d031ef03

    SHA512

    09968820a65bbaf76b6fac9e3105f91539977421ac5810fac984949aa5a0dbfb33f8bf8b96fa4a535082c4867f267b5fa18e955871d9e8b6581bf84e28a58289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    910afe4f2e6d1ad55d967153c75353a8

    SHA1

    63681e16f03c01d6d9c41f48eba1470e3616071b

    SHA256

    cb8103b9c5e86aec7a512c38b8854687b38435b911763020a7abe85364448fb5

    SHA512

    c34f164485b0e8c65b9da9fa942f0a2d7629d2246ce7b08a422cdf8fcfa9e2712d14e924a38d253fc730657d45d8c450a3ea32f23c831fa723b5f9663e3def33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3f38c283e7137a0faca704ca3c4e36e

    SHA1

    153d98489566378c386cfd96cebc3dc195b0b2d2

    SHA256

    90be3dddc088094e2326122590b7008f8dd5e47bf551ec954d04c9503b241b3c

    SHA512

    d4c6fc78e9ab1e5b37a707cf097637f0100d2862b7d11f0dce6ac13951c5ff03a930973292b5bee51c85c27588d99110eb932bcf6e9cbcbf167ac402d3ff61fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4

    Filesize

    416B

    MD5

    b20cfc173aa42a7b102cb261e43f7e68

    SHA1

    129b3459c32acee7eda2be02d7b3255b71a70c11

    SHA256

    d0ae415bc1bfffaa5e649ee7696544439537558efb388d65321d1abbe80f35ac

    SHA512

    e311aafc8600bc4bfa2f42239254acab4a36de65989965c7667a03f07523a2030f30e87890bdf86155ea71137592c9fa16e3d261bafc3dd2f5cd63cda1ce1768

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CB7DFFEEA63BAB482BD2705E7E24AB_D64C5BFAB2C28B4652E4AC7169A0D3DB

    Filesize

    408B

    MD5

    8459696831f244e4abbf5a32e886cbd2

    SHA1

    2c235635fa8f402ba2ae8584f9ed446d7c23f3ab

    SHA256

    ed75b2f1a664616900d9dcda2376aac6d1c109c6028f54720513e4a9db0d400c

    SHA512

    4172fcbdcb9a6ce7381732cbfeb1a38a59e7026f9497789cb4c9242a078345a34967d5f194e0f1b8d404df407d0934ea7b43ff19dd2df582c016679383cf815c

  • C:\Users\Admin\AppData\Local\Temp\CabAA17.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarABCE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIC8BD.tmp

    Filesize

    549KB

    MD5

    45e153ef2e0aa13c55cd25fafa3bce90

    SHA1

    9805ae1f48e801df6df506f949b723e6553ce2e5

    SHA256

    2104d3c13e6b624a7d628534fcdf900730752f9ff389b0f4fe1de77c33d8d4c1

    SHA512

    87f967910b99a9833a1cb6de12225cf6c7b08239e49059ae5303bfcd1c69bcc691d35ee676a761456ec2a6ded199ac30adc28b933cb8ad0e09c0a99456db3d8a

  • C:\Windows\Installer\MSICD71.tmp

    Filesize

    390KB

    MD5

    e8dc682f2c486075c6aba658971a62cc

    SHA1

    7cd0a2b5047a4074aa06a6caa3bb69124851e95d

    SHA256

    7aacd4c18710e9bc4ff2034895a0a0c8f80f21809fb177d520e93f7688216e6d

    SHA512

    a0a1f0f418bf2d4ffd079b840aeb0142c7faab7fa72b5e33b1841798569f55a25dfd305abf9c2ca89792f6499f695b69975882697dc53e99d5a975a9fa8c7d75

  • C:\Windows\Installer\SFXCAC6ABFF4D554B9B89C7CAE343A6A084AF\CustomAction.config

    Filesize

    980B

    MD5

    c9c40af1656f8531eaa647caceb1e436

    SHA1

    907837497508de13d5a7e60697fc9d050e327e19

    SHA256

    1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

    SHA512

    0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

  • C:\Windows\Installer\SFXCAC6ABFF4D554B9B89C7CAE343A6A084AF\WixSharp.dll

    Filesize

    602KB

    MD5

    ebed2675d27b9383ee8e58bdeddd5da4

    SHA1

    4dc37974db638ec02363c784fa2c178125f4280f

    SHA256

    caa9da1c55e33446eaeb783957e990847369423c7dd652f07a5c93bf1d786a66

    SHA512

    b13538f58b766abd013f73d398eaa4e1adec3fc967415bf7f95198e6f55ac65a12a0c3863708b6fb525ef4a01f0ab88485bb990527bc0e4f5159c8419811dfab

  • C:\Windows\Installer\SFXCAC6ABFF4D554B9B89C7CAE343A6A084AF\WixToolset.Dtf.WindowsInstaller.dll

    Filesize

    193KB

    MD5

    b82b13d16e7f3d3607026f61b7295224

    SHA1

    d17b76907ea442b6cc5a79361a8fcec91075e20d

    SHA256

    bcc548e72b190d8f39dcb19538444e2576617a21caba6adcb4116511e1d2ddee

    SHA512

    be8c0b8b585fc77693e7481ca5d3f57a8b213c1190782fd4700676af9c0b671523c1a4fa58f15947a14c1ff6d4cda65d7353c6ba848a3a247dfcda864869e93f

  • memory/1756-69-0x0000000002180000-0x00000000021B4000-memory.dmp

    Filesize

    208KB

  • memory/1756-71-0x000000001AAE0000-0x000000001AB7C000-memory.dmp

    Filesize

    624KB

  • memory/2408-98-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB