Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 11:55

General

  • Target

    b6c37e3d6c1e61c71f42e005774cae3f722a3273a91d6e29d27e9f76ab4ab934.msi

  • Size

    1.8MB

  • MD5

    0d4245b805741f0d90e4a964971b0527

  • SHA1

    0828f6cbe30fc369eb62d9e992162870767489f5

  • SHA256

    b6c37e3d6c1e61c71f42e005774cae3f722a3273a91d6e29d27e9f76ab4ab934

  • SHA512

    be3c036f37be183201c4fadc3c1111b8ea0c2acf9d6f2eb1ce4e1dc4ffe4664ed91504e8fd83346257f10352f84cb701fb39057eb948fff038be3e3328e68371

  • SSDEEP

    24576:at9cpVDh1i+OG6gviWd2ZXY3kJh8b1sd7ptsn5t:tpRh1agVYtAkJSbCpyT

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b6c37e3d6c1e61c71f42e005774cae3f722a3273a91d6e29d27e9f76ab4ab934.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2972
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D03C22A44E86CE59C4A538DBA80EAD2E
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1976
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start msedge https://www.med.unc.edu/webguide/wp-content/uploads/sites/419/2019/07/AdobePDF.pdf
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2212
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\files"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:760
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1496
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2104
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000058C" "000000000000059C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\files.cab

    Filesize

    1.5MB

    MD5

    0eb1dab24d3da5ed8b7c5ea63f6ba5a5

    SHA1

    13384e702c3dd018d5e553676639167f6f351174

    SHA256

    d88f05a410a655e23d498bdfa307084f5d3771e29a51417aa5ce42044ef4fb56

    SHA512

    6c07aa50cc944ac3be3a74c0bb3aa57b57df3e15ba3bf2a74eb4a5d7d4e3a2d4b055b0c5dec51e174c164b75465824037d1230b9e4375f54c18da568e3f94680

  • C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\msiwrapper.ini

    Filesize

    380B

    MD5

    061d12e6739560ba7ebf5ba3e1d490e3

    SHA1

    ee913704309d89bc898fa7f0617ca547167a0e02

    SHA256

    bf0af7cb46a8169eac03172858c15a3ec896d8bb79bc4628dedacc8360bcfb0f

    SHA512

    27944a1580e0a324658bce251dee3b161fff14a5d6b6e048f628da9acd70ab64e459e2cec26e6bada75ca7428c92becdc5b144f1a0ebeae95418dabb5c76aea1

  • C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\msiwrapper.ini

    Filesize

    1KB

    MD5

    f87b30f19c4108a464a3c42707a969e1

    SHA1

    e9ce16454586405115f114b7be6d3a81ac8a4486

    SHA256

    1b4248d60bcdb1314928a506d21f431cd56f312abe76b6214e34f6a2cae13a16

    SHA512

    be4442f50d3c4bebeda20bd02c3ed25e22e24be3487f0aa9b404bc5e48dbd6c53de004ea32b71788e6dbf5ba90155a090eac83911790de0f31094ea5f3e0d35f

  • C:\Users\Admin\AppData\Local\Temp\MW-536e4c3b-c735-4bd3-bfe2-3c640d960d0a\msiwrapper.ini

    Filesize

    1KB

    MD5

    ad19d07bd95b2ed682eabb4a6655793a

    SHA1

    8c76a862a39e9d834efc3623845bc63446b556ac

    SHA256

    e04b5a39bb15a047ccbe69597089875e1beab1955674807b39b25a8df3e4dccd

    SHA512

    62124d5993c4fc3389d9c674fa2d85985bb24c647b28d020b4cd280f690c622042a83bcf38a08da4ad3dda7aa3f0d8eb11f45677a252ff5fd3b2870392322d83

  • C:\Windows\Installer\MSIAA05.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108