Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2024 02:10

General

  • Target

    1077f5ff5fc1c7b7ce347323d14ba387f43e9cfab9808fa31a1cd3144fa05ef4.exe

  • Size

    8.1MB

  • MD5

    89d75b7846db98111be948830f9cf7c2

  • SHA1

    3771cbe04980af3cdca295df79346456d1207051

  • SHA256

    1077f5ff5fc1c7b7ce347323d14ba387f43e9cfab9808fa31a1cd3144fa05ef4

  • SHA512

    f283b1a7bc30621a0e6ee6383174323cc67d002329a294d13aa23a633ca6f66ee0acdc6a4d2b0d4b7465acaa043b60f1ed27200a2b2d998fa0ef85f3545138fc

  • SSDEEP

    196608:HREgs4DsRz2vROZmy0TNy06Gm/HVSle4LG7IYTmd6r+d4:HRG2vROZmyYR63/HVSleAkLT66r+a

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 18 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1077f5ff5fc1c7b7ce347323d14ba387f43e9cfab9808fa31a1cd3144fa05ef4.exe
    "C:\Users\Admin\AppData\Local\Temp\1077f5ff5fc1c7b7ce347323d14ba387f43e9cfab9808fa31a1cd3144fa05ef4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /q /i BWCInstaller.msi /norestart
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CD62F3696B0A085ACAE680DC835A1CF1
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI86E4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240617281 2 CustomActions!CustomActions.CustomActions.StartApp
        3⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe
          "C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe"
          4⤵
          • Checks computer location settings
          • Sets desktop wallpaper using registry
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4752
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8946.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240617828 8 CustomActions!CustomActions.CustomActions.InstallPing
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e577e0c.rbs

    Filesize

    9KB

    MD5

    702c549b2b4b768b70b878f6b10fc28d

    SHA1

    2600a026ec50927f6b013dfddb7bb7662c3cf551

    SHA256

    fe1b6d872104acdb253b578d2225f3f12f204ba80482e98d8049bbcd05cfe338

    SHA512

    c79e412e56435f59525142e27031c03c108568fe7a843021077dd2815990162a5ea2f902aa846c67414e5665b4a8002500d82eba2921e4d12dc064746fbedbd8

  • C:\Users\Admin\AppData\Local\Microsoft\BGAHelperLib\BrowserSettings.dll

    Filesize

    1.3MB

    MD5

    884f63dbc809dcec05912a05477fa078

    SHA1

    3aa2d5b9a24db61b4532cc4a3b33040e36827eed

    SHA256

    afddc2cf125104f3b907f0645a9f921475e02eda0a54179fb77ea677a608501d

    SHA512

    30853c127905c6cfe9360279f334d50c273d53db09ebd869e4107fddbb3cd75ccadf531b783ed0afb5a6e25dba338709be67e3468d4bc64f56f407dc6975f8a2

  • C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe

    Filesize

    7.8MB

    MD5

    5ddf6c0675019c3a758236d0db069d15

    SHA1

    41896fbdebc90be5fac406596d5728c7ea0c0c53

    SHA256

    d9395e5d508e683daebfbc485b45249bd20c46a596aefae839f508c4a8c05f3f

    SHA512

    768a9bc2d132b3129e9696a068553cdd7b8df135d23c59dc71e34e9e129f40052bd9e29fce60a13e8ea54926bda2276b99f554cf26520c468876709de1b3a013

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

    Filesize

    651B

    MD5

    9bbfe11735bac43a2ed1be18d0655fe2

    SHA1

    61141928bb248fd6e9cd5084a9db05a9b980fb3a

    SHA256

    549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

    SHA512

    a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCInstaller.msi

    Filesize

    8.2MB

    MD5

    ee59439a29c4abea66385ae5dab25eab

    SHA1

    d6a3559373a9e2e8e9988abc6e7b636892ca033e

    SHA256

    d1b28a6b26e1bca329a63211ac822d6a3718c6985e64e61f66fa7a2fd4058740

    SHA512

    58a59374c6ff99289dc7b9b8513db9305760485b37e47f6835ae364db5d149dac4aeef31d1b64108cb5073896e434c786924c18b1cca314401214e83f6f2067f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe

    Filesize

    25KB

    MD5

    a923912a4643c5502e6c14f423065f11

    SHA1

    c2591ccb3357bd94f9d56fcdbd0da9771694056e

    SHA256

    dbe43727dbaa78ddaa08e73562c0ff271444a6c5ae87ba2082a2533157b8fcc4

    SHA512

    a5f8fb088ce047e49946d66bf0278f20a978b0695ad60f3bd5a740acfbba5dd2d4a81ecaede95702857f071877bd8b4d11f0bdb095a084f57069eea53ac00cd7

  • C:\Windows\Installer\MSI86E4.tmp

    Filesize

    333KB

    MD5

    917f037636bc8bfd46149cccbb4e34b5

    SHA1

    68f04abfea57bca80390ae2e030287079fd4e4c5

    SHA256

    5d98c744d61684418fa69643639a17816422b14f3c95b5a9ed0117ca06147e65

    SHA512

    b620936939968e0dde038112265df419299dcef2ba63e2ae6412e9891401ed92968977c6e9950f291065d08a1dde065ddf8afd4f6290af8af911ac5713641e4a

  • C:\Windows\Installer\MSI86E4.tmp-\CustomActions.dll

    Filesize

    21KB

    MD5

    93d3d63ab30d1522990da0bedbc8539d

    SHA1

    3191cace96629a0dee4b9e8865b7184c9d73de6b

    SHA256

    e7274b3914040c71ed155871396088d2fd4c38ad36d4a765530cfe6d487b6cf2

    SHA512

    9f1d1a96b8faabcac299dedab140aab75d51d32c99ac31f6d1769c11d5a7d00d1e8ec2aba026690b93b51c21d157ad5e651113ed5142da7b7bdaaafd4057d4e6

  • C:\Windows\Installer\MSI86E4.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    172KB

    MD5

    4e04a4cb2cf220aecc23ea1884c74693

    SHA1

    a828c986d737f89ee1d9b50e63c540d48096957f

    SHA256

    cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a

    SHA512

    c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4

  • C:\Windows\Installer\MSI8946.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    01c01d040563a55e0fd31cc8daa5f155

    SHA1

    3c1c229703198f9772d7721357f1b90281917842

    SHA256

    33d947c04a10e3aff3dca3b779393fa56ce5f02251c8cbae5076a125fdea081f

    SHA512

    9c3f0cc17868479575090e1949e31a688b8c1cdfa56ac4a08cbe661466bb40ecfc94ea512dc4b64d5ff14a563f96f1e71c03b6eeacc42992455bd4f1c91f17d5

  • C:\Windows\Installer\MSI8946.tmp-\DispatchQueue.dll

    Filesize

    158KB

    MD5

    588b3b8d0b4660e99529c3769bbdfedc

    SHA1

    d130050d1c8c114421a72caaea0002d16fa77bfe

    SHA256

    d05a41ed2aa8af71e4c24bfff27032d6805c7883e9c4a88aa0a885e441bec649

    SHA512

    e5f2fac5e12a7e1828e28c7395435e43449898a18a2a70b3f7ea6a1982e1c36f11da6ee7cc8ac7cefaab266e53d6f99ee88067bc9d719e99f4f69b4834b7f50b

  • memory/2068-8-0x0000000000250000-0x000000000025A000-memory.dmp

    Filesize

    40KB

  • memory/2068-7-0x00000000744CE000-0x00000000744CF000-memory.dmp

    Filesize

    4KB

  • memory/3172-48-0x0000000002810000-0x000000000283E000-memory.dmp

    Filesize

    184KB

  • memory/3172-52-0x0000000002850000-0x000000000285C000-memory.dmp

    Filesize

    48KB

  • memory/4752-87-0x00000000008C0000-0x000000000109E000-memory.dmp

    Filesize

    7.9MB

  • memory/4752-102-0x0000000009DE0000-0x000000000A874000-memory.dmp

    Filesize

    10.6MB

  • memory/4752-103-0x000000000D4B0000-0x000000000DA54000-memory.dmp

    Filesize

    5.6MB

  • memory/4752-104-0x0000000005A60000-0x0000000005AF2000-memory.dmp

    Filesize

    584KB

  • memory/4752-106-0x0000000005CE0000-0x0000000005D90000-memory.dmp

    Filesize

    704KB

  • memory/4752-105-0x0000000005B00000-0x0000000005B0A000-memory.dmp

    Filesize

    40KB

  • memory/4752-107-0x0000000005ED0000-0x0000000005EF2000-memory.dmp

    Filesize

    136KB

  • memory/4752-108-0x0000000005F00000-0x0000000006254000-memory.dmp

    Filesize

    3.3MB

  • memory/4752-117-0x0000000008520000-0x000000000855A000-memory.dmp

    Filesize

    232KB

  • memory/4752-127-0x00000000099E0000-0x0000000009A46000-memory.dmp

    Filesize

    408KB