Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 14:40

General

  • Target

    BWCStartMSI.exe

  • Size

    8.1MB

  • MD5

    89d75b7846db98111be948830f9cf7c2

  • SHA1

    3771cbe04980af3cdca295df79346456d1207051

  • SHA256

    1077f5ff5fc1c7b7ce347323d14ba387f43e9cfab9808fa31a1cd3144fa05ef4

  • SHA512

    f283b1a7bc30621a0e6ee6383174323cc67d002329a294d13aa23a633ca6f66ee0acdc6a4d2b0d4b7465acaa043b60f1ed27200a2b2d998fa0ef85f3545138fc

  • SSDEEP

    196608:HREgs4DsRz2vROZmy0TNy06Gm/HVSle4LG7IYTmd6r+d4:HRG2vROZmyYR63/HVSleAkLT66r+a

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 18 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BWCStartMSI.exe
    "C:\Users\Admin\AppData\Local\Temp\BWCStartMSI.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /q /i BWCInstaller.msi /norestart
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4452
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 471A794B3DD66966ABE846D8DF5DD28D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI97DC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240621609 2 CustomActions!CustomActions.CustomActions.StartApp
        3⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4024
        • C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe
          "C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe"
          4⤵
          • Checks computer location settings
          • Sets desktop wallpaper using registry
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2908
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9ACB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240622343 8 CustomActions!CustomActions.CustomActions.InstallPing
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e579379.rbs

    Filesize

    9KB

    MD5

    b7e2d2f6614938c08dfa4c1ac1714d0a

    SHA1

    af8905ab06a22d256d0d03330796e8a52d16b68f

    SHA256

    2baf2ba03137069bfc4b2b729e5aa299c0c2da2ff7fc623f7df358be0f88a312

    SHA512

    706a02c750511d1b3c338ecc7c3db0124ef3be382bad0c54ba748942d855d1f0e6d189d5c5de04bb885d39773108c0dd762ce68e4b2a013c428fa067cab17045

  • C:\Users\Admin\AppData\Local\Microsoft\BGAHelperLib\BrowserSettings.dll

    Filesize

    1.3MB

    MD5

    884f63dbc809dcec05912a05477fa078

    SHA1

    3aa2d5b9a24db61b4532cc4a3b33040e36827eed

    SHA256

    afddc2cf125104f3b907f0645a9f921475e02eda0a54179fb77ea677a608501d

    SHA512

    30853c127905c6cfe9360279f334d50c273d53db09ebd869e4107fddbb3cd75ccadf531b783ed0afb5a6e25dba338709be67e3468d4bc64f56f407dc6975f8a2

  • C:\Users\Admin\AppData\Local\Microsoft\BingWallpaperApp\BingWallpaperApp.exe

    Filesize

    7.8MB

    MD5

    5ddf6c0675019c3a758236d0db069d15

    SHA1

    41896fbdebc90be5fac406596d5728c7ea0c0c53

    SHA256

    d9395e5d508e683daebfbc485b45249bd20c46a596aefae839f508c4a8c05f3f

    SHA512

    768a9bc2d132b3129e9696a068553cdd7b8df135d23c59dc71e34e9e129f40052bd9e29fce60a13e8ea54926bda2276b99f554cf26520c468876709de1b3a013

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

    Filesize

    651B

    MD5

    9bbfe11735bac43a2ed1be18d0655fe2

    SHA1

    61141928bb248fd6e9cd5084a9db05a9b980fb3a

    SHA256

    549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

    SHA512

    a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCInstaller.msi

    Filesize

    8.2MB

    MD5

    ee59439a29c4abea66385ae5dab25eab

    SHA1

    d6a3559373a9e2e8e9988abc6e7b636892ca033e

    SHA256

    d1b28a6b26e1bca329a63211ac822d6a3718c6985e64e61f66fa7a2fd4058740

    SHA512

    58a59374c6ff99289dc7b9b8513db9305760485b37e47f6835ae364db5d149dac4aeef31d1b64108cb5073896e434c786924c18b1cca314401214e83f6f2067f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BWCStartMSI.exe

    Filesize

    25KB

    MD5

    a923912a4643c5502e6c14f423065f11

    SHA1

    c2591ccb3357bd94f9d56fcdbd0da9771694056e

    SHA256

    dbe43727dbaa78ddaa08e73562c0ff271444a6c5ae87ba2082a2533157b8fcc4

    SHA512

    a5f8fb088ce047e49946d66bf0278f20a978b0695ad60f3bd5a740acfbba5dd2d4a81ecaede95702857f071877bd8b4d11f0bdb095a084f57069eea53ac00cd7

  • C:\Windows\Installer\MSI97DC.tmp

    Filesize

    333KB

    MD5

    917f037636bc8bfd46149cccbb4e34b5

    SHA1

    68f04abfea57bca80390ae2e030287079fd4e4c5

    SHA256

    5d98c744d61684418fa69643639a17816422b14f3c95b5a9ed0117ca06147e65

    SHA512

    b620936939968e0dde038112265df419299dcef2ba63e2ae6412e9891401ed92968977c6e9950f291065d08a1dde065ddf8afd4f6290af8af911ac5713641e4a

  • C:\Windows\Installer\MSI97DC.tmp-\CustomActions.dll

    Filesize

    21KB

    MD5

    93d3d63ab30d1522990da0bedbc8539d

    SHA1

    3191cace96629a0dee4b9e8865b7184c9d73de6b

    SHA256

    e7274b3914040c71ed155871396088d2fd4c38ad36d4a765530cfe6d487b6cf2

    SHA512

    9f1d1a96b8faabcac299dedab140aab75d51d32c99ac31f6d1769c11d5a7d00d1e8ec2aba026690b93b51c21d157ad5e651113ed5142da7b7bdaaafd4057d4e6

  • C:\Windows\Installer\MSI97DC.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    172KB

    MD5

    4e04a4cb2cf220aecc23ea1884c74693

    SHA1

    a828c986d737f89ee1d9b50e63c540d48096957f

    SHA256

    cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a

    SHA512

    c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4

  • C:\Windows\Installer\MSI9ACB.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    01c01d040563a55e0fd31cc8daa5f155

    SHA1

    3c1c229703198f9772d7721357f1b90281917842

    SHA256

    33d947c04a10e3aff3dca3b779393fa56ce5f02251c8cbae5076a125fdea081f

    SHA512

    9c3f0cc17868479575090e1949e31a688b8c1cdfa56ac4a08cbe661466bb40ecfc94ea512dc4b64d5ff14a563f96f1e71c03b6eeacc42992455bd4f1c91f17d5

  • C:\Windows\Installer\MSI9ACB.tmp-\DispatchQueue.dll

    Filesize

    158KB

    MD5

    588b3b8d0b4660e99529c3769bbdfedc

    SHA1

    d130050d1c8c114421a72caaea0002d16fa77bfe

    SHA256

    d05a41ed2aa8af71e4c24bfff27032d6805c7883e9c4a88aa0a885e441bec649

    SHA512

    e5f2fac5e12a7e1828e28c7395435e43449898a18a2a70b3f7ea6a1982e1c36f11da6ee7cc8ac7cefaab266e53d6f99ee88067bc9d719e99f4f69b4834b7f50b

  • memory/2908-103-0x000000000E190000-0x000000000E222000-memory.dmp

    Filesize

    584KB

  • memory/2908-105-0x0000000007E60000-0x0000000007E6A000-memory.dmp

    Filesize

    40KB

  • memory/2908-65-0x0000000000C40000-0x000000000141E000-memory.dmp

    Filesize

    7.9MB

  • memory/2908-127-0x0000000011FB0000-0x0000000012016000-memory.dmp

    Filesize

    408KB

  • memory/2908-99-0x000000000A090000-0x000000000AB24000-memory.dmp

    Filesize

    10.6MB

  • memory/2908-102-0x000000000E760000-0x000000000ED04000-memory.dmp

    Filesize

    5.6MB

  • memory/2908-117-0x0000000010AE0000-0x0000000010B1A000-memory.dmp

    Filesize

    232KB

  • memory/2908-108-0x000000000ED10000-0x000000000F064000-memory.dmp

    Filesize

    3.3MB

  • memory/2908-106-0x0000000007F00000-0x0000000007FB0000-memory.dmp

    Filesize

    704KB

  • memory/2908-107-0x0000000008020000-0x0000000008042000-memory.dmp

    Filesize

    136KB

  • memory/3068-8-0x00000000009F0000-0x00000000009FA000-memory.dmp

    Filesize

    40KB

  • memory/3068-7-0x00000000746BE000-0x00000000746BF000-memory.dmp

    Filesize

    4KB

  • memory/4024-52-0x00000000031D0000-0x00000000031DC000-memory.dmp

    Filesize

    48KB

  • memory/4024-48-0x0000000003190000-0x00000000031BE000-memory.dmp

    Filesize

    184KB