Resubmissions

17-12-2024 17:54

241217-wg6sqatlfv 10

17-12-2024 17:36

241217-v6vw3svjen 6

Analysis

  • max time kernel
    1314s
  • max time network
    1158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    17-12-2024 17:36

General

  • Target

    EpicInstaller-17.2.0.msi

  • Size

    194.0MB

  • MD5

    392f66528c31a402484379f57d0605a1

  • SHA1

    40d155146d49258d3f3e3d8bacc6c919ad8c1d35

  • SHA256

    bdb77e87b9d666634e182ea42482d9559125ca8e62c2399b8ad2c6b42395aaa8

  • SHA512

    24924b00dc61295ff9fd8f003addaa2f56e6774d2b6e20c068d0d538f0c2b1e2af9c6ca117b9718513218734596a93540e8674294ec67ea91f4dec865b473600

  • SSDEEP

    3145728:HyCHcktJLbo4ZW0AF7PPMQxSkn2XbtOk1Ne4rkq//id544fVHBo9LE5XCJuo:Tc81WtsXk2XbcPdij4cJE5XC

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\EpicInstaller-17.2.0.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3684
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C4491DC18FD8326FF69A9FB2A12D5B06 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIDA04.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0