Analysis

  • max time kernel
    142s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 12:11

General

  • Target

    XSGYLWGR.msi

  • Size

    7.8MB

  • MD5

    44de92e6a15f94afc69c001b4f201392

  • SHA1

    84277ea8c5f24b98aaaa0df5eded2d23c7b159b1

  • SHA256

    06be76f549d1d97a808e6629f6043a9609d5b59fa14d0e3ee3aa01354ac369d1

  • SHA512

    d467f8faf22f2de115d711a5e138aeefddb43d73b2c22c44aea5cf3804e570c304490d7388ddd7ae031cdb47f15ec15e3c6cfff6b7f3895868475bfef50460a9

  • SSDEEP

    196608:FEb3Cjrhy+g/lSvc26MJuBUYFa2S0j6S6d4+bR7NQXE:KCjc5UJuBUj2a4DXE

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\XSGYLWGR.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4992
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A32BEAEE444227FBF2161E87FD0DB44B C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4416
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BE58E127-8223-4A81-9445-9AEAEDF20FDC}
        3⤵
        • Executes dropped EXE
        PID:2236
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5E920287-0507-4F48-916A-04F368786253}
        3⤵
        • Executes dropped EXE
        PID:3040
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96D19AAE-45AA-411B-B30E-B16BF09B6D11}
        3⤵
        • Executes dropped EXE
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FB2D5864-B9F6-4C35-82FF-98CB9DB4C109}
        3⤵
        • Executes dropped EXE
        PID:4576
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{77A40EB0-BBFF-4749-902A-47419571BDB9}
        3⤵
        • Executes dropped EXE
        PID:1784
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE5CD4EC-805B-4661-BDC8-7BE6C6158C8E}
        3⤵
        • Executes dropped EXE
        PID:1792
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{546491F5-CE9A-4267-8269-AD9595663E3C}
        3⤵
        • Executes dropped EXE
        PID:1372
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{24C1F0C2-2181-494C-BAC7-A2E0F5BAB4B5}
        3⤵
        • Executes dropped EXE
        PID:3164
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{424D351A-13F7-4858-BF57-088F92FAD2F7}
        3⤵
        • Executes dropped EXE
        PID:1892
      • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BC9BEEF6-447C-45C9-8022-CFC51CFCE699}
        3⤵
        • Executes dropped EXE
        PID:976
      • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3280
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            PID:4324
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1252
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\System32\cmd.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe
      2⤵
        PID:456

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSI7A9E.tmp

      Filesize

      171KB

      MD5

      a0e940a3d3c1523416675125e3b0c07e

      SHA1

      2e29eeba6da9a4023bc8071158feee3b0277fd1b

      SHA256

      b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

      SHA512

      736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

    • C:\Users\Admin\AppData\Local\Temp\MSI7CD2.tmp

      Filesize

      2.5MB

      MD5

      d446b289fa31f8a72b69a3e4835d9962

      SHA1

      e46064ed0a8fa3daee924069e8d7b22ff1856787

      SHA256

      55fd357ce8a5689a7a8507ef7f8e9e94bc517cc1af0a8818e6e883deefa8faad

      SHA512

      6881faacb08acc4020e66a940a384c95e7fa4dee842aeb2bfe8f67cd82aa301f7245a72e283cecd5f1bd4d6ed565b99750e99563574eded4e1c3928cf388be2d

    • C:\Users\Admin\AppData\Local\Temp\f4cb2ef7

      Filesize

      3.9MB

      MD5

      59ec24676f835ebae1c7a8896c8826da

      SHA1

      1b9765b2882aea4f7ade72359ecf87272e3a885a

      SHA256

      ff34280f3cf1b921cc51be0274e43d5040f3ab1be5e33003b896eabab1c7fa80

      SHA512

      dbd0ba92680502058ba751711775850569f2af7d2bee4f45396adc97ac8031fdc1189fe0de9e663128cdc2a7f00b25402e430ff4bbbe421bc573931c19b05097

    • C:\Users\Admin\AppData\Local\Temp\f4cb2ef7

      Filesize

      3.9MB

      MD5

      e3ea741ec6621053052dc3f9175ad648

      SHA1

      550493b1ad6afab572cad8788e40fe81a9779c0d

      SHA256

      1b91bd84a741099fa9fad686bfefd722ff4aa71ce5ba2f32ef43a3f210480a6f

      SHA512

      c565b2287a49854e8fb4a1fdf83f0199d75dad181bc0494372457d3ff05523bddc0bceea96a4b8283a7802ebec79d7152a2536103b5c4ee96449f2425df41138

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\SbieDll.dll

      Filesize

      856KB

      MD5

      10d91c0cc5ab1808b05f020446fdb3a6

      SHA1

      7741d68b15fbc1be0f79494b2cb58a500cf13103

      SHA256

      b2ee8c65ac2a6989aa84aabb972fea643eeb4457f1bb3d5e6fcb28f5d664f6bd

      SHA512

      4c7a58ba5681d26acc6df17098bf7bf28d313def544919f0d05d9201835dab07b3012b22cec56a4f8fb04e9698faeb33de5a4d2e36c54d4d05fbb980ae17e8e5

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\addend.cfg

      Filesize

      53KB

      MD5

      bfe74179086be4de8e0e65dbf314b587

      SHA1

      9975fb7118737282467984f62b83afba1c3a0360

      SHA256

      157e302a955f1655103b132377b6a0bba6da32e605edf14d033c7b65bc981419

      SHA512

      962a941e91c48b0566baa619ebd23e2c8ac59e81bf8b4c055401ad7871937d247e1c133ce036ecd4c30d4188ace30aa3f4d3b9501a5e93423da754ead16ac1df

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\eparchy.odp

      Filesize

      3.5MB

      MD5

      583e08477f17eeea5564b233c5a8e232

      SHA1

      61d221e34e179c1836eb4fd733eed5c4eba5b3e0

      SHA256

      1000efce8e81467bb2b4eedd6ad9a5184c3ce5261e8ba759c61386f06734d37e

      SHA512

      175add4e64bc0cf4c94cbc3d5c52661321d716ace34a787e3c8862b76c30e2557ae1ac32194df1e3c1e1d86a2f67fa6f3429a7f8212aeca7bc7997f04e568902

    • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISBEW64.exe

      Filesize

      178KB

      MD5

      40f3a092744e46f3531a40b917cca81e

      SHA1

      c73f62a44cb3a75933cecf1be73a48d0d623039b

      SHA256

      561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

      SHA512

      1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

    • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\ISRT.dll

      Filesize

      426KB

      MD5

      8af02bf8e358e11caec4f2e7884b43cc

      SHA1

      16badc6c610eeb08de121ab268093dd36b56bf27

      SHA256

      58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

      SHA512

      d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

    • C:\Users\Admin\AppData\Local\Temp\{F9395CD4-89B6-4194-BA57-C6539CC7306C}\_isres_0x0409.dll

      Filesize

      1.8MB

      MD5

      7de024bc275f9cdeaf66a865e6fd8e58

      SHA1

      5086e4a26f9b80699ea8d9f2a33cead28a1819c0

      SHA256

      bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

      SHA512

      191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

    • C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe

      Filesize

      328KB

      MD5

      372723341529a19f1576557a83b51bff

      SHA1

      1229afd3b03cbe3f11fce844f32b689537ac12bc

      SHA256

      32ef96fcb4e5db03ac6e8582d78670856f53fa284b79d8358ed92c19fc7830b5

      SHA512

      a6adb3e757e99af3a75df367ffc9215ddf7071b563064776268cb90b2a87a50d9b7cfe07ec96dcb2037bedccef61a723d15f8b80b555b28fe4a9dcf41f2d5f58

    • memory/1252-92-0x00007FFD85AD0000-0x00007FFD85CC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1596-54-0x00007FFD6F6B0000-0x00007FFD6F710000-memory.dmp

      Filesize

      384KB

    • memory/3280-66-0x00007FFD6F6B0000-0x00007FFD6F710000-memory.dmp

      Filesize

      384KB

    • memory/3280-78-0x00007FFD6F6B0000-0x00007FFD6F710000-memory.dmp

      Filesize

      384KB

    • memory/4324-80-0x00007FF68A4B0000-0x00007FF68A843000-memory.dmp

      Filesize

      3.6MB

    • memory/4324-81-0x00007FF68A4B0000-0x00007FF68A843000-memory.dmp

      Filesize

      3.6MB

    • memory/4324-83-0x00007FF68A4B0000-0x00007FF68A843000-memory.dmp

      Filesize

      3.6MB

    • memory/4324-84-0x00007FF68A4B0000-0x00007FF68A843000-memory.dmp

      Filesize

      3.6MB

    • memory/4416-37-0x0000000003550000-0x0000000003717000-memory.dmp

      Filesize

      1.8MB

    • memory/4416-32-0x0000000010000000-0x0000000010114000-memory.dmp

      Filesize

      1.1MB