Analysis

  • max time kernel
    142s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 12:14

General

  • Target

    XSGYLWGR.msi

  • Size

    7.8MB

  • MD5

    44de92e6a15f94afc69c001b4f201392

  • SHA1

    84277ea8c5f24b98aaaa0df5eded2d23c7b159b1

  • SHA256

    06be76f549d1d97a808e6629f6043a9609d5b59fa14d0e3ee3aa01354ac369d1

  • SHA512

    d467f8faf22f2de115d711a5e138aeefddb43d73b2c22c44aea5cf3804e570c304490d7388ddd7ae031cdb47f15ec15e3c6cfff6b7f3895868475bfef50460a9

  • SSDEEP

    196608:FEb3Cjrhy+g/lSvc26MJuBUYFa2S0j6S6d4+bR7NQXE:KCjc5UJuBUj2a4DXE

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\XSGYLWGR.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D11170C643D461943E33A9058C7C4592 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5E8B2665-4B95-41BD-920E-706FD8B0BA4B}
        3⤵
        • Executes dropped EXE
        PID:452
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{756A09DD-7CA4-4EAF-81BB-62A261F47059}
        3⤵
        • Executes dropped EXE
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{16284F00-B57D-4071-AED8-D02DF50FF061}
        3⤵
        • Executes dropped EXE
        PID:4532
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{09C4A3DC-49CB-4A91-B2DD-7442866D9937}
        3⤵
        • Executes dropped EXE
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0AE16D7A-5212-46A9-98F0-AD455C5EEDE2}
        3⤵
        • Executes dropped EXE
        PID:4664
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FA94D704-A9A8-4948-8822-524D4329AA63}
        3⤵
        • Executes dropped EXE
        PID:912
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{20FBED6F-EE19-40A1-BA95-65AFD6030F99}
        3⤵
        • Executes dropped EXE
        PID:1636
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BED38B1B-B707-4CF4-8833-6D505C412FA6}
        3⤵
        • Executes dropped EXE
        PID:868
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F4EACF45-6AC2-4813-AA22-7BB534FFB45A}
        3⤵
        • Executes dropped EXE
        PID:4688
      • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3F60B5C1-E8E3-4966-9C54-B02D88F081F7}
        3⤵
        • Executes dropped EXE
        PID:4780
      • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:6100
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            PID:4072
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5716
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\System32\cmd.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe
      2⤵
        PID:2988

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSI5AB3.tmp

      Filesize

      171KB

      MD5

      a0e940a3d3c1523416675125e3b0c07e

      SHA1

      2e29eeba6da9a4023bc8071158feee3b0277fd1b

      SHA256

      b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

      SHA512

      736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

    • C:\Users\Admin\AppData\Local\Temp\MSI5C79.tmp

      Filesize

      2.5MB

      MD5

      d446b289fa31f8a72b69a3e4835d9962

      SHA1

      e46064ed0a8fa3daee924069e8d7b22ff1856787

      SHA256

      55fd357ce8a5689a7a8507ef7f8e9e94bc517cc1af0a8818e6e883deefa8faad

      SHA512

      6881faacb08acc4020e66a940a384c95e7fa4dee842aeb2bfe8f67cd82aa301f7245a72e283cecd5f1bd4d6ed565b99750e99563574eded4e1c3928cf388be2d

    • C:\Users\Admin\AppData\Local\Temp\c927709d

      Filesize

      3.9MB

      MD5

      1676b5b81844385f5ccd977f040acb2c

      SHA1

      05bc9bad0c39c62df1e7513552580b0486cc4b0f

      SHA256

      81a3fb14898abfb033b1ae360aee1a4e42cca0678af649f5d271d9e52cd4f2de

      SHA512

      0f3f7b2a7a07d65875d7123586a22ca4d900b7765bb374bd68b7bc4623a6452933015929516e23dcee582c49da314e12593384ba573279e4dda54ad8f46de36f

    • C:\Users\Admin\AppData\Local\Temp\c927709d

      Filesize

      3.9MB

      MD5

      38ce8bcd9cc73ddf52e98b281dec1d0a

      SHA1

      c0f6fd583190675e8b5169d7bbb5a621c1301e45

      SHA256

      3289246d5ba5d7ec066fba61eb913c7aa63483ad9238b378a103263340bf155b

      SHA512

      910c4e84ccc14f1757a598294d6cf23013c27a73cf8a4baa1c6f03006a51d5f11a09d84dd5549d91bd8992b2a56e58bfc55aba42d09843ba8252227e93ff4528

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\SbieDll.dll

      Filesize

      856KB

      MD5

      10d91c0cc5ab1808b05f020446fdb3a6

      SHA1

      7741d68b15fbc1be0f79494b2cb58a500cf13103

      SHA256

      b2ee8c65ac2a6989aa84aabb972fea643eeb4457f1bb3d5e6fcb28f5d664f6bd

      SHA512

      4c7a58ba5681d26acc6df17098bf7bf28d313def544919f0d05d9201835dab07b3012b22cec56a4f8fb04e9698faeb33de5a4d2e36c54d4d05fbb980ae17e8e5

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe

      Filesize

      328KB

      MD5

      372723341529a19f1576557a83b51bff

      SHA1

      1229afd3b03cbe3f11fce844f32b689537ac12bc

      SHA256

      32ef96fcb4e5db03ac6e8582d78670856f53fa284b79d8358ed92c19fc7830b5

      SHA512

      a6adb3e757e99af3a75df367ffc9215ddf7071b563064776268cb90b2a87a50d9b7cfe07ec96dcb2037bedccef61a723d15f8b80b555b28fe4a9dcf41f2d5f58

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\addend.cfg

      Filesize

      53KB

      MD5

      bfe74179086be4de8e0e65dbf314b587

      SHA1

      9975fb7118737282467984f62b83afba1c3a0360

      SHA256

      157e302a955f1655103b132377b6a0bba6da32e605edf14d033c7b65bc981419

      SHA512

      962a941e91c48b0566baa619ebd23e2c8ac59e81bf8b4c055401ad7871937d247e1c133ce036ecd4c30d4188ace30aa3f4d3b9501a5e93423da754ead16ac1df

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\eparchy.odp

      Filesize

      3.5MB

      MD5

      583e08477f17eeea5564b233c5a8e232

      SHA1

      61d221e34e179c1836eb4fd733eed5c4eba5b3e0

      SHA256

      1000efce8e81467bb2b4eedd6ad9a5184c3ce5261e8ba759c61386f06734d37e

      SHA512

      175add4e64bc0cf4c94cbc3d5c52661321d716ace34a787e3c8862b76c30e2557ae1ac32194df1e3c1e1d86a2f67fa6f3429a7f8212aeca7bc7997f04e568902

    • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISBEW64.exe

      Filesize

      178KB

      MD5

      40f3a092744e46f3531a40b917cca81e

      SHA1

      c73f62a44cb3a75933cecf1be73a48d0d623039b

      SHA256

      561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

      SHA512

      1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

    • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\ISRT.dll

      Filesize

      426KB

      MD5

      8af02bf8e358e11caec4f2e7884b43cc

      SHA1

      16badc6c610eeb08de121ab268093dd36b56bf27

      SHA256

      58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

      SHA512

      d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

    • C:\Users\Admin\AppData\Local\Temp\{D5CBB4D8-3466-47AD-AA51-8BA4D9CB597C}\_isres_0x0409.dll

      Filesize

      1.8MB

      MD5

      7de024bc275f9cdeaf66a865e6fd8e58

      SHA1

      5086e4a26f9b80699ea8d9f2a33cead28a1819c0

      SHA256

      bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

      SHA512

      191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

    • memory/2524-37-0x0000000003590000-0x0000000003757000-memory.dmp

      Filesize

      1.8MB

    • memory/2524-32-0x0000000010000000-0x0000000010114000-memory.dmp

      Filesize

      1.1MB

    • memory/4072-80-0x00007FF7C6DE0000-0x00007FF7C7173000-memory.dmp

      Filesize

      3.6MB

    • memory/4072-81-0x00007FF7C6DE0000-0x00007FF7C7173000-memory.dmp

      Filesize

      3.6MB

    • memory/4072-83-0x00007FF7C6DE0000-0x00007FF7C7173000-memory.dmp

      Filesize

      3.6MB

    • memory/4072-84-0x00007FF7C6DE0000-0x00007FF7C7173000-memory.dmp

      Filesize

      3.6MB

    • memory/4744-54-0x00007FFB634E0000-0x00007FFB63540000-memory.dmp

      Filesize

      384KB

    • memory/5716-92-0x00007FFB7ABD0000-0x00007FFB7ADC5000-memory.dmp

      Filesize

      2.0MB

    • memory/6100-66-0x00007FFB634E0000-0x00007FFB63540000-memory.dmp

      Filesize

      384KB

    • memory/6100-78-0x00007FFB634E0000-0x00007FFB63540000-memory.dmp

      Filesize

      384KB