Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 13:11

General

  • Target

    msi (12).msi

  • Size

    9.5MB

  • MD5

    a5a0fd7291ac3a018c1325a90ffb6390

  • SHA1

    1dedabe3bd3bf53e8a449113ac51fa362e8b61cc

  • SHA256

    0622447ec83737692036bdc44f45326a48a1230b4f545b64968a4d9355114938

  • SHA512

    6336b368b7f6a46ada04e2e4f003433ab462ed4518941d07cc7495e3c363e0beb08de0d05c760ed77dc20ead823c44622027222249d8978e8c795e3727f2c543

  • SSDEEP

    196608:SGl2dXDavUGqDR/o+4zlOw3JFUS6+4hCcCkve0XO:+V+8GqD1o+4zlOc34BvbXO

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (12).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3520
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 45494FE5863B1548357DD475826569E6 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0E6A61DE-ABB3-40C0-9EBB-FDE8B80F9E5C}
        3⤵
        • Executes dropped EXE
        PID:3752
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{91C0F97D-05D1-4B7F-9BC7-2AEDFD9E2F1A}
        3⤵
        • Executes dropped EXE
        PID:3528
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BB7DA4C3-B275-434A-8B30-0F150B613094}
        3⤵
        • Executes dropped EXE
        PID:1344
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A0F1039C-3C10-4465-AEB3-5650769C1AC1}
        3⤵
        • Executes dropped EXE
        PID:3524
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F8E9F195-315F-4758-9628-C9B15A80A8F6}
        3⤵
        • Executes dropped EXE
        PID:4736
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8D6E5F36-AED1-4CB9-9529-2A5C05610A61}
        3⤵
        • Executes dropped EXE
        PID:5008
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8EB0D929-CE8C-47C4-A9E8-3C1BE09A9A56}
        3⤵
        • Executes dropped EXE
        PID:5696
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B6F7CF0E-601A-4019-A672-FD69F00CFDD3}
        3⤵
        • Executes dropped EXE
        PID:1748
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{477B1584-66C0-4A28-862A-506CCEF7FC9C}
        3⤵
        • Executes dropped EXE
        PID:1168
      • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{30C3BD48-8752-4E45-BD7B-0BC45706921D}
        3⤵
        • Executes dropped EXE
        PID:2380
      • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\SplashWin.exe
        C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\SplashWin.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Users\Admin\AppData\Roaming\NI_download\SplashWin.exe
          C:\Users\Admin\AppData\Roaming\NI_download\SplashWin.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:5056
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Local\Temp\Svcsuper.exe
              C:\Users\Admin\AppData\Local\Temp\Svcsuper.exe
              6⤵
              • Loads dropped DLL
              PID:3348

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI7E77.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI806C.tmp

    Filesize

    2.5MB

    MD5

    2f927997cfe930c6e0971572d913480b

    SHA1

    66b9b48d9b54971af7d3e6772a3a88cf7417e209

    SHA256

    5bf0a9098b60f5ff90d242a6a7e09adc3be5e832171dbf36d17e43177c3a3bf1

    SHA512

    5255b354f998159a39cadcd4759ca34aaf1badec098c0266b26f13acc2b0195a253cea370268555c6167ae3b01b3d918a56d4afe2b1dfba7eb95c49960a5dd03

  • C:\Users\Admin\AppData\Local\Temp\Svcsuper.exe

    Filesize

    2.3MB

    MD5

    967f4470627f823f4d7981e511c9824f

    SHA1

    416501b096df80ddc49f4144c3832cf2cadb9cb2

    SHA256

    b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

    SHA512

    8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

  • C:\Users\Admin\AppData\Local\Temp\fd8ba812

    Filesize

    5.6MB

    MD5

    9d2dc53a79f30c3d882596e90a7c0de1

    SHA1

    2aa67e01ff2e978f4c448466efc9e381296c7fad

    SHA256

    8385ed170bd149365afb3fe99160eb407de188a5b13c2ca6f6efbd5ad151e70f

    SHA512

    d28d154d538fb3a1e3f92d2da9b0fed36e1b6978949f677f4b68c42466e93357d012da7d73dfe9c2754996c66705a1068f8e1235b1e80e7a4c3b79ab42bd7d70

  • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{1B4D9F90-A05F-455B-92C4-A43A5AA9CA29}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\DuiLib_u.dll

    Filesize

    840KB

    MD5

    e3c87800fbfcfa74c6e71f0ac0dcc129

    SHA1

    f795978c904418d2fa954a9d8f81f9dbdcac3870

    SHA256

    2613c5b224769fd099789b1881a3e828e3f115f5ce2cd6c24c40a1be2fe2f32b

    SHA512

    8e30c90fb34874e8f1954f29b15d879e1b89c1afb96ffdccdf0d30e979a39e8393cc24275c6b1bcd4e1ab125551c13de5c8fdc7e15ecffb98a2cb27a8b876239

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\MSVCP140.dll

    Filesize

    437KB

    MD5

    e9f00dd8746712610706cbeffd8df0bd

    SHA1

    5004d98c89a40ebf35f51407553e38e5ca16fb98

    SHA256

    4cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97

    SHA512

    4d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\SplashWin.exe

    Filesize

    446KB

    MD5

    4d20b83562eec3660e45027ad56fb444

    SHA1

    ff6134c34500a8f8e5881e6a34263e5796f83667

    SHA256

    c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

    SHA512

    718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    a554e4f1addc0c2c4ebb93d66b790796

    SHA1

    9fbd1d222da47240db92cd6c50625eb0cf650f61

    SHA256

    e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a

    SHA512

    5f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\filth.pkg

    Filesize

    62KB

    MD5

    f3b2d53f26eab62fcc4de2a0d3457b58

    SHA1

    5cf7c88a51ab8c9de0b9acec8b58fcf43522355d

    SHA256

    5315bfde02a24e0c82206464df6517a9fdab5582e3646cc9f81cca96099f37ad

    SHA512

    fc177195c3f8e9b3cc94e1d273c4388aac047a12c0535219417357180a25641f1b59c05d169e86462cecf2d4ea65b922b3ebdd245486be6c6e9aff2df76640b9

  • C:\Users\Admin\AppData\Local\Temp\{AD1F90DD-6E1E-4384-9A28-2AF72AB8DC1F}\sailor.dmg

    Filesize

    4.5MB

    MD5

    cdaf4b9c7f14f4cbbc72d087e4f98c0a

    SHA1

    e1618542f52b3484d16fbcb7001ed6cd0804482b

    SHA256

    c937fea8ded924a1684acc7c8f36546c311101fc60e7c7bada1c33f24d8a5f63

    SHA512

    232b8ed002d3b70287d7dbd4cc1dafcf4b749666282b12c2bc0e0843e209e49a97d05d86fffd5dfe3db1054ae497e9f544ee10d3c77bab52076c564b9fd2f964

  • memory/1992-97-0x0000000075200000-0x000000007537B000-memory.dmp

    Filesize

    1.5MB

  • memory/1992-94-0x00007FF843090000-0x00007FF843285000-memory.dmp

    Filesize

    2.0MB

  • memory/3064-39-0x0000000003650000-0x0000000003817000-memory.dmp

    Filesize

    1.8MB

  • memory/3064-34-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/3348-106-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-115-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-125-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-124-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-123-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-104-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-105-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-122-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-113-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-121-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-118-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-119-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/3348-120-0x00007FF70FB90000-0x00007FF70FEDE000-memory.dmp

    Filesize

    3.3MB

  • memory/5056-91-0x0000000075200000-0x000000007537B000-memory.dmp

    Filesize

    1.5MB

  • memory/5056-89-0x0000000075200000-0x000000007537B000-memory.dmp

    Filesize

    1.5MB

  • memory/5056-90-0x00007FF843090000-0x00007FF843285000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-60-0x0000000073B70000-0x0000000073CEB000-memory.dmp

    Filesize

    1.5MB

  • memory/5112-61-0x00007FF843090000-0x00007FF843285000-memory.dmp

    Filesize

    2.0MB