Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 13:11

General

  • Target

    msi (18).msi

  • Size

    17.1MB

  • MD5

    b2610cf607f63b0fcaaa7cf472c05c6d

  • SHA1

    2f5de11ebbe3830fcd23622e70bf647521b4636f

  • SHA256

    0043d411ad7cd395c30e7de7e2497a1b0b117bb2878810865518854a8faf07e6

  • SHA512

    931831d95f8c19246d5bb1b9075cea0ab00df39859b90a7b61257bf69ff6540aff0e92257de9e7e29102e89ab557da11878cefc6f807734bef0e5ed9e6053be4

  • SSDEEP

    196608:YsnQvuxA5XD648nD7xWdiFZenspOujIi5Zvnk28MellrugS6c46xcS7qvXn:/Qvuu524UfxZZqUOKZs28But4i0Xn

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (18).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2EBF8E17A2539593678154012E273365 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3700
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7053D9AB-8A77-477D-8A3F-9620479772BA}
        3⤵
        • Executes dropped EXE
        PID:4448
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{637024EA-2EFC-47D7-89ED-15A77AE899BB}
        3⤵
        • Executes dropped EXE
        PID:4748
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F48C7BD7-8A24-48FF-8D93-EA4098E31B2D}
        3⤵
        • Executes dropped EXE
        PID:4772
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0D40A27A-D303-43CF-A95B-2C3269968497}
        3⤵
        • Executes dropped EXE
        PID:4728
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C8B15856-35A6-4F12-8D8D-1F1FEE8AE49F}
        3⤵
        • Executes dropped EXE
        PID:1940
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4EA864E9-9CC9-4F8A-901B-486B3685FBE8}
        3⤵
        • Executes dropped EXE
        PID:4076
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1469D58B-DC9F-4AC1-A426-5576546648D1}
        3⤵
        • Executes dropped EXE
        PID:4856
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D764CD00-0FFD-44D1-BCA9-CD889B759886}
        3⤵
        • Executes dropped EXE
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CCF26205-6E53-40C6-AA9E-17521448BFBE}
        3⤵
        • Executes dropped EXE
        PID:5936
      • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{64AED7A9-539C-4A54-A607-C74D5B1C3A1A}
        3⤵
        • Executes dropped EXE
        PID:1132
      • C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\WiseTurbo.exe
        C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\WiseTurbo.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5976
        • C:\Users\Admin\AppData\Roaming\Scanauth_LPD_v5\WiseTurbo.exe
          C:\Users\Admin\AppData\Roaming\Scanauth_LPD_v5\WiseTurbo.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:5464
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:808
            • C:\Users\Admin\AppData\Local\Temp\Serviceconfigv2.exe
              C:\Users\Admin\AppData\Local\Temp\Serviceconfigv2.exe
              6⤵
              • Loads dropped DLL
              PID:3576

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI4798.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI4A58.tmp

    Filesize

    2.5MB

    MD5

    61a874440bf7ffb7dc72e678dc167775

    SHA1

    f0a443eb49f01ec507558c31210b3f3e6d222bb2

    SHA256

    b2cd535e0802f540119cfa8ecdd688c08429a7978ecfaaa2ee630f8521ec79a9

    SHA512

    6db4717d7ff0d450f4a74ba8d11439e0ff13bc6a846b40c4026d2bb83fba40bb3fb4ddcf2e868de5d7c26f9b7c56ff1246e59726c823c276a5c98f91dd7633c5

  • C:\Users\Admin\AppData\Local\Temp\Serviceconfigv2.exe

    Filesize

    2.3MB

    MD5

    967f4470627f823f4d7981e511c9824f

    SHA1

    416501b096df80ddc49f4144c3832cf2cadb9cb2

    SHA256

    b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

    SHA512

    8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

  • C:\Users\Admin\AppData\Local\Temp\ba15c319

    Filesize

    5.3MB

    MD5

    3a9b54e4a73b593b7974388991aa3ccd

    SHA1

    1a1c5963be87f595c67b31dc0fbe1f4a1ab15906

    SHA256

    7218ac0578cb88830597614ef1d709f98442d1a142a7970cbd1e1c766fc46f59

    SHA512

    d386fa269d229b91064ca220604c6de63b8d3ebb4da9b25f8f6279d254ca64a387bf579926cc92c23b0d30db9c30079bde253d4ae4903a7595a06d8bd0da5c4b

  • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{C1AD83D1-BB94-47CC-B32F-4D4CE6E8DA13}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\WiseTurbo.exe

    Filesize

    8.7MB

    MD5

    1f166f5c76eb155d44dd1bf160f37a6a

    SHA1

    cd6f7aa931d3193023f2e23a1f2716516ca3708c

    SHA256

    2d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588

    SHA512

    38ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7

  • C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\psalm.dwg

    Filesize

    33KB

    MD5

    58bca0bf2d20e5b6c0490cadf0b21876

    SHA1

    154ea6a0bc8157417155e78db1b679be9271d54d

    SHA256

    08ee073853ad21340286877855b764a1187cc37a795566ca525bf5ad8d27ce43

    SHA512

    9c8dad04e91c1e2d2073e1c8667095a1764b78ee648fc82926ee8ec20077c2b16d13d1e5596e62387382b76798a146a48b29096993eb08cb5f615e17f714cca5

  • C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\sqlite3.dll

    Filesize

    882KB

    MD5

    06c1dc23f50776914292d1276fa8f180

    SHA1

    8b2bf719f0b671afc458c2674b0e6928945cbb70

    SHA256

    f45b018f9c994b57bc51d02adc4683eee1bb8b6ab7969d881923741a66ecefba

    SHA512

    e7ac556cd9e6290e0050cb41da9ea982f3ee16d5971d675d991f31380fb47fd8488d5c9292ed8b52cb857497e1ceb664e480864f85b8fc2840681432ffe0083d

  • C:\Users\Admin\AppData\Local\Temp\{D098A501-9AD7-4EE8-9B8C-0DEDC225DD72}\swamp.docx

    Filesize

    4.3MB

    MD5

    ccd436bcd03718d7ea97a3b4efbcb844

    SHA1

    1aeccf4bcc7eb43418b0a3881802d2ea98ef3198

    SHA256

    1d9bb31060954c61dc6627bfd1247a8a216e34fcf7c14614cb7ec350240d2533

    SHA512

    39e5ffc774b4bfd82316318fb6fad7ab5c275ed5962365829fb677fb68de038880384cced26bd3468daf829d088065fc6728fbe39195fb95b346dc70fdc5faef

  • memory/808-87-0x0000000073570000-0x00000000736EB000-memory.dmp

    Filesize

    1.5MB

  • memory/808-83-0x00007FFD7D630000-0x00007FFD7D825000-memory.dmp

    Filesize

    2.0MB

  • memory/3576-98-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-103-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-114-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-112-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-111-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-110-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-109-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-108-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-102-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-94-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3576-95-0x00007FF642BD0000-0x00007FF642ECF000-memory.dmp

    Filesize

    3.0MB

  • memory/3700-32-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/3700-37-0x0000000002D00000-0x0000000002EC7000-memory.dmp

    Filesize

    1.8MB

  • memory/5464-67-0x0000000073570000-0x00000000736EB000-memory.dmp

    Filesize

    1.5MB

  • memory/5464-81-0x0000000000400000-0x0000000000D48000-memory.dmp

    Filesize

    9.3MB

  • memory/5464-79-0x0000000073570000-0x00000000736EB000-memory.dmp

    Filesize

    1.5MB

  • memory/5464-78-0x00007FFD7D630000-0x00007FFD7D825000-memory.dmp

    Filesize

    2.0MB

  • memory/5976-53-0x0000000073570000-0x00000000736EB000-memory.dmp

    Filesize

    1.5MB

  • memory/5976-54-0x00007FFD7D630000-0x00007FFD7D825000-memory.dmp

    Filesize

    2.0MB

  • memory/5976-62-0x0000000000400000-0x0000000000D48000-memory.dmp

    Filesize

    9.3MB