Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2025, 07:51

General

  • Target

    XSGYLWGR.msi

  • Size

    7.8MB

  • MD5

    44de92e6a15f94afc69c001b4f201392

  • SHA1

    84277ea8c5f24b98aaaa0df5eded2d23c7b159b1

  • SHA256

    06be76f549d1d97a808e6629f6043a9609d5b59fa14d0e3ee3aa01354ac369d1

  • SHA512

    d467f8faf22f2de115d711a5e138aeefddb43d73b2c22c44aea5cf3804e570c304490d7388ddd7ae031cdb47f15ec15e3c6cfff6b7f3895868475bfef50460a9

  • SSDEEP

    196608:FEb3Cjrhy+g/lSvc26MJuBUYFa2S0j6S6d4+bR7NQXE:KCjc5UJuBUj2a4DXE

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\XSGYLWGR.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2496
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0AA68B4B217EE6267D6D7E838961A0F6 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{749F1EB8-77CC-4729-AA37-63CEF7B6B498}
        3⤵
        • Executes dropped EXE
        PID:3368
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{26D7D166-B53D-4749-82BC-413E1F47E5FB}
        3⤵
        • Executes dropped EXE
        PID:4828
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D00F5E5A-BA99-4943-BFA2-5E727BC93264}
        3⤵
        • Executes dropped EXE
        PID:4672
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{382E0A52-1E4F-43DD-9797-FF1381E5796A}
        3⤵
        • Executes dropped EXE
        PID:4388
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B06D42D0-999B-4BFC-A0EC-470B973F1628}
        3⤵
        • Executes dropped EXE
        PID:4600
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{663CA266-0A00-47F3-8EC8-58AB7A9AF896}
        3⤵
        • Executes dropped EXE
        PID:4660
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{62D8FF75-B6C6-4509-B881-6B05F6F7DC2D}
        3⤵
        • Executes dropped EXE
        PID:2032
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DE25CE74-493A-439B-B4D8-333119138205}
        3⤵
        • Executes dropped EXE
        PID:5280
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0C50015E-DF85-488E-96F6-564A8103593B}
        3⤵
        • Executes dropped EXE
        PID:6072
      • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6D871856-FD93-4733-9955-418A92BA235A}
        3⤵
        • Executes dropped EXE
        PID:1404
      • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:748
        • C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          C:\Users\Admin\AppData\Roaming\browserbg_Wm\Start.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4900
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe
            5⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            PID:4172
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4080
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\System32\cmd.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5896
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe
      2⤵
        PID:1524

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\223a8d7

      Filesize

      3.9MB

      MD5

      eab224e5e0f5040b3efadf3aae0ebbc8

      SHA1

      2b3f509ca20958d5cf733b25f150ec3217ec1fb3

      SHA256

      b8bb5861700ca0aaada98457151915910d8f47f19cba9d618d92aa5f2a171663

      SHA512

      c9514a3ae45bb915b549b2a8723ebae357ff6630ec4bd9fbbb1ebee90dbc87443626f537053876baa4105895c8496620e3f1a717292faec5640614a612771844

    • C:\Users\Admin\AppData\Local\Temp\223a8d7

      Filesize

      3.9MB

      MD5

      b2fbd131320c37d792715ac5480c855d

      SHA1

      e9cba094cda1f1d14d774d66ae7a2be6a063ef3b

      SHA256

      eaa806a9185b9532f2e9d7884480475956017e84f8e2d286060b48e13e8a9bcf

      SHA512

      a69952a96173072c612d622907169fdeb6e68e494446938b089875e5a52769bae91fc3ae09aee214bbfc0322a504da7db79711cec95ebd447cbdb5a1926fffa8

    • C:\Users\Admin\AppData\Local\Temp\MSI80B9.tmp

      Filesize

      171KB

      MD5

      a0e940a3d3c1523416675125e3b0c07e

      SHA1

      2e29eeba6da9a4023bc8071158feee3b0277fd1b

      SHA256

      b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

      SHA512

      736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

    • C:\Users\Admin\AppData\Local\Temp\MSI828F.tmp

      Filesize

      2.5MB

      MD5

      d446b289fa31f8a72b69a3e4835d9962

      SHA1

      e46064ed0a8fa3daee924069e8d7b22ff1856787

      SHA256

      55fd357ce8a5689a7a8507ef7f8e9e94bc517cc1af0a8818e6e883deefa8faad

      SHA512

      6881faacb08acc4020e66a940a384c95e7fa4dee842aeb2bfe8f67cd82aa301f7245a72e283cecd5f1bd4d6ed565b99750e99563574eded4e1c3928cf388be2d

    • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISBEW64.exe

      Filesize

      178KB

      MD5

      40f3a092744e46f3531a40b917cca81e

      SHA1

      c73f62a44cb3a75933cecf1be73a48d0d623039b

      SHA256

      561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

      SHA512

      1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

    • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\ISRT.dll

      Filesize

      426KB

      MD5

      8af02bf8e358e11caec4f2e7884b43cc

      SHA1

      16badc6c610eeb08de121ab268093dd36b56bf27

      SHA256

      58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

      SHA512

      d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

    • C:\Users\Admin\AppData\Local\Temp\{49B92A6C-5641-493B-881B-94AF716839F3}\_isres_0x0409.dll

      Filesize

      1.8MB

      MD5

      7de024bc275f9cdeaf66a865e6fd8e58

      SHA1

      5086e4a26f9b80699ea8d9f2a33cead28a1819c0

      SHA256

      bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

      SHA512

      191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\SbieDll.dll

      Filesize

      856KB

      MD5

      10d91c0cc5ab1808b05f020446fdb3a6

      SHA1

      7741d68b15fbc1be0f79494b2cb58a500cf13103

      SHA256

      b2ee8c65ac2a6989aa84aabb972fea643eeb4457f1bb3d5e6fcb28f5d664f6bd

      SHA512

      4c7a58ba5681d26acc6df17098bf7bf28d313def544919f0d05d9201835dab07b3012b22cec56a4f8fb04e9698faeb33de5a4d2e36c54d4d05fbb980ae17e8e5

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\Start.exe

      Filesize

      328KB

      MD5

      372723341529a19f1576557a83b51bff

      SHA1

      1229afd3b03cbe3f11fce844f32b689537ac12bc

      SHA256

      32ef96fcb4e5db03ac6e8582d78670856f53fa284b79d8358ed92c19fc7830b5

      SHA512

      a6adb3e757e99af3a75df367ffc9215ddf7071b563064776268cb90b2a87a50d9b7cfe07ec96dcb2037bedccef61a723d15f8b80b555b28fe4a9dcf41f2d5f58

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\addend.cfg

      Filesize

      53KB

      MD5

      bfe74179086be4de8e0e65dbf314b587

      SHA1

      9975fb7118737282467984f62b83afba1c3a0360

      SHA256

      157e302a955f1655103b132377b6a0bba6da32e605edf14d033c7b65bc981419

      SHA512

      962a941e91c48b0566baa619ebd23e2c8ac59e81bf8b4c055401ad7871937d247e1c133ce036ecd4c30d4188ace30aa3f4d3b9501a5e93423da754ead16ac1df

    • C:\Users\Admin\AppData\Local\Temp\{5E22CACA-B5C7-4A23-93AF-34FA93D224D7}\eparchy.odp

      Filesize

      3.5MB

      MD5

      583e08477f17eeea5564b233c5a8e232

      SHA1

      61d221e34e179c1836eb4fd733eed5c4eba5b3e0

      SHA256

      1000efce8e81467bb2b4eedd6ad9a5184c3ce5261e8ba759c61386f06734d37e

      SHA512

      175add4e64bc0cf4c94cbc3d5c52661321d716ace34a787e3c8862b76c30e2557ae1ac32194df1e3c1e1d86a2f67fa6f3429a7f8212aeca7bc7997f04e568902

    • memory/748-54-0x00007FFD30910000-0x00007FFD30970000-memory.dmp

      Filesize

      384KB

    • memory/1912-37-0x0000000002A50000-0x0000000002C17000-memory.dmp

      Filesize

      1.8MB

    • memory/1912-32-0x0000000010000000-0x0000000010114000-memory.dmp

      Filesize

      1.1MB

    • memory/4080-92-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

      Filesize

      2.0MB

    • memory/4172-80-0x00007FF650A50000-0x00007FF650DE3000-memory.dmp

      Filesize

      3.6MB

    • memory/4172-81-0x00007FF650A50000-0x00007FF650DE3000-memory.dmp

      Filesize

      3.6MB

    • memory/4172-83-0x00007FF650A50000-0x00007FF650DE3000-memory.dmp

      Filesize

      3.6MB

    • memory/4172-84-0x00007FF650A50000-0x00007FF650DE3000-memory.dmp

      Filesize

      3.6MB

    • memory/4900-78-0x00007FFD311A0000-0x00007FFD31200000-memory.dmp

      Filesize

      384KB

    • memory/4900-76-0x00007FFD311A0000-0x00007FFD31200000-memory.dmp

      Filesize

      384KB