Analysis

  • max time kernel
    104s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2025, 18:16

General

  • Target

    VZSIAQFD.msi

  • Size

    16.2MB

  • MD5

    28ebb047832f05c31200726f63d43a0d

  • SHA1

    c3f4013dc1df6851953672097e7275e4fd2e70f5

  • SHA256

    70715750bf70adf1f646d35e5387d6130eff1c5d4d2b844f198b4116987583fb

  • SHA512

    2dce5e1a8a6ca9fc66717b09c87655f93a01e22c466a6f1dcf23c3d71ddc7e477b80bf7af8572c790bae1136d0c35c827096dfbdc96a362c0cdb348a5a117390

  • SSDEEP

    393216:LUhmCh/nYTWEiwlKRweQW8sJomnXhLhlroxVg4UHXa:YhmChffKsRwHW1RXHaDB

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 9 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\VZSIAQFD.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DAC1B4922410ECCC33445B2D44B91125 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8BF22F94-E3DD-422E-B7AA-A0E0F264DF3B}
        3⤵
        • Executes dropped EXE
        PID:2652
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6132450D-CFED-4E74-9A19-88C0ACDAB736}
        3⤵
        • Executes dropped EXE
        PID:2460
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{50BFC6E8-0392-4F10-84C9-5EDC51FB0F6D}
        3⤵
        • Executes dropped EXE
        PID:1844
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5EF9AEBB-0122-4A46-A152-8EFB094B7156}
        3⤵
        • Executes dropped EXE
        PID:696
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{54CF5EB0-036A-4ACD-862B-D94F912ECE1E}
        3⤵
        • Executes dropped EXE
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{40ACEF11-8B86-4ECC-9686-22638F426861}
        3⤵
        • Executes dropped EXE
        PID:4700
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{94F908CA-2032-4B28-8202-B65569D3CFC2}
        3⤵
        • Executes dropped EXE
        PID:2504
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2C1305B9-B485-4ABE-A86F-208DAD8D6E66}
        3⤵
        • Executes dropped EXE
        PID:3680
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C3D7B26D-2CE7-478C-B50A-E310F1D6F4E9}
        3⤵
        • Executes dropped EXE
        PID:5060
      • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{25FBC817-A190-4838-A959-EE49FBC45B59}
        3⤵
        • Executes dropped EXE
        PID:1632
      • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\CamMenuMaker.exe
        C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\CamMenuMaker.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1040

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI736B.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI75DD.tmp

    Filesize

    2.5MB

    MD5

    d9051b54a9a3a291816691cde3019671

    SHA1

    e0d42c2815097fbca42e936b11a71236e9faad4b

    SHA256

    711757286ba3b55d3995b1ac6a1a954da7a17ac149bd8572dc16f14ef163a3f4

    SHA512

    ec266e8da9046e885814b2b94458dddd31ca82a60645e6b792bd594a5e49a2531f375600be6ac7e469e31eacf8d8e90fc83481779e10083333ec29e84340ebe4

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\CamMenuMaker.exe

    Filesize

    1.1MB

    MD5

    0aa5410c7565c20aebbb56a317e578da

    SHA1

    1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

    SHA256

    88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

    SHA512

    4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\MSVCP100.dll

    Filesize

    411KB

    MD5

    bc83108b18756547013ed443b8cdb31b

    SHA1

    79bcaad3714433e01c7f153b05b781f8d7cb318d

    SHA256

    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

    SHA512

    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\XceedZip.dll

    Filesize

    484KB

    MD5

    882e0b32bbc7babec02c0f84b4bd45e0

    SHA1

    13a9012191b5a59e1e3135c3953e8af63eb1b513

    SHA256

    2d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572

    SHA512

    99e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\individual.csv

    Filesize

    28KB

    MD5

    8ff5c1f15daf464492047ae0ce9a15fe

    SHA1

    b4997420bd9ad0238784e9303110fb635032c7d1

    SHA256

    c49736e735068d25f83b8acf26730371005bc62ab8fc54b2cf4ad49453c44673

    SHA512

    6c84276fb773d660c57cd5d4402ccb62e10fecfb5cc649f3a0ef43a79bf0c91c9366ccb4b1359161868e5eb4cad16a6d3225c45ed7ac255242d3226f43862876

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\mfc100u.dll

    Filesize

    4.2MB

    MD5

    0b9e811890224a5cc3bdc7beaba9a441

    SHA1

    b5429df107e71e78780fa34348a1d2d532e0e435

    SHA256

    65ab60fe5236ae589e1f503f6e8ee68f6af6040aafe533e27caf80069d0036e5

    SHA512

    b58d42bf394a3bfb2d31aa50dd3e087245ac90a066d0634407d8bc6106affecc77a96f18d969d626ff5cfc566d58a6f116f8c3886c9ba61d751887ad960094c1

  • C:\Users\Admin\AppData\Local\Temp\{1A7A0049-70C2-424D-A0D6-9B34C059C921}\quarrel.psd

    Filesize

    6.0MB

    MD5

    aaf96126b78a8916699682a9f3c878da

    SHA1

    72f461840072836716e9740016a57c006457ccf4

    SHA256

    f59cd44eba875140de07f352be1ce4ce1fcdb48ba13fe5350a1f919e1a33b401

    SHA512

    f3abe69f3f0bd5a09acb92d45df627ce8ec4e6c60f7530fe5a2e6f83771b35f5a0803168af9a067d9447c641ae4633d86144a99c10a5541ebb82153b4d242a17

  • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{50FFBFE2-C040-4137-AFDA-1D757B0F377C}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • memory/1040-64-0x0000000072D40000-0x0000000072D8F000-memory.dmp

    Filesize

    316KB

  • memory/1040-65-0x00007FFED1B30000-0x00007FFED1D25000-memory.dmp

    Filesize

    2.0MB

  • memory/1744-41-0x0000000003940000-0x0000000003B07000-memory.dmp

    Filesize

    1.8MB

  • memory/1744-36-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB