← Back to Index

CyberDefenders - MSIXPhish

Created: 08/10/2024 13:46 Last Updated: 31/12/2024 20:24


Category: Threat Intel


Scenario: As a Threat Intelligence Analyst at a major security firm, you play a role in efficiently gathering intel about potential threats. During your work day, an incident responder has provided you with a hash associated with a malicious software installer detected in your organization's network. Your task is to analyze this hash to gather valuable threat intelligence and enhance your organization's defenses.


Questions

Q1: To effectively mitigate the threat, it's important to determine the origin or category of this malware. Can you identify which malware family this sample is associated with to better understand its typical behaviors and associated risks?

8fc6d36e75d3eed14ff47548f0b5905d.png

Since we only got the file hash then we can search it on VirusTotal then we will see that its a hash of msix installer file which is a new type of packaging format that Windows used to deploy application and we can also see that this file was tagged with batloader malware that is a malware that used as a dropper/loader to fetch additional malware/payload from C2 server.

batloader

Q2: It's important to identify the malware's first public appearance to effectively track its history and spread. Can you provide the initial submission date and time of this malware on VirusTotal?

b5b6b410e6fdd4cfa05b0ce86179e41c.png

Go take a look at "Details" tab on VirusTotal then we will see the submission timestamp of this malware.

12-12-2023 18:08:13

Q3: Recognizing a specific MITRE technique employed by the malware helps develop targeted defense strategies. What's the MITRE ID of the technique used by the malware for data collection?

50ee5270deef33ff65c721b0b75ccd4e.png

Go to "Behavior" tab then find "MITRE ATT&CK Tactics and Techniques" section which highlight all MITRE ATT&CK techniques detected by various Sandboxes linked to VirusTotal then we will see that this batloader can also capture keystroke for data collection (T1056)

T1056

Q4: Knowing the names of executable files dropped by the malware aids in detecting and isolating infected machines. What is the executable file name dropped by the malware?

1264151ae1ed39eae4642e6d6d07ed85.png

Lets take a look at "Processes Tree" then we can see that Install.exe must be the executable file that dropped by batloader and conduct some host recon probably to find out that it was being executed under a sandbox or not.

Install.exe

Q5: Continuing on the previous question. Can you identify the name of the second execution parent observed in the wild for the executable discovered?

1014e8534203ac19cc547a43d7ccc35b.png

Go to "Relations" tab to find the pivoting point to Install.exe

20408f06a8ce5b19c0a6c0707071df00.png

Then go to "Relations" tab of Install.exe which we can see that beside Installer.msix we just found then there is one more msix dropped this executable file which is ZoomInstaller.msix highlighting what type of user it was targeting.

ZoomInstaller.msix

Q6: Identifying the domains used in attacks can help block future malicious communication and understand attacker infrastructure. What domain is used by the threat actor to host the illegitimate application installer?

949611711b71036e2f02076c27348554.png

I don't find any domains from "Relations" tab so I checked "Community" tab of Install.exe then we will find that Microsoft referenced this file so we can use that as our next resourses

4cb3df5ee41ba7c5a3469733b8afe7cf.png

Then we will find that many threat actor groups using App installer (msix) as a point of entry but the threat actor that was focused on Zoom Installer is Storm-0569 so we can get the domain from Storm-0569's IOC to answer this question.

scheta.site

Q7: We need to identify the access vector abused by the malware to mitigate it. What protocol handler is exploited by the malware?

fce9045a5874c40a23a8e0a6c338bf07.png

This is a protocol handler (ms-appinstaller://) used by the App Installer application in Windows. It enables users to install MSIX packages directly from a URL, often hosted on a web server or a network location.

ms-appinstaller

Q8: Uncovering the threat actor associated with this malware is key to understanding their tactics, techniques, and procedures (TTPs) and bolstering defenses against future attacks. Can you provide the name of the threat actor?

88d27212b6e85b4093bc7511a002fcfc.png

Storm-0569

60bd969fdc23333a446ec2c3e0723e43.png