Analysis
-
max time kernel
55s -
max time network
45s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
21-11-2020 16:03
Static task
static1
Behavioral task
behavioral1
Sample
534867_DOCTOURElC.msi
Resource
win10v20201028
Behavioral task
behavioral2
Sample
534867_DOCTOURElC.msi
Resource
win10v20201028
General
-
Target
534867_DOCTOURElC.msi
-
Size
9.8MB
-
MD5
bf69b794fe2b921f1cbafd3ec1e6c733
-
SHA1
22464766695801e76be5b86978a57c3d7bc3c9be
-
SHA256
dacf7e5ad5c8d564f185a961faa76018f2ba3c43dfcda03b33546bbbeb78d9fc
-
SHA512
b33a8d903fe6e474424b3c0a1212b10df35cfb4784c9289f29b4f408b530c936c8c7a14b8dc213fd983668e368997fd932131b07334c41bd2d3129cefc383b46
Malware Config
Signatures
-
Blacklisted process makes network request 6 IoCs
Processes:
MsiExec.exeflow pid process 12 3224 MsiExec.exe 13 3224 MsiExec.exe 15 3224 MsiExec.exe 17 3224 MsiExec.exe 19 3224 MsiExec.exe 20 3224 MsiExec.exe -
Loads dropped DLL 4 IoCs
Processes:
MsiExec.exepid process 3224 MsiExec.exe 3224 MsiExec.exe 3224 MsiExec.exe 3224 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI86E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E3D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f74860e.msi msiexec.exe File opened for modification C:\Windows\Installer\f74860e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{B9336F0D-359B-45BE-BF2A-8661F790585D} msiexec.exe File opened for modification C:\Windows\Installer\MSI9061.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI90A0.tmp msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2100 3224 WerFault.exe MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
msiexec.exeWerFault.exepid process 696 msiexec.exe 696 msiexec.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
msiexec.exemsiexec.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 580 msiexec.exe Token: SeIncreaseQuotaPrivilege 580 msiexec.exe Token: SeSecurityPrivilege 696 msiexec.exe Token: SeCreateTokenPrivilege 580 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 580 msiexec.exe Token: SeLockMemoryPrivilege 580 msiexec.exe Token: SeIncreaseQuotaPrivilege 580 msiexec.exe Token: SeMachineAccountPrivilege 580 msiexec.exe Token: SeTcbPrivilege 580 msiexec.exe Token: SeSecurityPrivilege 580 msiexec.exe Token: SeTakeOwnershipPrivilege 580 msiexec.exe Token: SeLoadDriverPrivilege 580 msiexec.exe Token: SeSystemProfilePrivilege 580 msiexec.exe Token: SeSystemtimePrivilege 580 msiexec.exe Token: SeProfSingleProcessPrivilege 580 msiexec.exe Token: SeIncBasePriorityPrivilege 580 msiexec.exe Token: SeCreatePagefilePrivilege 580 msiexec.exe Token: SeCreatePermanentPrivilege 580 msiexec.exe Token: SeBackupPrivilege 580 msiexec.exe Token: SeRestorePrivilege 580 msiexec.exe Token: SeShutdownPrivilege 580 msiexec.exe Token: SeDebugPrivilege 580 msiexec.exe Token: SeAuditPrivilege 580 msiexec.exe Token: SeSystemEnvironmentPrivilege 580 msiexec.exe Token: SeChangeNotifyPrivilege 580 msiexec.exe Token: SeRemoteShutdownPrivilege 580 msiexec.exe Token: SeUndockPrivilege 580 msiexec.exe Token: SeSyncAgentPrivilege 580 msiexec.exe Token: SeEnableDelegationPrivilege 580 msiexec.exe Token: SeManageVolumePrivilege 580 msiexec.exe Token: SeImpersonatePrivilege 580 msiexec.exe Token: SeCreateGlobalPrivilege 580 msiexec.exe Token: SeRestorePrivilege 696 msiexec.exe Token: SeTakeOwnershipPrivilege 696 msiexec.exe Token: SeRestorePrivilege 696 msiexec.exe Token: SeTakeOwnershipPrivilege 696 msiexec.exe Token: SeRestorePrivilege 696 msiexec.exe Token: SeTakeOwnershipPrivilege 696 msiexec.exe Token: SeRestorePrivilege 696 msiexec.exe Token: SeTakeOwnershipPrivilege 696 msiexec.exe Token: SeRestorePrivilege 696 msiexec.exe Token: SeTakeOwnershipPrivilege 696 msiexec.exe Token: SeRestorePrivilege 2100 WerFault.exe Token: SeBackupPrivilege 2100 WerFault.exe Token: SeDebugPrivilege 2100 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 580 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
msiexec.exedescription pid process target process PID 696 wrote to memory of 3224 696 msiexec.exe MsiExec.exe PID 696 wrote to memory of 3224 696 msiexec.exe MsiExec.exe PID 696 wrote to memory of 3224 696 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\534867_DOCTOURElC.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F2E629DEE0E4D33C373AB358281811122⤵
- Blacklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 18723⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Installer\MSI86E9.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
C:\Windows\Installer\MSI8E3D.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
C:\Windows\Installer\MSI90A0.tmpMD5
075c6a47cc7dc05ef47baae76c9a516b
SHA170d45bfd7a2d76ff3a9e4b845a51b763e1071cfb
SHA2562bccb444b918328bb593b8dbdd5f47f6ec9bc67597f967cb00dea4eca2e51ee9
SHA51219adc94af5e0fde7f9f7619b452d7e3530326a2dccafd7f72c7d4b46dbbe50c29ed7489cb2e7a3ae84325ba03976423461209dfdc078d7fd5f54bb464578c63f
-
\Windows\Installer\MSI86E9.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
\Windows\Installer\MSI8E3D.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
\Windows\Installer\MSI90A0.tmpMD5
075c6a47cc7dc05ef47baae76c9a516b
SHA170d45bfd7a2d76ff3a9e4b845a51b763e1071cfb
SHA2562bccb444b918328bb593b8dbdd5f47f6ec9bc67597f967cb00dea4eca2e51ee9
SHA51219adc94af5e0fde7f9f7619b452d7e3530326a2dccafd7f72c7d4b46dbbe50c29ed7489cb2e7a3ae84325ba03976423461209dfdc078d7fd5f54bb464578c63f
-
\Windows\Installer\MSI90A0.tmpMD5
075c6a47cc7dc05ef47baae76c9a516b
SHA170d45bfd7a2d76ff3a9e4b845a51b763e1071cfb
SHA2562bccb444b918328bb593b8dbdd5f47f6ec9bc67597f967cb00dea4eca2e51ee9
SHA51219adc94af5e0fde7f9f7619b452d7e3530326a2dccafd7f72c7d4b46dbbe50c29ed7489cb2e7a3ae84325ba03976423461209dfdc078d7fd5f54bb464578c63f
-
memory/2100-22-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/2100-8-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/3224-13-0x0000000000000000-mapping.dmp
-
memory/3224-16-0x0000000000000000-mapping.dmp
-
memory/3224-12-0x0000000000000000-mapping.dmp
-
memory/3224-0-0x0000000000000000-mapping.dmp
-
memory/3224-10-0x0000000000000000-mapping.dmp
-
memory/3224-14-0x0000000000000000-mapping.dmp
-
memory/3224-15-0x0000000000000000-mapping.dmp
-
memory/3224-9-0x0000000000000000-mapping.dmp
-
memory/3224-17-0x0000000000000000-mapping.dmp
-
memory/3224-18-0x0000000000000000-mapping.dmp
-
memory/3224-19-0x0000000000000000-mapping.dmp
-
memory/3224-20-0x0000000000000000-mapping.dmp
-
memory/3224-21-0x0000000000000000-mapping.dmp
-
memory/3224-11-0x0000000000000000-mapping.dmp
-
memory/3224-23-0x0000000000000000-mapping.dmp