Analysis
-
max time kernel
110s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-12-2020 13:59
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi
-
Size
1.4MB
-
MD5
51eeaf033e56b912d13f740622ac569e
-
SHA1
ed8e79309b8f6f23a4be78887dc9d152a920db3f
-
SHA256
bd5f45a2f5041f25bbbe91246c7c17acbd0cdd07dfed47df892240c59a04dd28
-
SHA512
19b37cb4f59d6b4d5d26ea5a44b4e9344acb1f5275d7cc953a64605f29414e429fcc77cd9088e132c3c61a68e3082567d2321db873e664434cb9571ba8c52b57
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1968 MsiExec.exe 1968 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1068 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 92 IoCs
description pid Process Token: SeShutdownPrivilege 1068 msiexec.exe Token: SeIncreaseQuotaPrivilege 1068 msiexec.exe Token: SeRestorePrivilege 1728 msiexec.exe Token: SeTakeOwnershipPrivilege 1728 msiexec.exe Token: SeSecurityPrivilege 1728 msiexec.exe Token: SeCreateTokenPrivilege 1068 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1068 msiexec.exe Token: SeLockMemoryPrivilege 1068 msiexec.exe Token: SeIncreaseQuotaPrivilege 1068 msiexec.exe Token: SeMachineAccountPrivilege 1068 msiexec.exe Token: SeTcbPrivilege 1068 msiexec.exe Token: SeSecurityPrivilege 1068 msiexec.exe Token: SeTakeOwnershipPrivilege 1068 msiexec.exe Token: SeLoadDriverPrivilege 1068 msiexec.exe Token: SeSystemProfilePrivilege 1068 msiexec.exe Token: SeSystemtimePrivilege 1068 msiexec.exe Token: SeProfSingleProcessPrivilege 1068 msiexec.exe Token: SeIncBasePriorityPrivilege 1068 msiexec.exe Token: SeCreatePagefilePrivilege 1068 msiexec.exe Token: SeCreatePermanentPrivilege 1068 msiexec.exe Token: SeBackupPrivilege 1068 msiexec.exe Token: SeRestorePrivilege 1068 msiexec.exe Token: SeShutdownPrivilege 1068 msiexec.exe Token: SeDebugPrivilege 1068 msiexec.exe Token: SeAuditPrivilege 1068 msiexec.exe Token: SeSystemEnvironmentPrivilege 1068 msiexec.exe Token: SeChangeNotifyPrivilege 1068 msiexec.exe Token: SeRemoteShutdownPrivilege 1068 msiexec.exe Token: SeUndockPrivilege 1068 msiexec.exe Token: SeSyncAgentPrivilege 1068 msiexec.exe Token: SeEnableDelegationPrivilege 1068 msiexec.exe Token: SeManageVolumePrivilege 1068 msiexec.exe Token: SeImpersonatePrivilege 1068 msiexec.exe Token: SeCreateGlobalPrivilege 1068 msiexec.exe Token: SeCreateTokenPrivilege 1068 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1068 msiexec.exe Token: SeLockMemoryPrivilege 1068 msiexec.exe Token: SeIncreaseQuotaPrivilege 1068 msiexec.exe Token: SeMachineAccountPrivilege 1068 msiexec.exe Token: SeTcbPrivilege 1068 msiexec.exe Token: SeSecurityPrivilege 1068 msiexec.exe Token: SeTakeOwnershipPrivilege 1068 msiexec.exe Token: SeLoadDriverPrivilege 1068 msiexec.exe Token: SeSystemProfilePrivilege 1068 msiexec.exe Token: SeSystemtimePrivilege 1068 msiexec.exe Token: SeProfSingleProcessPrivilege 1068 msiexec.exe Token: SeIncBasePriorityPrivilege 1068 msiexec.exe Token: SeCreatePagefilePrivilege 1068 msiexec.exe Token: SeCreatePermanentPrivilege 1068 msiexec.exe Token: SeBackupPrivilege 1068 msiexec.exe Token: SeRestorePrivilege 1068 msiexec.exe Token: SeShutdownPrivilege 1068 msiexec.exe Token: SeDebugPrivilege 1068 msiexec.exe Token: SeAuditPrivilege 1068 msiexec.exe Token: SeSystemEnvironmentPrivilege 1068 msiexec.exe Token: SeChangeNotifyPrivilege 1068 msiexec.exe Token: SeRemoteShutdownPrivilege 1068 msiexec.exe Token: SeUndockPrivilege 1068 msiexec.exe Token: SeSyncAgentPrivilege 1068 msiexec.exe Token: SeEnableDelegationPrivilege 1068 msiexec.exe Token: SeManageVolumePrivilege 1068 msiexec.exe Token: SeImpersonatePrivilege 1068 msiexec.exe Token: SeCreateGlobalPrivilege 1068 msiexec.exe Token: SeCreateTokenPrivilege 1068 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1068 msiexec.exe Token: SeLockMemoryPrivilege 1068 msiexec.exe Token: SeIncreaseQuotaPrivilege 1068 msiexec.exe Token: SeMachineAccountPrivilege 1068 msiexec.exe Token: SeTcbPrivilege 1068 msiexec.exe Token: SeSecurityPrivilege 1068 msiexec.exe Token: SeTakeOwnershipPrivilege 1068 msiexec.exe Token: SeLoadDriverPrivilege 1068 msiexec.exe Token: SeSystemProfilePrivilege 1068 msiexec.exe Token: SeSystemtimePrivilege 1068 msiexec.exe Token: SeProfSingleProcessPrivilege 1068 msiexec.exe Token: SeIncBasePriorityPrivilege 1068 msiexec.exe Token: SeCreatePagefilePrivilege 1068 msiexec.exe Token: SeCreatePermanentPrivilege 1068 msiexec.exe Token: SeBackupPrivilege 1068 msiexec.exe Token: SeRestorePrivilege 1068 msiexec.exe Token: SeShutdownPrivilege 1068 msiexec.exe Token: SeDebugPrivilege 1068 msiexec.exe Token: SeAuditPrivilege 1068 msiexec.exe Token: SeSystemEnvironmentPrivilege 1068 msiexec.exe Token: SeChangeNotifyPrivilege 1068 msiexec.exe Token: SeRemoteShutdownPrivilege 1068 msiexec.exe Token: SeUndockPrivilege 1068 msiexec.exe Token: SeSyncAgentPrivilege 1068 msiexec.exe Token: SeEnableDelegationPrivilege 1068 msiexec.exe Token: SeManageVolumePrivilege 1068 msiexec.exe Token: SeImpersonatePrivilege 1068 msiexec.exe Token: SeCreateGlobalPrivilege 1068 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1068 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27 PID 1728 wrote to memory of 1968 1728 msiexec.exe 27
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.21370.28818.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1068
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3163B2DB3876CF3C814E5E0E59DF49F4 C2⤵
- Loads dropped DLL
PID:1968
-