Analysis
-
max time kernel
29s -
max time network
18s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:48
Static task
static1
Behavioral task
behavioral1
Sample
DOC-49B8OP200.msi
Resource
win7v20201028
Behavioral task
behavioral2
Sample
DOC-49B8OP200.msi
Resource
win10v20201028
General
-
Target
DOC-49B8OP200.msi
-
Size
1015KB
-
MD5
472a5b55e3ffd9c7e3f3b355bf7cae40
-
SHA1
cf26c9f79529c897cd76fec9270d4ead9c235aa1
-
SHA256
a54fe8044d12684b941ada860b515252623e9ddc1ae880ad370320fc0c2d5947
-
SHA512
e7ce58cce7c899afde04f1f47cd78283edcb876d5bbb70c2dd9b03df9be6bc14abec3066968e5d4e8ceefe656ebf99cd04ab0da61be8a33ecc4ef06bda2b9a5f
Malware Config
Signatures
-
Blocklisted process makes network request 28 IoCs
Processes:
MsiExec.exeflow pid process 6 1984 MsiExec.exe 7 1984 MsiExec.exe 8 1984 MsiExec.exe 9 1984 MsiExec.exe 10 1984 MsiExec.exe 11 1984 MsiExec.exe 12 1984 MsiExec.exe 13 1984 MsiExec.exe 14 1984 MsiExec.exe 15 1984 MsiExec.exe 16 1984 MsiExec.exe 17 1984 MsiExec.exe 18 1984 MsiExec.exe 20 1984 MsiExec.exe 21 1984 MsiExec.exe 22 1984 MsiExec.exe 23 1984 MsiExec.exe 24 1984 MsiExec.exe 25 1984 MsiExec.exe 26 1984 MsiExec.exe 27 1984 MsiExec.exe 28 1984 MsiExec.exe 29 1984 MsiExec.exe 30 1984 MsiExec.exe 31 1984 MsiExec.exe 33 1984 MsiExec.exe 34 1984 MsiExec.exe 35 1984 MsiExec.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exepid process 1984 MsiExec.exe 1984 MsiExec.exe 1984 MsiExec.exe 1984 MsiExec.exe 1984 MsiExec.exe 1984 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\f743746.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3C38.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3F25.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3F74.tmp msiexec.exe File opened for modification C:\Windows\Installer\f743748.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI4051.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9A44.tmp msiexec.exe File created C:\Windows\Installer\f743746.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI37E2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3BC9.tmp msiexec.exe File created C:\Windows\Installer\f743748.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 1808 msiexec.exe 1808 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 868 msiexec.exe Token: SeIncreaseQuotaPrivilege 868 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeSecurityPrivilege 1808 msiexec.exe Token: SeCreateTokenPrivilege 868 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 868 msiexec.exe Token: SeLockMemoryPrivilege 868 msiexec.exe Token: SeIncreaseQuotaPrivilege 868 msiexec.exe Token: SeMachineAccountPrivilege 868 msiexec.exe Token: SeTcbPrivilege 868 msiexec.exe Token: SeSecurityPrivilege 868 msiexec.exe Token: SeTakeOwnershipPrivilege 868 msiexec.exe Token: SeLoadDriverPrivilege 868 msiexec.exe Token: SeSystemProfilePrivilege 868 msiexec.exe Token: SeSystemtimePrivilege 868 msiexec.exe Token: SeProfSingleProcessPrivilege 868 msiexec.exe Token: SeIncBasePriorityPrivilege 868 msiexec.exe Token: SeCreatePagefilePrivilege 868 msiexec.exe Token: SeCreatePermanentPrivilege 868 msiexec.exe Token: SeBackupPrivilege 868 msiexec.exe Token: SeRestorePrivilege 868 msiexec.exe Token: SeShutdownPrivilege 868 msiexec.exe Token: SeDebugPrivilege 868 msiexec.exe Token: SeAuditPrivilege 868 msiexec.exe Token: SeSystemEnvironmentPrivilege 868 msiexec.exe Token: SeChangeNotifyPrivilege 868 msiexec.exe Token: SeRemoteShutdownPrivilege 868 msiexec.exe Token: SeUndockPrivilege 868 msiexec.exe Token: SeSyncAgentPrivilege 868 msiexec.exe Token: SeEnableDelegationPrivilege 868 msiexec.exe Token: SeManageVolumePrivilege 868 msiexec.exe Token: SeImpersonatePrivilege 868 msiexec.exe Token: SeCreateGlobalPrivilege 868 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 868 msiexec.exe 868 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid process target process PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe PID 1808 wrote to memory of 1984 1808 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\DOC-49B8OP200.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:868
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31F4D4E1B6C13CA75ED0A70E5EDE03C72⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2ecab71e28f328e714e95af6327d1729
SHA18a769b71fe3f344b7602c2cc2dbe61efa8ae0afd
SHA25605b9cb7c27ee3943372058c5ea4665e5eb3b289e472652fd89bb431fa15859ff
SHA512beeefad070e753b9144a7e0b41e9ffbcd394aeabc6f63fda283997bd0829049891dbfbacbf2640d96fcbc25cfc3937d9413973b68092d8d1b3b044bacd0c2034
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
a3b4d222a755f43b34a0963f13f77500
SHA1e3bd216f35434287197082745b9f789b9a4f93c6
SHA2569692a12baf2113db4921678f3cf8746933d26d05141748fe09dcef11e5d94f54
SHA5127baf4279fe8409db2a10638b060d2f19259be82363180c521a83f786d64c5b6e5b024ebeeedb163773d9d19efa1f1da036b55a94cc4009108eb2b910c64a3e50
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639
-
MD5
b81fc21f9ea3d9c1d947389fc32c7d66
SHA1d8e957a0555b3d8e1b30bb3f30b11e564b9d854e
SHA256e0b42df2cb2b631b98213cc4b23273ebe71ae91e78bcb1218b4d81a2627328c6
SHA512e977f44c4db748f355fbbcab65bfada4f2f639832350c83bef7ec29c54d20fc47e40d9815f2c5c4cae3e61b2ffe443a14fe1033c3fa8faf16aca1e5120cc0639