Analysis
-
max time kernel
13s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 16:03
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi
-
Size
1.4MB
-
MD5
e699ed1bdb5dd7ceef3937390ef6fb43
-
SHA1
382f985fbb6ae0e393ca3621049ea503d8032c24
-
SHA256
925974d5a370ad4840b444a7709c2640f8ff3113c6cafbc113e8559fdfcf26e7
-
SHA512
833c671908bb45a7d86a1434c88ee8e36068c7eef63cfac3f4114bae8f9422da5db86a28ffe7a9eeb5a5e3843cf6472c87793b115bcf083d4684c16b7648c58b
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3192 MsiExec.exe 3192 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 90 IoCs
description pid Process Token: SeShutdownPrivilege 3152 msiexec.exe Token: SeIncreaseQuotaPrivilege 3152 msiexec.exe Token: SeSecurityPrivilege 1804 msiexec.exe Token: SeCreateTokenPrivilege 3152 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3152 msiexec.exe Token: SeLockMemoryPrivilege 3152 msiexec.exe Token: SeIncreaseQuotaPrivilege 3152 msiexec.exe Token: SeMachineAccountPrivilege 3152 msiexec.exe Token: SeTcbPrivilege 3152 msiexec.exe Token: SeSecurityPrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe Token: SeLoadDriverPrivilege 3152 msiexec.exe Token: SeSystemProfilePrivilege 3152 msiexec.exe Token: SeSystemtimePrivilege 3152 msiexec.exe Token: SeProfSingleProcessPrivilege 3152 msiexec.exe Token: SeIncBasePriorityPrivilege 3152 msiexec.exe Token: SeCreatePagefilePrivilege 3152 msiexec.exe Token: SeCreatePermanentPrivilege 3152 msiexec.exe Token: SeBackupPrivilege 3152 msiexec.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeShutdownPrivilege 3152 msiexec.exe Token: SeDebugPrivilege 3152 msiexec.exe Token: SeAuditPrivilege 3152 msiexec.exe Token: SeSystemEnvironmentPrivilege 3152 msiexec.exe Token: SeChangeNotifyPrivilege 3152 msiexec.exe Token: SeRemoteShutdownPrivilege 3152 msiexec.exe Token: SeUndockPrivilege 3152 msiexec.exe Token: SeSyncAgentPrivilege 3152 msiexec.exe Token: SeEnableDelegationPrivilege 3152 msiexec.exe Token: SeManageVolumePrivilege 3152 msiexec.exe Token: SeImpersonatePrivilege 3152 msiexec.exe Token: SeCreateGlobalPrivilege 3152 msiexec.exe Token: SeCreateTokenPrivilege 3152 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3152 msiexec.exe Token: SeLockMemoryPrivilege 3152 msiexec.exe Token: SeIncreaseQuotaPrivilege 3152 msiexec.exe Token: SeMachineAccountPrivilege 3152 msiexec.exe Token: SeTcbPrivilege 3152 msiexec.exe Token: SeSecurityPrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe Token: SeLoadDriverPrivilege 3152 msiexec.exe Token: SeSystemProfilePrivilege 3152 msiexec.exe Token: SeSystemtimePrivilege 3152 msiexec.exe Token: SeProfSingleProcessPrivilege 3152 msiexec.exe Token: SeIncBasePriorityPrivilege 3152 msiexec.exe Token: SeCreatePagefilePrivilege 3152 msiexec.exe Token: SeCreatePermanentPrivilege 3152 msiexec.exe Token: SeBackupPrivilege 3152 msiexec.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeShutdownPrivilege 3152 msiexec.exe Token: SeDebugPrivilege 3152 msiexec.exe Token: SeAuditPrivilege 3152 msiexec.exe Token: SeSystemEnvironmentPrivilege 3152 msiexec.exe Token: SeChangeNotifyPrivilege 3152 msiexec.exe Token: SeRemoteShutdownPrivilege 3152 msiexec.exe Token: SeUndockPrivilege 3152 msiexec.exe Token: SeSyncAgentPrivilege 3152 msiexec.exe Token: SeEnableDelegationPrivilege 3152 msiexec.exe Token: SeManageVolumePrivilege 3152 msiexec.exe Token: SeImpersonatePrivilege 3152 msiexec.exe Token: SeCreateGlobalPrivilege 3152 msiexec.exe Token: SeCreateTokenPrivilege 3152 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3152 msiexec.exe Token: SeLockMemoryPrivilege 3152 msiexec.exe Token: SeIncreaseQuotaPrivilege 3152 msiexec.exe Token: SeMachineAccountPrivilege 3152 msiexec.exe Token: SeTcbPrivilege 3152 msiexec.exe Token: SeSecurityPrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe Token: SeLoadDriverPrivilege 3152 msiexec.exe Token: SeSystemProfilePrivilege 3152 msiexec.exe Token: SeSystemtimePrivilege 3152 msiexec.exe Token: SeProfSingleProcessPrivilege 3152 msiexec.exe Token: SeIncBasePriorityPrivilege 3152 msiexec.exe Token: SeCreatePagefilePrivilege 3152 msiexec.exe Token: SeCreatePermanentPrivilege 3152 msiexec.exe Token: SeBackupPrivilege 3152 msiexec.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeShutdownPrivilege 3152 msiexec.exe Token: SeDebugPrivilege 3152 msiexec.exe Token: SeAuditPrivilege 3152 msiexec.exe Token: SeSystemEnvironmentPrivilege 3152 msiexec.exe Token: SeChangeNotifyPrivilege 3152 msiexec.exe Token: SeRemoteShutdownPrivilege 3152 msiexec.exe Token: SeUndockPrivilege 3152 msiexec.exe Token: SeSyncAgentPrivilege 3152 msiexec.exe Token: SeEnableDelegationPrivilege 3152 msiexec.exe Token: SeManageVolumePrivilege 3152 msiexec.exe Token: SeImpersonatePrivilege 3152 msiexec.exe Token: SeCreateGlobalPrivilege 3152 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3152 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3192 1804 msiexec.exe 77 PID 1804 wrote to memory of 3192 1804 msiexec.exe 77 PID 1804 wrote to memory of 3192 1804 msiexec.exe 77
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Ratty.A.20081.2121.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3152
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D7501CC586CD0F348BB86F3B66D923B8 C2⤵
- Loads dropped DLL
PID:3192
-