Analysis

  • max time kernel
    13s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28-06-2021 15:05

General

  • Target

    b1b812080af542692b22558bf87af1dd.msi

  • Size

    1.4MB

  • MD5

    b1b812080af542692b22558bf87af1dd

  • SHA1

    6809a07ceba8afaeec6ef48e17347101a56a605d

  • SHA256

    b45b0613f994769e460de419e2aac46863e303e833d43369f2647bac3a8260e6

  • SHA512

    e225c9dc3d3c2fc4bd3055beeb682a1c97ba17d4aee79827bd93e16c5ea6df42a4018342d81e2c97db74cbe7b8e15ed1e770ce19db51bce75c4c6e17dd7869d1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b1b812080af542692b22558bf87af1dd.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3400
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding AF19F1C5227E3606721AD50BDEA28074 C
      2⤵
      • Loads dropped DLL
      PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads