Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en -
submitted
16/09/2021, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
Due-Diligence-Checklist-For-Oil-And-Gas-Properties.msi
Resource
win7-en
0 signatures
0 seconds
General
-
Target
Due-Diligence-Checklist-For-Oil-And-Gas-Properties.msi
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1032 msiexec.exe 6 1032 msiexec.exe 8 1032 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 MSI564.tmp -
Loads dropped DLL 5 IoCs
pid Process 1032 msiexec.exe 1536 MsiExec.exe 1280 Process not Found 1536 MsiExec.exe 1288 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSI564.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSI564.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSI564.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\ProcessorNameString MSI564.tmp -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily MSI564.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion MSI564.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS MSI564.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1036 powershell.exe 1288 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1032 msiexec.exe Token: SeIncreaseQuotaPrivilege 1032 msiexec.exe Token: SeRestorePrivilege 1112 msiexec.exe Token: SeTakeOwnershipPrivilege 1112 msiexec.exe Token: SeSecurityPrivilege 1112 msiexec.exe Token: SeCreateTokenPrivilege 1032 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1032 msiexec.exe Token: SeLockMemoryPrivilege 1032 msiexec.exe Token: SeIncreaseQuotaPrivilege 1032 msiexec.exe Token: SeMachineAccountPrivilege 1032 msiexec.exe Token: SeTcbPrivilege 1032 msiexec.exe Token: SeSecurityPrivilege 1032 msiexec.exe Token: SeTakeOwnershipPrivilege 1032 msiexec.exe Token: SeLoadDriverPrivilege 1032 msiexec.exe Token: SeSystemProfilePrivilege 1032 msiexec.exe Token: SeSystemtimePrivilege 1032 msiexec.exe Token: SeProfSingleProcessPrivilege 1032 msiexec.exe Token: SeIncBasePriorityPrivilege 1032 msiexec.exe Token: SeCreatePagefilePrivilege 1032 msiexec.exe Token: SeCreatePermanentPrivilege 1032 msiexec.exe Token: SeBackupPrivilege 1032 msiexec.exe Token: SeRestorePrivilege 1032 msiexec.exe Token: SeShutdownPrivilege 1032 msiexec.exe Token: SeDebugPrivilege 1032 msiexec.exe Token: SeAuditPrivilege 1032 msiexec.exe Token: SeSystemEnvironmentPrivilege 1032 msiexec.exe Token: SeChangeNotifyPrivilege 1032 msiexec.exe Token: SeRemoteShutdownPrivilege 1032 msiexec.exe Token: SeUndockPrivilege 1032 msiexec.exe Token: SeSyncAgentPrivilege 1032 msiexec.exe Token: SeEnableDelegationPrivilege 1032 msiexec.exe Token: SeManageVolumePrivilege 1032 msiexec.exe Token: SeImpersonatePrivilege 1032 msiexec.exe Token: SeCreateGlobalPrivilege 1032 msiexec.exe Token: SeCreateTokenPrivilege 1032 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1032 msiexec.exe Token: SeLockMemoryPrivilege 1032 msiexec.exe Token: SeIncreaseQuotaPrivilege 1032 msiexec.exe Token: SeMachineAccountPrivilege 1032 msiexec.exe Token: SeTcbPrivilege 1032 msiexec.exe Token: SeSecurityPrivilege 1032 msiexec.exe Token: SeTakeOwnershipPrivilege 1032 msiexec.exe Token: SeLoadDriverPrivilege 1032 msiexec.exe Token: SeSystemProfilePrivilege 1032 msiexec.exe Token: SeSystemtimePrivilege 1032 msiexec.exe Token: SeProfSingleProcessPrivilege 1032 msiexec.exe Token: SeIncBasePriorityPrivilege 1032 msiexec.exe Token: SeCreatePagefilePrivilege 1032 msiexec.exe Token: SeCreatePermanentPrivilege 1032 msiexec.exe Token: SeBackupPrivilege 1032 msiexec.exe Token: SeRestorePrivilege 1032 msiexec.exe Token: SeShutdownPrivilege 1032 msiexec.exe Token: SeDebugPrivilege 1032 msiexec.exe Token: SeAuditPrivilege 1032 msiexec.exe Token: SeSystemEnvironmentPrivilege 1032 msiexec.exe Token: SeChangeNotifyPrivilege 1032 msiexec.exe Token: SeRemoteShutdownPrivilege 1032 msiexec.exe Token: SeUndockPrivilege 1032 msiexec.exe Token: SeSyncAgentPrivilege 1032 msiexec.exe Token: SeEnableDelegationPrivilege 1032 msiexec.exe Token: SeManageVolumePrivilege 1032 msiexec.exe Token: SeImpersonatePrivilege 1032 msiexec.exe Token: SeCreateGlobalPrivilege 1032 msiexec.exe Token: SeCreateTokenPrivilege 1032 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1112 wrote to memory of 1536 1112 msiexec.exe 29 PID 1032 wrote to memory of 1976 1032 msiexec.exe 30 PID 1032 wrote to memory of 1976 1032 msiexec.exe 30 PID 1032 wrote to memory of 1976 1032 msiexec.exe 30 PID 1536 wrote to memory of 1036 1536 MsiExec.exe 31 PID 1536 wrote to memory of 1036 1536 MsiExec.exe 31 PID 1536 wrote to memory of 1036 1536 MsiExec.exe 31 PID 1536 wrote to memory of 1036 1536 MsiExec.exe 31 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35 PID 1112 wrote to memory of 1288 1112 msiexec.exe 35
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Due-Diligence-Checklist-For-Oil-And-Gas-Properties.msi1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\MSI564.tmp"C:\Users\Admin\AppData\Local\Temp\MSI564.tmp"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
PID:1976
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A776C0033133A581DF8120B718B69634 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss792.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi770.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr771.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr772.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1C8C29DDB20EC90356E1F3B19CDCC9D9 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1288
-