Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en -
submitted
16-09-2021 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi
Resource
win7-en
0 signatures
0 seconds
General
-
Target
Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 6 1664 msiexec.exe 8 1664 msiexec.exe 10 1664 msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 1168 MSIB4D.tmp 740 MSIB4D.tmp -
Loads dropped DLL 14 IoCs
pid Process 280 MsiExec.exe 1168 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 740 MSIB4D.tmp 280 MsiExec.exe 1528 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1536 powershell.exe 1528 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1664 msiexec.exe Token: SeIncreaseQuotaPrivilege 1664 msiexec.exe Token: SeRestorePrivilege 1056 msiexec.exe Token: SeTakeOwnershipPrivilege 1056 msiexec.exe Token: SeSecurityPrivilege 1056 msiexec.exe Token: SeCreateTokenPrivilege 1664 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1664 msiexec.exe Token: SeLockMemoryPrivilege 1664 msiexec.exe Token: SeIncreaseQuotaPrivilege 1664 msiexec.exe Token: SeMachineAccountPrivilege 1664 msiexec.exe Token: SeTcbPrivilege 1664 msiexec.exe Token: SeSecurityPrivilege 1664 msiexec.exe Token: SeTakeOwnershipPrivilege 1664 msiexec.exe Token: SeLoadDriverPrivilege 1664 msiexec.exe Token: SeSystemProfilePrivilege 1664 msiexec.exe Token: SeSystemtimePrivilege 1664 msiexec.exe Token: SeProfSingleProcessPrivilege 1664 msiexec.exe Token: SeIncBasePriorityPrivilege 1664 msiexec.exe Token: SeCreatePagefilePrivilege 1664 msiexec.exe Token: SeCreatePermanentPrivilege 1664 msiexec.exe Token: SeBackupPrivilege 1664 msiexec.exe Token: SeRestorePrivilege 1664 msiexec.exe Token: SeShutdownPrivilege 1664 msiexec.exe Token: SeDebugPrivilege 1664 msiexec.exe Token: SeAuditPrivilege 1664 msiexec.exe Token: SeSystemEnvironmentPrivilege 1664 msiexec.exe Token: SeChangeNotifyPrivilege 1664 msiexec.exe Token: SeRemoteShutdownPrivilege 1664 msiexec.exe Token: SeUndockPrivilege 1664 msiexec.exe Token: SeSyncAgentPrivilege 1664 msiexec.exe Token: SeEnableDelegationPrivilege 1664 msiexec.exe Token: SeManageVolumePrivilege 1664 msiexec.exe Token: SeImpersonatePrivilege 1664 msiexec.exe Token: SeCreateGlobalPrivilege 1664 msiexec.exe Token: SeCreateTokenPrivilege 1664 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1664 msiexec.exe Token: SeLockMemoryPrivilege 1664 msiexec.exe Token: SeIncreaseQuotaPrivilege 1664 msiexec.exe Token: SeMachineAccountPrivilege 1664 msiexec.exe Token: SeTcbPrivilege 1664 msiexec.exe Token: SeSecurityPrivilege 1664 msiexec.exe Token: SeTakeOwnershipPrivilege 1664 msiexec.exe Token: SeLoadDriverPrivilege 1664 msiexec.exe Token: SeSystemProfilePrivilege 1664 msiexec.exe Token: SeSystemtimePrivilege 1664 msiexec.exe Token: SeProfSingleProcessPrivilege 1664 msiexec.exe Token: SeIncBasePriorityPrivilege 1664 msiexec.exe Token: SeCreatePagefilePrivilege 1664 msiexec.exe Token: SeCreatePermanentPrivilege 1664 msiexec.exe Token: SeBackupPrivilege 1664 msiexec.exe Token: SeRestorePrivilege 1664 msiexec.exe Token: SeShutdownPrivilege 1664 msiexec.exe Token: SeDebugPrivilege 1664 msiexec.exe Token: SeAuditPrivilege 1664 msiexec.exe Token: SeSystemEnvironmentPrivilege 1664 msiexec.exe Token: SeChangeNotifyPrivilege 1664 msiexec.exe Token: SeRemoteShutdownPrivilege 1664 msiexec.exe Token: SeUndockPrivilege 1664 msiexec.exe Token: SeSyncAgentPrivilege 1664 msiexec.exe Token: SeEnableDelegationPrivilege 1664 msiexec.exe Token: SeManageVolumePrivilege 1664 msiexec.exe Token: SeImpersonatePrivilege 1664 msiexec.exe Token: SeCreateGlobalPrivilege 1664 msiexec.exe Token: SeCreateTokenPrivilege 1664 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 msiexec.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1664 wrote to memory of 1168 1664 msiexec.exe 31 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 1056 wrote to memory of 280 1056 msiexec.exe 32 PID 280 wrote to memory of 1536 280 MsiExec.exe 33 PID 280 wrote to memory of 1536 280 MsiExec.exe 33 PID 280 wrote to memory of 1536 280 MsiExec.exe 33 PID 280 wrote to memory of 1536 280 MsiExec.exe 33 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1168 wrote to memory of 740 1168 MSIB4D.tmp 35 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36 PID 1056 wrote to memory of 1528 1056 msiexec.exe 36
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Metlife-Disability-Waiver-Of-Premium-Benefit-Rider.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp"C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\Temp\{9330B33E-C4F4-4EB7-BE46-A38BBABB97B4}\.cr\MSIB4D.tmp"C:\Windows\Temp\{9330B33E-C4F4-4EB7-BE46-A38BBABB97B4}\.cr\MSIB4D.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSIB4D.tmp" -burn.filehandle.attached=180 -burn.filehandle.self=1883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 248C6E470E52325EC753F515D0A4DF24 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssD9B.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiD88.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrD89.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrD8A.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 86221C29895F63FC0F56F1DD5CEDA8C1 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1528
-