Analysis
-
max time kernel
144s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19/10/2021, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
36b8ab4ab974a6be2ae8aec49600215c.msi
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
36b8ab4ab974a6be2ae8aec49600215c.msi
Resource
win10-en-20211014
General
-
Target
36b8ab4ab974a6be2ae8aec49600215c.msi
-
Size
264KB
-
MD5
36b8ab4ab974a6be2ae8aec49600215c
-
SHA1
01233a85959dd6f5815eb8a037d630b81bff0eb0
-
SHA256
17182f1f100e9370ee0798fdad75aca6c9004d9446bad85bf5ad9f28975f77d4
-
SHA512
27bbfedd27c8b821fc17a25ab7a704874df02cb9f608bb02c0892e68e64336ff6816248f4fab150c11e8da7d8422195be7f50ac37927a5e2cef3d95cc71e9072
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 13 1676 MsiExec.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 SzKHJ.exe -
Loads dropped DLL 6 IoCs
pid Process 1676 MsiExec.exe 1676 MsiExec.exe 2772 SzKHJ.exe 2772 SzKHJ.exe 3876 iexplore.exe 3876 iexplore.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin-_IQ89Ul0H0 = "\"C:\\Users\\Admin\\Saved Games\\Admin xguUZ\\SzKHJ.exe\"" iexplore.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{E1970D67-9CDE-48F7-8641-ACBEA376F909} msiexec.exe File created C:\Windows\Installer\f75f07b.msi msiexec.exe File opened for modification C:\Windows\Installer\f75f07b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF956.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF166.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI62CF.tmp msiexec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iexplore.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion iexplore.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\(Padrão) 2 = "SzKHJ" SzKHJ.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\(Padrão) 3 = "C:\\Users\\Admin\\Saved Games\\Admin xguUZ\\" SzKHJ.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 msiexec.exe 2232 msiexec.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe 3876 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4132 msiexec.exe Token: SeIncreaseQuotaPrivilege 4132 msiexec.exe Token: SeSecurityPrivilege 2232 msiexec.exe Token: SeCreateTokenPrivilege 4132 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4132 msiexec.exe Token: SeLockMemoryPrivilege 4132 msiexec.exe Token: SeIncreaseQuotaPrivilege 4132 msiexec.exe Token: SeMachineAccountPrivilege 4132 msiexec.exe Token: SeTcbPrivilege 4132 msiexec.exe Token: SeSecurityPrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeLoadDriverPrivilege 4132 msiexec.exe Token: SeSystemProfilePrivilege 4132 msiexec.exe Token: SeSystemtimePrivilege 4132 msiexec.exe Token: SeProfSingleProcessPrivilege 4132 msiexec.exe Token: SeIncBasePriorityPrivilege 4132 msiexec.exe Token: SeCreatePagefilePrivilege 4132 msiexec.exe Token: SeCreatePermanentPrivilege 4132 msiexec.exe Token: SeBackupPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeShutdownPrivilege 4132 msiexec.exe Token: SeDebugPrivilege 4132 msiexec.exe Token: SeAuditPrivilege 4132 msiexec.exe Token: SeSystemEnvironmentPrivilege 4132 msiexec.exe Token: SeChangeNotifyPrivilege 4132 msiexec.exe Token: SeRemoteShutdownPrivilege 4132 msiexec.exe Token: SeUndockPrivilege 4132 msiexec.exe Token: SeSyncAgentPrivilege 4132 msiexec.exe Token: SeEnableDelegationPrivilege 4132 msiexec.exe Token: SeManageVolumePrivilege 4132 msiexec.exe Token: SeImpersonatePrivilege 4132 msiexec.exe Token: SeCreateGlobalPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 2232 msiexec.exe Token: SeTakeOwnershipPrivilege 2232 msiexec.exe Token: SeRestorePrivilege 2232 msiexec.exe Token: SeTakeOwnershipPrivilege 2232 msiexec.exe Token: SeRestorePrivilege 2232 msiexec.exe Token: SeTakeOwnershipPrivilege 2232 msiexec.exe Token: SeIncreaseQuotaPrivilege 1928 WMIC.exe Token: SeSecurityPrivilege 1928 WMIC.exe Token: SeTakeOwnershipPrivilege 1928 WMIC.exe Token: SeLoadDriverPrivilege 1928 WMIC.exe Token: SeSystemProfilePrivilege 1928 WMIC.exe Token: SeSystemtimePrivilege 1928 WMIC.exe Token: SeProfSingleProcessPrivilege 1928 WMIC.exe Token: SeIncBasePriorityPrivilege 1928 WMIC.exe Token: SeCreatePagefilePrivilege 1928 WMIC.exe Token: SeBackupPrivilege 1928 WMIC.exe Token: SeRestorePrivilege 1928 WMIC.exe Token: SeShutdownPrivilege 1928 WMIC.exe Token: SeDebugPrivilege 1928 WMIC.exe Token: SeSystemEnvironmentPrivilege 1928 WMIC.exe Token: SeRemoteShutdownPrivilege 1928 WMIC.exe Token: SeUndockPrivilege 1928 WMIC.exe Token: SeManageVolumePrivilege 1928 WMIC.exe Token: 33 1928 WMIC.exe Token: 34 1928 WMIC.exe Token: 35 1928 WMIC.exe Token: 36 1928 WMIC.exe Token: SeRestorePrivilege 2232 msiexec.exe Token: SeTakeOwnershipPrivilege 2232 msiexec.exe Token: SeRestorePrivilege 2232 msiexec.exe Token: SeTakeOwnershipPrivilege 2232 msiexec.exe Token: SeRestorePrivilege 2232 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4132 msiexec.exe 1676 MsiExec.exe 4132 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1676 2232 msiexec.exe 72 PID 2232 wrote to memory of 1676 2232 msiexec.exe 72 PID 2232 wrote to memory of 1676 2232 msiexec.exe 72 PID 1676 wrote to memory of 1928 1676 MsiExec.exe 74 PID 1676 wrote to memory of 1928 1676 MsiExec.exe 74 PID 1676 wrote to memory of 1928 1676 MsiExec.exe 74 PID 2772 wrote to memory of 3876 2772 SzKHJ.exe 78 PID 2772 wrote to memory of 3876 2772 SzKHJ.exe 78 PID 2772 wrote to memory of 3876 2772 SzKHJ.exe 78 PID 2772 wrote to memory of 3876 2772 SzKHJ.exe 78
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\36b8ab4ab974a6be2ae8aec49600215c.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4132
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4894A0B908B74AFE682A606432EF62172⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\Saved Games\Admin xguUZ\SzKHJ.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Users\Admin\Saved Games\Admin xguUZ\SzKHJ.exe"C:\Users\Admin\Saved Games\Admin xguUZ\SzKHJ.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet explorer\iexplore.exe"C:\Program Files (x86)\Internet explorer\iexplore.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3876
-