Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-10-2021 07:53
Static task
static1
Behavioral task
behavioral1
Sample
ed3edf8fdb2cd2f027127f4fb1fe7019.msi
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
ed3edf8fdb2cd2f027127f4fb1fe7019.msi
Resource
win10-en-20210920
General
-
Target
ed3edf8fdb2cd2f027127f4fb1fe7019.msi
-
Size
264KB
-
MD5
ed3edf8fdb2cd2f027127f4fb1fe7019
-
SHA1
e876622ade868b5c8461b80a9b8e4961e9427b2e
-
SHA256
ece2bea42a77b9c098899150a002e9f702cc7cf5b43bc8f674c61d5adaf905d3
-
SHA512
051d9ff3bc18233ee3174113b566a1bbd653588b9070563f9627c51315cd0e39bc6151a92f5df91cc8c809cd021ae79ab43ac0b88013930f7da7864c68a10d42
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
MsiExec.exeflow pid process 3 1864 MsiExec.exe 5 1864 MsiExec.exe 7 1864 MsiExec.exe -
Loads dropped DLL 2 IoCs
Processes:
MsiExec.exepid process 1864 MsiExec.exe 1864 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Drops file in Windows directory 4 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\f76032c.msi msiexec.exe File opened for modification C:\Windows\Installer\f76032c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI500.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB96.tmp msiexec.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1092 msiexec.exe Token: SeIncreaseQuotaPrivilege 1092 msiexec.exe Token: SeRestorePrivilege 360 msiexec.exe Token: SeTakeOwnershipPrivilege 360 msiexec.exe Token: SeSecurityPrivilege 360 msiexec.exe Token: SeCreateTokenPrivilege 1092 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1092 msiexec.exe Token: SeLockMemoryPrivilege 1092 msiexec.exe Token: SeIncreaseQuotaPrivilege 1092 msiexec.exe Token: SeMachineAccountPrivilege 1092 msiexec.exe Token: SeTcbPrivilege 1092 msiexec.exe Token: SeSecurityPrivilege 1092 msiexec.exe Token: SeTakeOwnershipPrivilege 1092 msiexec.exe Token: SeLoadDriverPrivilege 1092 msiexec.exe Token: SeSystemProfilePrivilege 1092 msiexec.exe Token: SeSystemtimePrivilege 1092 msiexec.exe Token: SeProfSingleProcessPrivilege 1092 msiexec.exe Token: SeIncBasePriorityPrivilege 1092 msiexec.exe Token: SeCreatePagefilePrivilege 1092 msiexec.exe Token: SeCreatePermanentPrivilege 1092 msiexec.exe Token: SeBackupPrivilege 1092 msiexec.exe Token: SeRestorePrivilege 1092 msiexec.exe Token: SeShutdownPrivilege 1092 msiexec.exe Token: SeDebugPrivilege 1092 msiexec.exe Token: SeAuditPrivilege 1092 msiexec.exe Token: SeSystemEnvironmentPrivilege 1092 msiexec.exe Token: SeChangeNotifyPrivilege 1092 msiexec.exe Token: SeRemoteShutdownPrivilege 1092 msiexec.exe Token: SeUndockPrivilege 1092 msiexec.exe Token: SeSyncAgentPrivilege 1092 msiexec.exe Token: SeEnableDelegationPrivilege 1092 msiexec.exe Token: SeManageVolumePrivilege 1092 msiexec.exe Token: SeImpersonatePrivilege 1092 msiexec.exe Token: SeCreateGlobalPrivilege 1092 msiexec.exe Token: SeRestorePrivilege 360 msiexec.exe Token: SeTakeOwnershipPrivilege 360 msiexec.exe Token: SeRestorePrivilege 360 msiexec.exe Token: SeTakeOwnershipPrivilege 360 msiexec.exe Token: SeRestorePrivilege 360 msiexec.exe Token: SeTakeOwnershipPrivilege 360 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1092 msiexec.exe 1092 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid process target process PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe PID 360 wrote to memory of 1864 360 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ed3edf8fdb2cd2f027127f4fb1fe7019.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 15F8C1030EA5A727521724D4A78629812⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Installer\MSI500.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
C:\Windows\Installer\MSIB96.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
\Windows\Installer\MSI500.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
\Windows\Installer\MSIB96.tmpMD5
9f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b
-
memory/1092-55-0x000007FEFB831000-0x000007FEFB833000-memory.dmpFilesize
8KB
-
memory/1864-57-0x0000000000000000-mapping.dmp
-
memory/1864-58-0x0000000074F61000-0x0000000074F63000-memory.dmpFilesize
8KB