Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19/11/2021, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
0bf84fa5ca26bb868aa488b77de00cbf.msi
Resource
win7-en-20211014
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0bf84fa5ca26bb868aa488b77de00cbf.msi
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
0bf84fa5ca26bb868aa488b77de00cbf.msi
-
Size
264KB
-
MD5
0bf84fa5ca26bb868aa488b77de00cbf
-
SHA1
449b60c26cec7d4ef652a08475b97c60dae25d0b
-
SHA256
d7cda98c0f58ed65cb617d58ce189f5df2bc839820bcb56cd4574a5e41c49118
-
SHA512
755848935472e74d67d3f99c6172f0779ace1e85fb778824c8e7b9f8f5ec5c006e0509d39ab419dae61030ae2056f2675afc8c7ad666668ef56bff045df75a38
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1828 MsiExec.exe -
Loads dropped DLL 2 IoCs
pid Process 1828 MsiExec.exe 1828 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Installer\f762df3.msi msiexec.exe File opened for modification C:\Windows\Installer\f762df3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2E8F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3322.tmp msiexec.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 980 msiexec.exe Token: SeIncreaseQuotaPrivilege 980 msiexec.exe Token: SeRestorePrivilege 1536 msiexec.exe Token: SeTakeOwnershipPrivilege 1536 msiexec.exe Token: SeSecurityPrivilege 1536 msiexec.exe Token: SeCreateTokenPrivilege 980 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 980 msiexec.exe Token: SeLockMemoryPrivilege 980 msiexec.exe Token: SeIncreaseQuotaPrivilege 980 msiexec.exe Token: SeMachineAccountPrivilege 980 msiexec.exe Token: SeTcbPrivilege 980 msiexec.exe Token: SeSecurityPrivilege 980 msiexec.exe Token: SeTakeOwnershipPrivilege 980 msiexec.exe Token: SeLoadDriverPrivilege 980 msiexec.exe Token: SeSystemProfilePrivilege 980 msiexec.exe Token: SeSystemtimePrivilege 980 msiexec.exe Token: SeProfSingleProcessPrivilege 980 msiexec.exe Token: SeIncBasePriorityPrivilege 980 msiexec.exe Token: SeCreatePagefilePrivilege 980 msiexec.exe Token: SeCreatePermanentPrivilege 980 msiexec.exe Token: SeBackupPrivilege 980 msiexec.exe Token: SeRestorePrivilege 980 msiexec.exe Token: SeShutdownPrivilege 980 msiexec.exe Token: SeDebugPrivilege 980 msiexec.exe Token: SeAuditPrivilege 980 msiexec.exe Token: SeSystemEnvironmentPrivilege 980 msiexec.exe Token: SeChangeNotifyPrivilege 980 msiexec.exe Token: SeRemoteShutdownPrivilege 980 msiexec.exe Token: SeUndockPrivilege 980 msiexec.exe Token: SeSyncAgentPrivilege 980 msiexec.exe Token: SeEnableDelegationPrivilege 980 msiexec.exe Token: SeManageVolumePrivilege 980 msiexec.exe Token: SeImpersonatePrivilege 980 msiexec.exe Token: SeCreateGlobalPrivilege 980 msiexec.exe Token: SeRestorePrivilege 1536 msiexec.exe Token: SeTakeOwnershipPrivilege 1536 msiexec.exe Token: SeRestorePrivilege 1536 msiexec.exe Token: SeTakeOwnershipPrivilege 1536 msiexec.exe Token: SeRestorePrivilege 1536 msiexec.exe Token: SeTakeOwnershipPrivilege 1536 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 980 msiexec.exe 980 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29 PID 1536 wrote to memory of 1828 1536 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\0bf84fa5ca26bb868aa488b77de00cbf.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:980
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ADAAE9A45C17812459DC46868520C9DB2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1828
-