Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13/01/2022, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
5fe0bcefbfd86e01e6fd17a2009f2e9ebaf041e9ecf7ce3c83603a74ad440d53.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5fe0bcefbfd86e01e6fd17a2009f2e9ebaf041e9ecf7ce3c83603a74ad440d53.msi
Resource
win10-en-20211208
General
-
Target
5fe0bcefbfd86e01e6fd17a2009f2e9ebaf041e9ecf7ce3c83603a74ad440d53.msi
-
Size
4.0MB
-
MD5
84a654e89c30bf453beecaafb694f6a9
-
SHA1
40ead07a0b5079314cfb2811d425e0370f6b6715
-
SHA256
5fe0bcefbfd86e01e6fd17a2009f2e9ebaf041e9ecf7ce3c83603a74ad440d53
-
SHA512
3e8b1e228d9e46c1fbb3639c5c71a6d790f51696160c11252906ddefe31db6668c687937fb6fd9f4bbbcadcf0c7357b03dc64299f7f36447279943c1e1f6914f
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 696 MsiExec.exe 4 696 MsiExec.exe -
Executes dropped EXE 2 IoCs
pid Process 572 bmPVuGfskBoXXSe.exe 768 bmPVuGfskBoXXSe.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YzYsIIBteieuHkG.lnk MsiExec.exe -
Loads dropped DLL 9 IoCs
pid Process 696 MsiExec.exe 696 MsiExec.exe 696 MsiExec.exe 696 MsiExec.exe 696 MsiExec.exe 572 bmPVuGfskBoXXSe.exe 572 bmPVuGfskBoXXSe.exe 768 bmPVuGfskBoXXSe.exe 768 bmPVuGfskBoXXSe.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\f75c301.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC38D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC5B1.tmp msiexec.exe File created C:\Windows\Installer\f75c303.ipi msiexec.exe File opened for modification C:\Windows\Installer\f75c301.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC505.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI538F.tmp msiexec.exe File opened for modification C:\Windows\Installer\f75c303.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI54DA.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1188 schtasks.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 780 msiexec.exe 780 msiexec.exe 572 bmPVuGfskBoXXSe.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 760 msiexec.exe Token: SeIncreaseQuotaPrivilege 760 msiexec.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe Token: SeSecurityPrivilege 780 msiexec.exe Token: SeCreateTokenPrivilege 760 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 760 msiexec.exe Token: SeLockMemoryPrivilege 760 msiexec.exe Token: SeIncreaseQuotaPrivilege 760 msiexec.exe Token: SeMachineAccountPrivilege 760 msiexec.exe Token: SeTcbPrivilege 760 msiexec.exe Token: SeSecurityPrivilege 760 msiexec.exe Token: SeTakeOwnershipPrivilege 760 msiexec.exe Token: SeLoadDriverPrivilege 760 msiexec.exe Token: SeSystemProfilePrivilege 760 msiexec.exe Token: SeSystemtimePrivilege 760 msiexec.exe Token: SeProfSingleProcessPrivilege 760 msiexec.exe Token: SeIncBasePriorityPrivilege 760 msiexec.exe Token: SeCreatePagefilePrivilege 760 msiexec.exe Token: SeCreatePermanentPrivilege 760 msiexec.exe Token: SeBackupPrivilege 760 msiexec.exe Token: SeRestorePrivilege 760 msiexec.exe Token: SeShutdownPrivilege 760 msiexec.exe Token: SeDebugPrivilege 760 msiexec.exe Token: SeAuditPrivilege 760 msiexec.exe Token: SeSystemEnvironmentPrivilege 760 msiexec.exe Token: SeChangeNotifyPrivilege 760 msiexec.exe Token: SeRemoteShutdownPrivilege 760 msiexec.exe Token: SeUndockPrivilege 760 msiexec.exe Token: SeSyncAgentPrivilege 760 msiexec.exe Token: SeEnableDelegationPrivilege 760 msiexec.exe Token: SeManageVolumePrivilege 760 msiexec.exe Token: SeImpersonatePrivilege 760 msiexec.exe Token: SeCreateGlobalPrivilege 760 msiexec.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe Token: SeRestorePrivilege 780 msiexec.exe Token: SeTakeOwnershipPrivilege 780 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 760 msiexec.exe 696 MsiExec.exe 760 msiexec.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 780 wrote to memory of 696 780 msiexec.exe 28 PID 696 wrote to memory of 1588 696 MsiExec.exe 29 PID 696 wrote to memory of 1588 696 MsiExec.exe 29 PID 696 wrote to memory of 1588 696 MsiExec.exe 29 PID 696 wrote to memory of 1588 696 MsiExec.exe 29 PID 572 wrote to memory of 868 572 bmPVuGfskBoXXSe.exe 33 PID 572 wrote to memory of 868 572 bmPVuGfskBoXXSe.exe 33 PID 572 wrote to memory of 868 572 bmPVuGfskBoXXSe.exe 33 PID 572 wrote to memory of 868 572 bmPVuGfskBoXXSe.exe 33 PID 868 wrote to memory of 1188 868 cmd.exe 35 PID 868 wrote to memory of 1188 868 cmd.exe 35 PID 868 wrote to memory of 1188 868 cmd.exe 35 PID 868 wrote to memory of 1188 868 cmd.exe 35 PID 1428 wrote to memory of 768 1428 taskeng.exe 39 PID 1428 wrote to memory of 768 1428 taskeng.exe 39 PID 1428 wrote to memory of 768 1428 taskeng.exe 39 PID 1428 wrote to memory of 768 1428 taskeng.exe 39
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\5fe0bcefbfd86e01e6fd17a2009f2e9ebaf041e9ecf7ce3c83603a74ad440d53.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:760
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DBB1D02742C781C0F3711BFC0FF499592⤵
- Blocklisted process makes network request
- Drops startup file
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exeC:\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /CREATE /TN "OneDrive " /TR C:\\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exe /SC minute /MO 2 /IT /RU %USERNAME%2⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OneDrive " /TR C:\\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exe /SC minute /MO 2 /IT /RU Admin3⤵
- Creates scheduled task(s)
PID:1188
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B9B53057-7C40-4B27-A684-52BDF85B3BE7} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exeC:\\Users\Admin\TKcdOHFjXEKZsYp\bmPVuGfskBoXXSe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768
-