Analysis
-
max time kernel
4265511s -
max time network
565s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
17/01/2022, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
msg.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
msg.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
msg.exe
-
Size
392KB
-
MD5
d90d0f4d6dad402b5d025987030cc87c
-
SHA1
fad66bdf5c5dc2c050cbc574832c6995dba086a0
-
SHA256
1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
-
SHA512
c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2096 igfxCUIService.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation msg.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation igfxCUIService.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igfxCUIService = "C:\\ProgramData\\SystemData\\igfxCUIService.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1804 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2180 powershell.exe 2180 powershell.exe 3368 powershell.exe 3368 powershell.exe 3784 powershell.exe 3784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2980 MusNotification.exe Token: SeCreatePagefilePrivilege 2980 MusNotification.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 WMIC.exe Token: SeSecurityPrivilege 1908 WMIC.exe Token: SeTakeOwnershipPrivilege 1908 WMIC.exe Token: SeLoadDriverPrivilege 1908 WMIC.exe Token: SeSystemProfilePrivilege 1908 WMIC.exe Token: SeSystemtimePrivilege 1908 WMIC.exe Token: SeProfSingleProcessPrivilege 1908 WMIC.exe Token: SeIncBasePriorityPrivilege 1908 WMIC.exe Token: SeCreatePagefilePrivilege 1908 WMIC.exe Token: SeBackupPrivilege 1908 WMIC.exe Token: SeRestorePrivilege 1908 WMIC.exe Token: SeShutdownPrivilege 1908 WMIC.exe Token: SeDebugPrivilege 1908 WMIC.exe Token: SeSystemEnvironmentPrivilege 1908 WMIC.exe Token: SeRemoteShutdownPrivilege 1908 WMIC.exe Token: SeUndockPrivilege 1908 WMIC.exe Token: SeManageVolumePrivilege 1908 WMIC.exe Token: 33 1908 WMIC.exe Token: 34 1908 WMIC.exe Token: 35 1908 WMIC.exe Token: 36 1908 WMIC.exe Token: SeIncreaseQuotaPrivilege 1908 WMIC.exe Token: SeSecurityPrivilege 1908 WMIC.exe Token: SeTakeOwnershipPrivilege 1908 WMIC.exe Token: SeLoadDriverPrivilege 1908 WMIC.exe Token: SeSystemProfilePrivilege 1908 WMIC.exe Token: SeSystemtimePrivilege 1908 WMIC.exe Token: SeProfSingleProcessPrivilege 1908 WMIC.exe Token: SeIncBasePriorityPrivilege 1908 WMIC.exe Token: SeCreatePagefilePrivilege 1908 WMIC.exe Token: SeBackupPrivilege 1908 WMIC.exe Token: SeRestorePrivilege 1908 WMIC.exe Token: SeShutdownPrivilege 1908 WMIC.exe Token: SeDebugPrivilege 1908 WMIC.exe Token: SeSystemEnvironmentPrivilege 1908 WMIC.exe Token: SeRemoteShutdownPrivilege 1908 WMIC.exe Token: SeUndockPrivilege 1908 WMIC.exe Token: SeManageVolumePrivilege 1908 WMIC.exe Token: 33 1908 WMIC.exe Token: 34 1908 WMIC.exe Token: 35 1908 WMIC.exe Token: 36 1908 WMIC.exe Token: SeDebugPrivilege 3784 powershell.exe Token: SeIncreaseQuotaPrivilege 2840 WMIC.exe Token: SeSecurityPrivilege 2840 WMIC.exe Token: SeTakeOwnershipPrivilege 2840 WMIC.exe Token: SeLoadDriverPrivilege 2840 WMIC.exe Token: SeSystemProfilePrivilege 2840 WMIC.exe Token: SeSystemtimePrivilege 2840 WMIC.exe Token: SeProfSingleProcessPrivilege 2840 WMIC.exe Token: SeIncBasePriorityPrivilege 2840 WMIC.exe Token: SeCreatePagefilePrivilege 2840 WMIC.exe Token: SeBackupPrivilege 2840 WMIC.exe Token: SeRestorePrivilege 2840 WMIC.exe Token: SeShutdownPrivilege 2840 WMIC.exe Token: SeDebugPrivilege 2840 WMIC.exe Token: SeSystemEnvironmentPrivilege 2840 WMIC.exe Token: SeRemoteShutdownPrivilege 2840 WMIC.exe Token: SeUndockPrivilege 2840 WMIC.exe Token: SeManageVolumePrivilege 2840 WMIC.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2180 2052 msg.exe 57 PID 2052 wrote to memory of 2180 2052 msg.exe 57 PID 2052 wrote to memory of 2180 2052 msg.exe 57 PID 2052 wrote to memory of 2096 2052 msg.exe 59 PID 2052 wrote to memory of 2096 2052 msg.exe 59 PID 2052 wrote to memory of 2096 2052 msg.exe 59 PID 2096 wrote to memory of 3368 2096 igfxCUIService.exe 60 PID 2096 wrote to memory of 3368 2096 igfxCUIService.exe 60 PID 2096 wrote to memory of 3368 2096 igfxCUIService.exe 60 PID 3368 wrote to memory of 1456 3368 powershell.exe 62 PID 3368 wrote to memory of 1456 3368 powershell.exe 62 PID 3368 wrote to memory of 1456 3368 powershell.exe 62 PID 3368 wrote to memory of 1908 3368 powershell.exe 65 PID 3368 wrote to memory of 1908 3368 powershell.exe 65 PID 3368 wrote to memory of 1908 3368 powershell.exe 65 PID 2096 wrote to memory of 3784 2096 igfxCUIService.exe 66 PID 2096 wrote to memory of 3784 2096 igfxCUIService.exe 66 PID 2096 wrote to memory of 3784 2096 igfxCUIService.exe 66 PID 2096 wrote to memory of 648 2096 igfxCUIService.exe 68 PID 2096 wrote to memory of 648 2096 igfxCUIService.exe 68 PID 2096 wrote to memory of 648 2096 igfxCUIService.exe 68 PID 648 wrote to memory of 2840 648 cmd.exe 70 PID 648 wrote to memory of 2840 648 cmd.exe 70 PID 648 wrote to memory of 2840 648 cmd.exe 70 PID 2096 wrote to memory of 1352 2096 igfxCUIService.exe 71 PID 2096 wrote to memory of 1352 2096 igfxCUIService.exe 71 PID 2096 wrote to memory of 1352 2096 igfxCUIService.exe 71 PID 1352 wrote to memory of 1956 1352 cmd.exe 73 PID 1352 wrote to memory of 1956 1352 cmd.exe 73 PID 1352 wrote to memory of 1956 1352 cmd.exe 73 PID 2096 wrote to memory of 1800 2096 igfxCUIService.exe 74 PID 2096 wrote to memory of 1800 2096 igfxCUIService.exe 74 PID 2096 wrote to memory of 1800 2096 igfxCUIService.exe 74 PID 1800 wrote to memory of 1804 1800 cmd.exe 76 PID 1800 wrote to memory of 1804 1800 cmd.exe 76 PID 1800 wrote to memory of 1804 1800 cmd.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\msg.exe"C:\Users\Admin\AppData\Local\Temp\msg.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\AppData\Local\Temp\msg.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\getmac.exe"C:\Windows\system32\getmac.exe"4⤵PID:1456
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"3⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption, CSDVersion, OSArchitecture, Version / value4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"3⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic nicconfig where 'IPEnabled = True' get ipaddress4⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F4⤵
- Adds Run key to start application
- Modifies registry key
PID:1804
-
-
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2980