Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 13:04
Static task
static1
Behavioral task
behavioral1
Sample
490548ca84fb78e8d332bcde20b37576b2a532e388232e756d9c746b6baad5bb.msi
Resource
win7-en-20211208
General
-
Target
490548ca84fb78e8d332bcde20b37576b2a532e388232e756d9c746b6baad5bb.msi
-
Size
2.2MB
-
MD5
3a8af2810c28d0eac73f55fb5efb63c2
-
SHA1
fcc72c86caafc640c7ca831bf9e1fbb2341f6895
-
SHA256
490548ca84fb78e8d332bcde20b37576b2a532e388232e756d9c746b6baad5bb
-
SHA512
cc490c53a66e13548a20e301616c09ab1e1fabc25b64000b0f9c13dfc570d43c8f4b259f431147ab6dc60a33a837dafb0e356f330fdc796552c33d61232de839
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
MsiExec.exeflow pid process 5 1564 MsiExec.exe 7 1564 MsiExec.exe 9 1564 MsiExec.exe 11 1564 MsiExec.exe -
Executes dropped EXE 2 IoCs
Processes:
MSI306D.tmpEscudo.exepid process 664 MSI306D.tmp 1668 Escudo.exe -
Loads dropped DLL 9 IoCs
Processes:
MsiExec.exeEscudo.exepid process 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1668 Escudo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Drops file in Windows directory 15 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\39961.msi msiexec.exe File opened for modification C:\Windows\Installer\39961.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDD57.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDDA6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE1BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB413.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2F23.tmp msiexec.exe File opened for modification C:\Windows\Installer\39963.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9AB8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB452.tmp msiexec.exe File created C:\Windows\Installer\39963.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIDEA1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI306D.tmp msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 1680 msiexec.exe 1680 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1284 msiexec.exe Token: SeIncreaseQuotaPrivilege 1284 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeSecurityPrivilege 1680 msiexec.exe Token: SeCreateTokenPrivilege 1284 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1284 msiexec.exe Token: SeLockMemoryPrivilege 1284 msiexec.exe Token: SeIncreaseQuotaPrivilege 1284 msiexec.exe Token: SeMachineAccountPrivilege 1284 msiexec.exe Token: SeTcbPrivilege 1284 msiexec.exe Token: SeSecurityPrivilege 1284 msiexec.exe Token: SeTakeOwnershipPrivilege 1284 msiexec.exe Token: SeLoadDriverPrivilege 1284 msiexec.exe Token: SeSystemProfilePrivilege 1284 msiexec.exe Token: SeSystemtimePrivilege 1284 msiexec.exe Token: SeProfSingleProcessPrivilege 1284 msiexec.exe Token: SeIncBasePriorityPrivilege 1284 msiexec.exe Token: SeCreatePagefilePrivilege 1284 msiexec.exe Token: SeCreatePermanentPrivilege 1284 msiexec.exe Token: SeBackupPrivilege 1284 msiexec.exe Token: SeRestorePrivilege 1284 msiexec.exe Token: SeShutdownPrivilege 1284 msiexec.exe Token: SeDebugPrivilege 1284 msiexec.exe Token: SeAuditPrivilege 1284 msiexec.exe Token: SeSystemEnvironmentPrivilege 1284 msiexec.exe Token: SeChangeNotifyPrivilege 1284 msiexec.exe Token: SeRemoteShutdownPrivilege 1284 msiexec.exe Token: SeUndockPrivilege 1284 msiexec.exe Token: SeSyncAgentPrivilege 1284 msiexec.exe Token: SeEnableDelegationPrivilege 1284 msiexec.exe Token: SeManageVolumePrivilege 1284 msiexec.exe Token: SeImpersonatePrivilege 1284 msiexec.exe Token: SeCreateGlobalPrivilege 1284 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe Token: SeRestorePrivilege 1680 msiexec.exe Token: SeTakeOwnershipPrivilege 1680 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1284 msiexec.exe 1284 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
msiexec.exedescription pid process target process PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 1564 1680 msiexec.exe MsiExec.exe PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp PID 1680 wrote to memory of 664 1680 msiexec.exe MSI306D.tmp
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\490548ca84fb78e8d332bcde20b37576b2a532e388232e756d9c746b6baad5bb.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1284
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A7D0B763D724126EC9150EADDF527DBB2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1564
-
-
C:\Windows\Installer\MSI306D.tmp"C:\Windows\Installer\MSI306D.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\eletronics\Consulta Eletronica\Escudo.exe"2⤵
- Executes dropped EXE
PID:664
-
-
C:\Users\Admin\AppData\Roaming\eletronics\Consulta Eletronica\Escudo.exe"C:\Users\Admin\AppData\Roaming\eletronics\Consulta Eletronica\Escudo.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
04ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
MD5
b9a0fbdff8c408ea7c265f2b5f17044f
SHA12493df4492892235e2c803ce87e8e22a36b53d93
SHA2563d9f667d75bdb6cf5536ea98e4d4dcbfeea8d29cdabfc23da4a5ff87c88108ce
SHA5129814132bd684860e8587b6f77e0bc9316a65c0414076efc919f96b0b8367b59bca70a6635433112b1e752814c9757ea90b66c1376c40df34423770de3e002623
-
MD5
073a1ae73a400b4724d25c1fc4d8ee83
SHA12c0596a9e6e2bcfcb4ead7c68ef2529c3f677b0e
SHA25689d2905f3b757ad144075c22607517098f535af59238e06c5f02dc2f0e231a0b
SHA512177f8a3cf43a64bcf339126e581edc40afb693baf508458571f86d5a2c7665154209ac04a94a3847df35964d67462e1e2b1b993baf58f31878c6d1e249e95230
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
a34d4f165087b11d9e06781d52262868
SHA11b7b6a5bb53b7c12fb45325f261ad7a61b485ce1
SHA25655ad26c17f4aac71e6db6a6edee6ebf695510dc7e533e3fee64afc3eb06291e5
SHA512aa62ff3b601ddb83133dd3659b0881f523454dc7eea921da7cfefc50426e70bb36b4ebc337a8f16620da610784a81a8e4aa1cf5e0959d28aa155d1f026a81aaf
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
7e68b9d86ff8fafe995fc9ea0a2bff44
SHA106afc5448037dc419013c3055f61836875bc5e02
SHA256fb4ff113ee64dd8d9aa92a3b5c1d1cd0896a1cc8b4c3768d1cacde2f52f41d58
SHA5126e22afd350f376969de823b033394324d3c2433c196515624a84b8e5160ea228fdaac0699e76466ae1f30155fc44f61697efb9e1eca9a67670aff25e6ee67a5c
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
073a1ae73a400b4724d25c1fc4d8ee83
SHA12c0596a9e6e2bcfcb4ead7c68ef2529c3f677b0e
SHA25689d2905f3b757ad144075c22607517098f535af59238e06c5f02dc2f0e231a0b
SHA512177f8a3cf43a64bcf339126e581edc40afb693baf508458571f86d5a2c7665154209ac04a94a3847df35964d67462e1e2b1b993baf58f31878c6d1e249e95230
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
7e68b9d86ff8fafe995fc9ea0a2bff44
SHA106afc5448037dc419013c3055f61836875bc5e02
SHA256fb4ff113ee64dd8d9aa92a3b5c1d1cd0896a1cc8b4c3768d1cacde2f52f41d58
SHA5126e22afd350f376969de823b033394324d3c2433c196515624a84b8e5160ea228fdaac0699e76466ae1f30155fc44f61697efb9e1eca9a67670aff25e6ee67a5c
-
MD5
305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e
-
MD5
dd777abc5e3abff6e35f866470fd8d2d
SHA111d68b3cf2f9628729622e76e82ce58f3b8d4561
SHA256c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed
SHA512aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e