Analysis

  • max time kernel
    152s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 11:22

General

  • Target

    GEe97Z.msi

  • Size

    4.5MB

  • MD5

    4cd8781e8e4decc80f164492cb452a91

  • SHA1

    9f920f504d5a918ef4aa7bd725b6a9ba58c010f1

  • SHA256

    4447d83b1a103618cea2deaed2e10d38aef10df6dfd7c24288e632004d4590ea

  • SHA512

    f33d567ddd5e2ae81b89b42d8d27686cb29b10c34dc48d6462377c8d6138e79b1107ecf622c4220ef8ffee01b1f986c2b3f56d89733a8ef6175f081b723aa7b1

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\GEe97Z.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1336
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3632
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4840

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI6bbb3.LOG
    Filesize

    20KB

    MD5

    cec6130c97b51f76a44df18d2a6696cd

    SHA1

    599bafa828c6aec9a0ba3fc1bd70bbefb7b7d1c7

    SHA256

    0e4fa046a58f03252f1f63744bf3b5d0f064c4c26a155a27af947cf711b60b5c

    SHA512

    0492afb43d2a7e39d92e6d7a2f1c318d1632976aaa3a23f275382b8baba31a5b7b4733d86b732c9a1be06095415ed3798051ceb9c4bb1ddcccdbccfe4badc2b6